{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:ZGKYAXDOTFE362HRW2NUTGU3HN","short_pith_number":"pith:ZGKYAXDO","canonical_record":{"source":{"id":"1707.07605","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2017-07-24T15:23:41Z","cross_cats_sorted":["cs.AI","cs.CL","cs.LG"],"title_canon_sha256":"f5f686fab67339dfbe169b51eb79434240f9e97bd5e2235eec4628eb79b46d92","abstract_canon_sha256":"63df14b5fd1c1ccefeeb773c36d4f8c58efdfe5d51e9c1890e223ca71b5aa042"},"schema_version":"1.0"},"canonical_sha256":"c995805c6e9949bf68f1b69b499a9b3b58cc3732a4482fd07689b14213652a6e","source":{"kind":"arxiv","id":"1707.07605","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1707.07605","created_at":"2026-05-18T00:39:41Z"},{"alias_kind":"arxiv_version","alias_value":"1707.07605v1","created_at":"2026-05-18T00:39:41Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1707.07605","created_at":"2026-05-18T00:39:41Z"},{"alias_kind":"pith_short_12","alias_value":"ZGKYAXDOTFE3","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_16","alias_value":"ZGKYAXDOTFE362HR","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_8","alias_value":"ZGKYAXDO","created_at":"2026-05-18T12:31:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:ZGKYAXDOTFE362HRW2NUTGU3HN","target":"record","payload":{"canonical_record":{"source":{"id":"1707.07605","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2017-07-24T15:23:41Z","cross_cats_sorted":["cs.AI","cs.CL","cs.LG"],"title_canon_sha256":"f5f686fab67339dfbe169b51eb79434240f9e97bd5e2235eec4628eb79b46d92","abstract_canon_sha256":"63df14b5fd1c1ccefeeb773c36d4f8c58efdfe5d51e9c1890e223ca71b5aa042"},"schema_version":"1.0"},"canonical_sha256":"c995805c6e9949bf68f1b69b499a9b3b58cc3732a4482fd07689b14213652a6e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:39:41.673256Z","signature_b64":"9xWkENdTmuDn4QQsF06v1SIolcICF70jbjgaq7m9jD0pWrj6m9Uz2LPrBqwnElrbjcYLNpUkS2VaKdldBEdDAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c995805c6e9949bf68f1b69b499a9b3b58cc3732a4482fd07689b14213652a6e","last_reissued_at":"2026-05-18T00:39:41.672560Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:39:41.672560Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1707.07605","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:39:41Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Eg0c41sv0jxicxdSICROVbDld7ZDL/j8AsDsRsW9Z+2e68RRxTjAusX3XKWY8Os94MdIUNz3JEwZJdbfOL4FCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T01:06:56.416949Z"},"content_sha256":"72dbac1458b85331956339ae78d4732b32102acf3433d48248ec2db4fe297b26","schema_version":"1.0","event_id":"sha256:72dbac1458b85331956339ae78d4732b32102acf3433d48248ec2db4fe297b26"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:ZGKYAXDOTFE362HRW2NUTGU3HN","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Share your Model instead of your Data: Privacy Preserving Mimic Learning for Ranking","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.CL","cs.LG"],"primary_cat":"cs.IR","authors_text":"Hosein Azarbonyad, Jaap Kamps, Maarten de Rijke, Mostafa Dehghani","submitted_at":"2017-07-24T15:23:41Z","abstract_excerpt":"Deep neural networks have become a primary tool for solving problems in many fields. They are also used for addressing information retrieval problems and show strong performance in several tasks. Training these models requires large, representative datasets and for most IR tasks, such data contains sensitive information from users. Privacy and confidentiality concerns prevent many data owners from sharing the data, thus today the research community can only benefit from research on large-scale datasets in a limited manner. In this paper, we discuss privacy preserving mimic