{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:YXMAOPRVDATL4EIO3UERDTRWKX","short_pith_number":"pith:YXMAOPRV","schema_version":"1.0","canonical_sha256":"c5d8073e351826be110edd0911ce3655fddb34928cca85c6f1997ba88b9daf9e","source":{"kind":"arxiv","id":"1904.03750","version":1},"attestation_state":"computed","paper":{"title":"JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CV"],"primary_cat":"cs.CR","authors_text":"Michael W. Mahoney, N. Benjamin Erichson, Zhewei Yao","submitted_at":"2019-04-07T21:47:45Z","abstract_excerpt":"It has been demonstrated that very simple attacks can fool highly-sophisticated neural network architectures. In particular, so-called adversarial examples, constructed from perturbations of input data that are small or imperceptible to humans but lead to different predictions, may lead to an enormous risk in certain critical applications. In light of this, there has been a great deal of work on developing adversarial training strategies to improve model robustness. These training strategies are very expensive, in both human and computational time. To complement these approaches, we propose a "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1904.03750","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-04-07T21:47:45Z","cross_cats_sorted":["cs.CV"],"title_canon_sha256":"364cc8556b1f44941cc906249f36f483f6fefae193a4f04b8645a05742c0ca5b","abstract_canon_sha256":"93a194b1e78403477526b35eb26004aaa1dfb4e3dc8f61c5031ba3166f1500bd"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:49:08.245497Z","signature_b64":"pBrInsUD3OpXC3Wlera2RVi45NSGJJ9JdFmuvAQbnx4ks/7tljEUtpVEiNQCkl7cH/4Jh8b7i8NHC3vdTpSmCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c5d8073e351826be110edd0911ce3655fddb34928cca85c6f1997ba88b9daf9e","last_reissued_at":"2026-05-17T23:49:08.244747Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:49:08.244747Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"JumpReLU: A Retrofit Defense Strategy for Adversarial Attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CV"],"primary_cat":"cs.CR","authors_text":"Michael W. Mahoney, N. Benjamin Erichson, Zhewei Yao","submitted_at":"2019-04-07T21:47:45Z","abstract_excerpt":"It has been demonstrated that very simple attacks can fool highly-sophisticated neural network architectures. In particular, so-called adversarial examples, constructed from perturbations of input data that are small or imperceptible to humans but lead to different predictions, may lead to an enormous risk in certain critical applications. In light of this, there has been a great deal of work on developing adversarial training strategies to improve model robustness. These training strategies are very expensive, in both human and computational time. To complement these approaches, we propose a "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.03750","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1904.03750","created_at":"2026-05-17T23:49:08.244864+00:00"},{"alias_kind":"arxiv_version","alias_value":"1904.03750v1","created_at":"2026-05-17T23:49:08.244864+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.03750","created_at":"2026-05-17T23:49:08.244864+00:00"},{"alias_kind":"pith_short_12","alias_value":"YXMAOPRVDATL","created_at":"2026-05-18T12:33:33.725879+00:00"},{"alias_kind":"pith_short_16","alias_value":"YXMAOPRVDATL4EIO","created_at":"2026-05-18T12:33:33.725879+00:00"},{"alias_kind":"pith_short_8","alias_value":"YXMAOPRV","created_at":"2026-05-18T12:33:33.725879+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":0,"sample":[{"citing_arxiv_id":"2406.04093","citing_title":"Scaling and evaluating sparse autoencoders","ref_index":14,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX","json":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX.json","graph_json":"https://pith.science/api/pith-number/YXMAOPRVDATL4EIO3UERDTRWKX/graph.json","events_json":"https://pith.science/api/pith-number/YXMAOPRVDATL4EIO3UERDTRWKX/events.json","paper":"https://pith.science/paper/YXMAOPRV"},"agent_actions":{"view_html":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX","download_json":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX.json","view_paper":"https://pith.science/paper/YXMAOPRV","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1904.03750&json=true","fetch_graph":"https://pith.science/api/pith-number/YXMAOPRVDATL4EIO3UERDTRWKX/graph.json","fetch_events":"https://pith.science/api/pith-number/YXMAOPRVDATL4EIO3UERDTRWKX/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX/action/timestamp_anchor","attest_storage":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX/action/storage_attestation","attest_author":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX/action/author_attestation","sign_citation":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX/action/citation_signature","submit_replication":"https://pith.science/pith/YXMAOPRVDATL4EIO3UERDTRWKX/action/replication_record"}},"created_at":"2026-05-17T23:49:08.244864+00:00","updated_at":"2026-05-17T23:49:08.244864+00:00"}