{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:ZB7S57CBVAAHWD65HM7E7DRZEG","short_pith_number":"pith:ZB7S57CB","canonical_record":{"source":{"id":"1708.08689","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-08-29T10:47:38Z","cross_cats_sorted":[],"title_canon_sha256":"ca3a4961a814f1ccb90a8ddc60eb74b863c6c6455d67f175dca4655c2de5fd87","abstract_canon_sha256":"cefd2e3ff330baca04a05f79c022897434358a678c49477c859e535b7915997a"},"schema_version":"1.0"},"canonical_sha256":"c87f2efc41a8007b0fdd3b3e4f8e39219da09aa0b1670e06e9be7c89457b6832","source":{"kind":"arxiv","id":"1708.08689","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1708.08689","created_at":"2026-05-18T00:36:26Z"},{"alias_kind":"arxiv_version","alias_value":"1708.08689v1","created_at":"2026-05-18T00:36:26Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1708.08689","created_at":"2026-05-18T00:36:26Z"},{"alias_kind":"pith_short_12","alias_value":"ZB7S57CBVAAH","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_16","alias_value":"ZB7S57CBVAAHWD65","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_8","alias_value":"ZB7S57CB","created_at":"2026-05-18T12:31:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:ZB7S57CBVAAHWD65HM7E7DRZEG","target":"record","payload":{"canonical_record":{"source":{"id":"1708.08689","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-08-29T10:47:38Z","cross_cats_sorted":[],"title_canon_sha256":"ca3a4961a814f1ccb90a8ddc60eb74b863c6c6455d67f175dca4655c2de5fd87","abstract_canon_sha256":"cefd2e3ff330baca04a05f79c022897434358a678c49477c859e535b7915997a"},"schema_version":"1.0"},"canonical_sha256":"c87f2efc41a8007b0fdd3b3e4f8e39219da09aa0b1670e06e9be7c89457b6832","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:36:26.003862Z","signature_b64":"EjtrLXFEuFPP1qxsabs6j2O/PWrdo3K7MlGJrWI4LXPy3K8G5lHSHCz1yR0klGR5ntmFqoGM9uGnJIM1fPw6BQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c87f2efc41a8007b0fdd3b3e4f8e39219da09aa0b1670e06e9be7c89457b6832","last_reissued_at":"2026-05-18T00:36:26.003045Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:36:26.003045Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1708.08689","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:36:26Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"aR0yKYJfxTKrso59JRdyYFJJOcqdBVAprOsOi7+QXT3pB6WhljUU4wxh8rKyugjAAOL1nGvZWiEt1QAghSmaDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T14:51:18.664181Z"},"content_sha256":"854e0b47a006db70e25497ed7f19afb45251528bbb2a6cd7457b7af0d2579deb","schema_version":"1.0","event_id":"sha256:854e0b47a006db70e25497ed7f19afb45251528bbb2a6cd7457b7af0d2579deb"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:ZB7S57CBVAAHWD65HM7E7DRZEG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.LG","authors_text":"Ambra Demontis, Andrea Paudice, Battista Biggio, Emil C. Lupu, Fabio Roli, Luis Mu\\~noz-Gonz\\'alez, Vasin Wongrassamee","submitted_at":"2017-08-29T10:47:38Z","abstract_excerpt":"A number of online services nowadays rely upon machine learning to extract valuable information from data collected in the wild. This exposes learning algorithms to the threat of data poisoning, i.e., a coordinate attack in which a fraction of the training data is controlled by the attacker and manipulated to subvert the learning process. To date, these attacks have been devised only against a limited class of binary learning algorithms, due to the inherent complexity of the gradient-based procedure used to optimize the poisoning points (a.k.a. adversarial training examples). In this work, we "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1708.08689","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:36:26Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+2sXSZVUqlIyYnjiePPW1TDbcBYMZwVUVhgnpz26pE5UwdvMbBClJxy0N4jhohaT++UIpbZVK2ELSweb839IDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T14:51:18.664835Z"},"content_sha256":"e5c4d36405c8b35601ca68a03395478b173554d122bcee5ba6816b651c1a1deb","schema_version":"1.0","event_id":"sha256:e5c4d36405c8b35601ca68a03395478b173554d122bcee5ba6816b651c1a1deb"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZB7S57CBVAAHWD65HM7E7DRZEG/bundle.json","state_url":"https://pith.science/pith/ZB7S57