{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:VXB4MLFDMKJSFFL4Y5BQ4ACTKY","short_pith_number":"pith:VXB4MLFD","schema_version":"1.0","canonical_sha256":"adc3c62ca3629322957cc7430e0053563bb3a48e6c254e6552896442feb67980","source":{"kind":"arxiv","id":"1801.02613","version":3},"attestation_state":"computed","paper":{"title":"Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.CV"],"primary_cat":"cs.LG","authors_text":"Bo Li, Dawn Song, Grant Schoenebeck, James Bailey, Michael E. Houle, Sarah M. Erfani, Sudanthi Wijewickrema, Xingjun Ma, Yisen Wang","submitted_at":"2018-01-08T18:54:40Z","abstract_excerpt":"Deep Neural Networks (DNNs) have recently been shown to be vulnerable against adversarial examples, which are carefully crafted instances that can mislead DNNs to make errors during prediction. To better understand such attacks, a characterization is needed of the properties of regions (the so-called 'adversarial subspaces') in which adversarial examples lie. We tackle this challenge by characterizing the dimensional properties of adversarial regions, via the use of Local Intrinsic Dimensionality (LID). LID assesses the space-filling capability of the region surrounding a reference example, ba"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1801.02613","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-01-08T18:54:40Z","cross_cats_sorted":["cs.CR","cs.CV"],"title_canon_sha256":"65872eae8f2aedef10e8116f04e8c2808d3b0f55de08dc7704095ff5ccd9d879","abstract_canon_sha256":"8c8c92420d9acb7ac9489fde4bf4733386bf575f1e36779555c88c50c9df4263"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:21:04.341497Z","signature_b64":"bYilI7BNas0UqnVlPmDc1y/spchDV3i7SimaV78Jc18nM3yFx/zR9AZjyDggi0XQNS/ckrQGLx7MEDdW0QdNDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"adc3c62ca3629322957cc7430e0053563bb3a48e6c254e6552896442feb67980","last_reissued_at":"2026-05-18T00:21:04.340942Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:21:04.340942Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.CV"],"primary_cat":"cs.LG","authors_text":"Bo Li, Dawn Song, Grant Schoenebeck, James Bailey, Michael E. Houle, Sarah M. Erfani, Sudanthi Wijewickrema, Xingjun Ma, Yisen Wang","submitted_at":"2018-01-08T18:54:40Z","abstract_excerpt":"Deep Neural Networks (DNNs) have recently been shown to be vulnerable against adversarial examples, which are carefully crafted instances that can mislead DNNs to make errors during prediction. To better understand such attacks, a characterization is needed of the properties of regions (the so-called 'adversarial subspaces') in which adversarial examples lie. We tackle this challenge by characterizing the dimensional properties of adversarial regions, via the use of Local Intrinsic Dimensionality (LID). LID assesses the space-filling capability of the region surrounding a reference example, ba"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.02613","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1801.02613","created_at":"2026-05-18T00:21:04.341006+00:00"},{"alias_kind":"arxiv_version","alias_value":"1801.02613v3","created_at":"2026-05-18T00:21:04.341006+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.02613","created_at":"2026-05-18T00:21:04.341006+00:00"},{"alias_kind":"pith_short_12","alias_value":"VXB4MLFDMKJS","created_at":"2026-05-18T12:32:59.047623+00:00"},{"alias_kind":"pith_short_16","alias_value":"VXB4MLFDMKJSFFL4","created_at":"2026-05-18T12:32:59.047623+00:00"},{"alias_kind":"pith_short_8","alias_value":"VXB4MLFD","created_at":"2026-05-18T12:32:59.047623+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":6,"internal_anchor_count":2,"sample":[{"citing_arxiv_id":"2605.15416","citing_title":"Margin-Adaptive Confidence Ranking for Reliable LLM Judgement","ref_index":63,"is_internal_anchor":true},{"citing_arxiv_id":"2510.01105","citing_title":"Geometric Analysis of Neural Regression Collapse via Intrinsic Dimension","ref_index":15,"is_internal_anchor":true},{"citing_arxiv_id":"2605.08268","citing_title":"Insider Attacks in Multi-Agent LLM Consensus Systems","ref_index":129,"is_internal_anchor":false},{"citing_arxiv_id":"2605.04358","citing_title":"Intermediate Representations are Strong AI-Generated Image Detectors","ref_index":30,"is_internal_anchor":false},{"citing_arxiv_id":"2604.14457","citing_title":"NeuroTrace: Inference Provenance-Based Detection of Adversarial Examples","ref_index":11,"is_internal_anchor":false},{"citing_arxiv_id":"2604.11928","citing_title":"INTARG: Informed Real-Time Adversarial Attack Generation for Time-Series Regression","ref_index":23,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY","json":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY.json","graph_json":"https://pith.science/api/pith-number/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/graph.json","events_json":"https://pith.science/api/pith-number/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/events.json","paper":"https://pith.science/paper/VXB4MLFD"},"agent_actions":{"view_html":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY","download_json":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY.json","view_paper":"https://pith.science/paper/VXB4MLFD","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1801.02613&json=true","fetch_graph":"https://pith.science/api/pith-number/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/graph.json","fetch_events":"https://pith.science/api/pith-number/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/action/timestamp_anchor","attest_storage":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/action/storage_attestation","attest_author":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/action/author_attestation","sign_citation":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/action/citation_signature","submit_replication":"https://pith.science/pith/VXB4MLFDMKJSFFL4Y5BQ4ACTKY/action/replication_record"}},"created_at":"2026-05-18T00:21:04.341006+00:00","updated_at":"2026-05-18T00:21:04.341006+00:00"}