{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:WFF446XABKWW33KSZWTS552PUO","short_pith_number":"pith:WFF446XA","schema_version":"1.0","canonical_sha256":"b14bce7ae00aad6ded52cda72ef74fa394e7def397e63599152aa91bccfee47d","source":{"kind":"arxiv","id":"1803.00466","version":1},"attestation_state":"computed","paper":{"title":"Intelligent Virtual Assistant knows Your Life","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CY","authors_text":"Hyunji Chung, Sangjin Lee","submitted_at":"2018-02-28T01:06:57Z","abstract_excerpt":"In the IoT world, intelligent virtual assistant (IVA) is a popular service to interact with users based on voice command. For optimal performance and efficient data management, famous IVAs like Amazon Alexa and Google Assistant usually operate based on the cloud computing architecture. In this process, a large amount of behavioral traces that include user voice activity history with detailed descriptions can be stored in the remote servers within an IVA ecosystem. If those data (as also known as IVA cloud native data) are leaked by attacks, malicious person may be able to not only harvest deta"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1803.00466","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CY","submitted_at":"2018-02-28T01:06:57Z","cross_cats_sorted":[],"title_canon_sha256":"3fe2970846b72226b6e6cac49a455b2e5fbf37e597d3b869dc64bc0a5816021c","abstract_canon_sha256":"1277bae4d05196516959608b01b708b1528471c36b3c0ea13aac5b1d73343bae"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:22:11.680384Z","signature_b64":"d1ugWPwGQ0cYXmYu0vfSa4bnBmoR1Wb7LSr4QcO9m8gN7EH/lwOp4QMsF0s1Hic7t9JZcsprk5Jt20SB1oiZDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b14bce7ae00aad6ded52cda72ef74fa394e7def397e63599152aa91bccfee47d","last_reissued_at":"2026-05-18T00:22:11.679825Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:22:11.679825Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Intelligent Virtual Assistant knows Your Life","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CY","authors_text":"Hyunji Chung, Sangjin Lee","submitted_at":"2018-02-28T01:06:57Z","abstract_excerpt":"In the IoT world, intelligent virtual assistant (IVA) is a popular service to interact with users based on voice command. For optimal performance and efficient data management, famous IVAs like Amazon Alexa and Google Assistant usually operate based on the cloud computing architecture. In this process, a large amount of behavioral traces that include user voice activity history with detailed descriptions can be stored in the remote servers within an IVA ecosystem. If those data (as also known as IVA cloud native data) are leaked by attacks, malicious person may be able to not only harvest deta"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.00466","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1803.00466","created_at":"2026-05-18T00:22:11.679900+00:00"},{"alias_kind":"arxiv_version","alias_value":"1803.00466v1","created_at":"2026-05-18T00:22:11.679900+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.00466","created_at":"2026-05-18T00:22:11.679900+00:00"},{"alias_kind":"pith_short_12","alias_value":"WFF446XABKWW","created_at":"2026-05-18T12:32:59.047623+00:00"},{"alias_kind":"pith_short_16","alias_value":"WFF446XABKWW33KS","created_at":"2026-05-18T12:32:59.047623+00:00"},{"alias_kind":"pith_short_8","alias_value":"WFF446XA","created_at":"2026-05-18T12:32:59.047623+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2505.17682","citing_title":"Tuning Language Models for Robust Prediction of Diverse User Behaviors","ref_index":6,"is_internal_anchor":true},{"citing_arxiv_id":"2604.23578","citing_title":"LLMs Reading the Rhythms of Daily Life: Aligned Understanding for Behavior Prediction and Generation","ref_index":1,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO","json":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO.json","graph_json":"https://pith.science/api/pith-number/WFF446XABKWW33KSZWTS552PUO/graph.json","events_json":"https://pith.science/api/pith-number/WFF446XABKWW33KSZWTS552PUO/events.json","paper":"https://pith.science/paper/WFF446XA"},"agent_actions":{"view_html":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO","download_json":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO.json","view_paper":"https://pith.science/paper/WFF446XA","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1803.00466&json=true","fetch_graph":"https://pith.science/api/pith-number/WFF446XABKWW33KSZWTS552PUO/graph.json","fetch_events":"https://pith.science/api/pith-number/WFF446XABKWW33KSZWTS552PUO/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO/action/timestamp_anchor","attest_storage":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO/action/storage_attestation","attest_author":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO/action/author_attestation","sign_citation":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO/action/citation_signature","submit_replication":"https://pith.science/pith/WFF446XABKWW33KSZWTS552PUO/action/replication_record"}},"created_at":"2026-05-18T00:22:11.679900+00:00","updated_at":"2026-05-18T00:22:11.679900+00:00"}