CBVAAHWD65HM7E7DRZEG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZB7S57CBVAAHWD65HM7E7DRZEG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T14:51:18Z","links":{"resolver":"https://pith.science/pith/ZB7S57CBVAAHWD65HM7E7DRZEG","bundle":"https://pith.science/pith/ZB7S57CBVAAHWD65HM7E7DRZEG/bundle.json","state":"https://pith.science/pith/ZB7S57CBVAAHWD65HM7E7DRZEG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZB7S57CBVAAHWD65HM7E7DRZEG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:ZB7S57CBVAAHWD65HM7E7DRZEG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"cefd2e3ff330baca04a05f79c022897434358a678c49477c859e535b7915997a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-08-29T10:47:38Z","title_canon_sha256":"ca3a4961a814f1ccb90a8ddc60eb74b863c6c6455d67f175dca4655c2de5fd87"},"schema_version":"1.0","source":{"id":"1708.08689","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1708.08689","created_at":"2026-05-18T00:36:26Z"},{"alias_kind":"arxiv_version","alias_value":"1708.08689v1","created_at":"2026-05-18T00:36:26Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1708.08689","created_at":"2026-05-18T00:36:26Z"},{"alias_kind":"pith_short_12","alias_value":"ZB7S57CBVAAH","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_16","alias_value":"ZB7S57CBVAAHWD65","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_8","alias_value":"ZB7S57CB","created_at":"2026-05-18T12:31:59Z"}],"graph_snapshots":[{"event_id":"sha256:e5c4d36405c8b35601ca68a03395478b173554d122bcee5ba6816b651c1a1deb","target":"graph","created_at":"2026-05-18T00:36:26Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"A number of online services nowadays rely upon machine learning to extract valuable information from data collected in the wild. This exposes learning algorithms to the threat of data poisoning, i.e., a coordinate attack in which a fraction of the training data is controlled by the attacker and manipulated to subvert the learning process. To date, these attacks have been devised only against a limited class of binary learning algorithms, due to the inherent complexity of the gradient-based procedure used to optimize the poisoning points (a.k.a. adversarial training examples). In this work, we ","authors_text":"Ambra Demontis, Andrea Paudice, Battista Biggio, Emil C. Lupu, Fabio Roli, Luis Mu\\~noz-Gonz\\'alez, Vasin Wongrassamee","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-08-29T10:47:38Z","title":"Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1708.08689","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:854e0b47a006db70e25497ed7f19afb45251528bbb2a6cd7457b7af0d2579deb","target":"record","created_at":"2026-05-18T00:36:26Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"cefd2e3ff330baca04a05f79c022897434358a678c49477c859e535b7915997a","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2017-08-29T10:47:38Z","title_canon_sha256":"ca3a4961a814f1ccb90a8ddc60eb74b863c6c6455d67f175dca4655c2de5fd87"},"schema_version":"1.0","source":{"id":"1708.08689","kind":"arxiv","version":1}},"canonical_sha256":"c87f2efc41a8007b0fdd3b3e4f8e39219da09aa0b1670e06e9be7c89457b6832","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c87f2efc41a8007b0fdd3b3e4f8e39219da09aa0b1670e06e9be7c89457b6832","first_computed_at":"2026-05-18T00:36:26.003045Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:36:26.003045Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"EjtrLXFEuFPP1qxsabs6j2O/PWrdo3K7MlGJrWI4LXPy3K8G5lHSHCz1yR0klGR5ntmFqoGM9uGnJIM1fPw6BQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:36:26.003862Z","signed_message":"canonical_sha256_bytes"},"source_id":"1708.08689","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:854e0b47a006db70e25497ed7f19afb45251528bbb2a6cd7457b7af0d2579deb","sha256:e5c4d36405c8b35601ca68a03395478b173554d122bcee5ba6816b651c1a1deb"],"state_sha256":"0afac0a43112662b584c4c41c001e08432790d7e7c2ecfe7b5181a444af54404"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LEVm/vjkTNe4TZepnJEjawqz9iwrnvBlpy+dQ78AlnjyfY18sdRAWCfP5CUQ/yUHf6hbFIiWnsprvmF1n9pTDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T14:51:18.672906Z","bundle_sha256":"18f1125eaa67b159747fe8156452ef2967c7eee064d138ec8f1b22be963e80f7"}}