{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:XGFJL54VNPTACFTRK34PKPD4WN","short_pith_number":"pith:XGFJL54V","canonical_record":{"source":{"id":"1401.3274","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-01-14T18:26:36Z","cross_cats_sorted":[],"title_canon_sha256":"760201b43c1be9691994febcd719294f0a1e043877cb85906084ebd48a28c394","abstract_canon_sha256":"c265679a4e66abc513dd0b992ea9ae6ddef55188824acebc3814aae4148c5150"},"schema_version":"1.0"},"canonical_sha256":"b98a95f7956be601167156f8f53c7cb36396100df921f0db42fc13655e205705","source":{"kind":"arxiv","id":"1401.3274","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1401.3274","created_at":"2026-05-18T03:02:18Z"},{"alias_kind":"arxiv_version","alias_value":"1401.3274v1","created_at":"2026-05-18T03:02:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1401.3274","created_at":"2026-05-18T03:02:18Z"},{"alias_kind":"pith_short_12","alias_value":"XGFJL54VNPTA","created_at":"2026-05-18T12:28:57Z"},{"alias_kind":"pith_short_16","alias_value":"XGFJL54VNPTACFTR","created_at":"2026-05-18T12:28:57Z"},{"alias_kind":"pith_short_8","alias_value":"XGFJL54V","created_at":"2026-05-18T12:28:57Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:XGFJL54VNPTACFTRK34PKPD4WN","target":"record","payload":{"canonical_record":{"source":{"id":"1401.3274","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-01-14T18:26:36Z","cross_cats_sorted":[],"title_canon_sha256":"760201b43c1be9691994febcd719294f0a1e043877cb85906084ebd48a28c394","abstract_canon_sha256":"c265679a4e66abc513dd0b992ea9ae6ddef55188824acebc3814aae4148c5150"},"schema_version":"1.0"},"canonical_sha256":"b98a95f7956be601167156f8f53c7cb36396100df921f0db42fc13655e205705","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:02:18.997781Z","signature_b64":"VZAHKCl9hvBOPdXiN0YlsIQJRvhsvW+578qlfnYzyyiCbrMtYaEPL6iPpVasCWOlZYuQOgs6JYNtV+KNjkY7Dw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b98a95f7956be601167156f8f53c7cb36396100df921f0db42fc13655e205705","last_reissued_at":"2026-05-18T03:02:18.996982Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:02:18.996982Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1401.3274","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:02:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5AGDijecanMJyLT4GZC4EEfCXsjQTATrW5d10dq0wwADwyLn8PUoFSRpWkRgyJCfldzc3K7WL1yoW4RfKmTBBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T01:07:37.015260Z"},"content_sha256":"0f43b1ff38e41ddb966415c476d9c82e5bd5d82601b1d9cce0a61a8d547d1046","schema_version":"1.0","event_id":"sha256:0f43b1ff38e41ddb966415c476d9c82e5bd5d82601b1d9cce0a61a8d547d1046"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:XGFJL54VNPTACFTRK34PKPD4WN","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Deepjyoti Deka, Ross Baldick, Sriram Vishwanath","submitted_at":"2014-01-14T18:26:36Z","abstract_excerpt":"Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is able to introduce spurious measurements in them. The paper presents a polynomial time algorithm using "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1401.3274","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:02:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+H5PUkqbHAdSBSvfSNo7Zp7/yn9B3WWXk7NgF+TYd7+WdSy+dZp96eceM/Bqs1wzWQPED9W2Ogjd9DpLgAFyAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T01:07:37.016151Z"},"content_sha256":"90001a858e783111c46a154397503435727f936f91b316cdd9923638aa6a9255","schema_version":"1.0","event_id":"sha256:90001a858e783111c46a154397503435727f936f91b316cdd9923638aa6a9255"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/XGFJL54VNPTACFTRK34PKPD4WN/bundle.json","state_url":"https://pith.science/pith/XGFJL54VNPTACFTRK34PKPD4WN/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/XGFJL54VNPTACFTRK34PKPD4WN/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T01:07:37Z","links":{"resolver":"https://pith.science/pith/XGFJL54VNPTACFTRK34PKPD4WN","bundle":"https://pith.science/pith/XGFJL54VNPTACFTRK34PKPD4WN/bundle.json","state":"https://pith.science/pith/XGFJL54VNPTACFTRK34PKPD4WN/state.json","well_known_bundle":"https://pith.science/.well-known/pith/XGFJL54VNPTACFTRK34PKPD4WN/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:XGFJL54VNPTACFTRK34PKPD4WN","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c265679a4e66abc513dd0b992ea9ae6ddef55188824acebc3814aae4148c5150","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-01-14T18:26:36Z","title_canon_sha256":"760201b43c1be9691994febcd719294f0a1e043877cb85906084ebd48a28c394"},"schema_version":"1.0","source":{"id":"1401.3274","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1401.3274","created_at":"2026-05-18T03:02:18Z"},{"alias_kind":"arxiv_version","alias_value":"1401.3274v1","created_at":"2026-05-18T03:02:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1401.3274","created_at":"2026-05-18T03:02:18Z"},{"alias_kind":"pith_short_12","alias_value":"XGFJL54VNPTA","created_at":"2026-05-18T12:28:57Z"},{"alias_kind":"pith_short_16","alias_value":"XGFJL54VNPTACFTR","created_at":"2026-05-18T12:28:57Z"},{"alias_kind":"pith_short_8","alias_value":"XGFJL54V","created_at":"2026-05-18T12:28:57Z"}],"graph_snapshots":[{"event_id":"sha256:90001a858e783111c46a154397503435727f936f91b316cdd9923638aa6a9255","target":"graph","created_at":"2026-05-18T03:02:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is able to introduce spurious measurements in them. The paper presents a polynomial time algorithm using ","authors_text":"Deepjyoti Deka, Ross Baldick, Sriram Vishwanath","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-01-14T18:26:36Z","title":"Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1401.3274","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0f43b1ff38e41ddb966415c476d9c82e5bd5d82601b1d9cce0a61a8d547d1046","target":"record","created_at":"2026-05-18T03:02:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c265679a4e66abc513dd0b992ea9ae6ddef55188824acebc3814aae4148c5150","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-01-14T18:26:36Z","title_canon_sha256":"760201b43c1be9691994febcd719294f0a1e043877cb85906084ebd48a28c394"},"schema_version":"1.0","source":{"id":"1401.3274","kind":"arxiv","version":1}},"canonical_sha256":"b98a95f7956be601167156f8f53c7cb36396100df921f0db42fc13655e205705","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b98a95f7956be601167156f8f53c7cb36396100df921f0db42fc13655e205705","first_computed_at":"2026-05-18T03:02:18.996982Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:02:18.996982Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"VZAHKCl9hvBOPdXiN0YlsIQJRvhsvW+578qlfnYzyyiCbrMtYaEPL6iPpVasCWOlZYuQOgs6JYNtV+KNjkY7Dw==","signature_status":"signed_v1","signed_at":"2026-05-18T03:02:18.997781Z","signed_message":"canonical_sha256_bytes"},"source_id":"1401.3274","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0f43b1ff38e41ddb966415c476d9c82e5bd5d82601b1d9cce0a61a8d547d1046","sha256:90001a858e783111c46a154397503435727f936f91b316cdd9923638aa6a9255"],"state_sha256":"1be0a32aa2c33e8dae7b15b89c947244d23b9b76e1833d541038752612277796"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5ONtv7t5AB60z1CVanSss/ldT5FBgPuudYJ3BWXIfO1TLW0khp8qK+aFVQSbpFdGLEfNhR4rTMQPUzZ5yYVOBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T01:07:37.017941Z","bundle_sha256":"c7abc71bf047fa8a9f720f1f56f461a6c7d40ae61f0833e426a17c72c51074cf"}}