learning, i.e., usin"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1707.07605","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:39:41Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HeFkD08jhnOlyfTzxK2Sa/MIHwe9Ztlx7XJ3hZaWOotZzSE5n+vWyjHPHYTohHBCJQwd5GlwjPR3pS7sW1gMAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T01:06:56.417684Z"},"content_sha256":"e7df8e1a0151951a7b8682dbfc23fcf6974a52a633f65de6cf373c7b357df28c","schema_version":"1.0","event_id":"sha256:e7df8e1a0151951a7b8682dbfc23fcf6974a52a633f65de6cf373c7b357df28c"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZGKYAXDOTFE362HRW2NUTGU3HN/bundle.json","state_url":"https://pith.science/pith/ZGKYAXDOTFE362HRW2NUTGU3HN/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZGKYAXDOTFE362HRW2NUTGU3HN/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T01:06:56Z","links":{"resolver":"https://pith.science/pith/ZGKYAXDOTFE362HRW2NUTGU3HN","bundle":"https://pith.science/pith/ZGKYAXDOTFE362HRW2NUTGU3HN/bundle.json","state":"https://pith.science/pith/ZGKYAXDOTFE362HRW2NUTGU3HN/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZGKYAXDOTFE362HRW2NUTGU3HN/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:ZGKYAXDOTFE362HRW2NUTGU3HN","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"63df14b5fd1c1ccefeeb773c36d4f8c58efdfe5d51e9c1890e223ca71b5aa042","cross_cats_sorted":["cs.AI","cs.CL","cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2017-07-24T15:23:41Z","title_canon_sha256":"f5f686fab67339dfbe169b51eb79434240f9e97bd5e2235eec4628eb79b46d92"},"schema_version":"1.0","source":{"id":"1707.07605","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1707.07605","created_at":"2026-05-18T00:39:41Z"},{"alias_kind":"arxiv_version","alias_value":"1707.07605v1","created_at":"2026-05-18T00:39:41Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1707.07605","created_at":"2026-05-18T00:39:41Z"},{"alias_kind":"pith_short_12","alias_value":"ZGKYAXDOTFE3","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_16","alias_value":"ZGKYAXDOTFE362HR","created_at":"2026-05-18T12:31:59Z"},{"alias_kind":"pith_short_8","alias_value":"ZGKYAXDO","created_at":"2026-05-18T12:31:59Z"}],"graph_snapshots":[{"event_id":"sha256:e7df8e1a0151951a7b8682dbfc23fcf6974a52a633f65de6cf373c7b357df28c","target":"graph","created_at":"2026-05-18T00:39:41Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Deep neural networks have become a primary tool for solving problems in many fields. They are also used for addressing information retrieval problems and show strong performance in several tasks. Training these models requires large, representative datasets and for most IR tasks, such data contains sensitive information from users. Privacy and confidentiality concerns prevent many data owners from sharing the data, thus today the research community can only benefit from research on large-scale datasets in a limited manner. In this paper, we discuss privacy preserving mimic learning, i.e., usin","authors_text":"Hosein Azarbonyad, Jaap Kamps, Maarten de Rijke, Mostafa Dehghani","cross_cats":["cs.AI","cs.CL","cs.LG"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2017-07-24T15:23:41Z","title":"Share your Model instead of your Data: Privacy Preserving Mimic Learning for Ranking"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1707.07605","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:72dbac1458b85331956339ae78d4732b32102acf3433d48248ec2db4fe297b26","target":"record","created_at":"2026-05-18T00:39:41Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"63df14b5fd1c1ccefeeb773c36d4f8c58efdfe5d51e9c1890e223ca71b5aa042","cross_cats_sorted":["cs.AI","cs.CL","cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IR","submitted_at":"2017-07-24T15:23:41Z","title_canon_sha256":"f5f686fab67339dfbe169b51eb79434240f9e97bd5e2235eec4628eb79b46d92"},"schema_version":"1.0","source":{"id":"1707.07605","kind":"arxiv","version":1}},"canonical_sha256":"c995805c6e9949bf68f1b69b499a9b3b58cc3732a4482fd07689b14213652a6e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c995805c6e9949bf68f1b69b499a9b3b58cc3732a4482fd07689b14213652a6e","first_computed_at":"2026-05-18T00:39:41.672560Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:39:41.672560Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"9xWkENdTmuDn4QQsF06v1SIolcICF70jbjgaq7m9jD0pWrj6m9Uz2LPrBqwnElrbjcYLNpUkS2VaKdldBEdDAA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:39:41.673256Z","signed_message":"canonical_sha256_bytes"},"source_id":"1707.07605","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:72dbac1458b85331956339ae78d4732b32102acf3433d48248ec2db4fe297b26","sha256:e7df8e1a0151951a7b8682dbfc23fcf6974a52a633f65de6cf373c7b357df28c"],"state_sha256":"7121544f3901e10d93bdd9e9ec1ea3e6fa4582a79ba87a3d4ace4df568a17178"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KQMnxy2orfmbIOMODXzesepxIAnoMRDIOyogYLCJ8NmlZVlU1pz8EakntulMZ+s1YkCUO+Y5xNrKJONkoqLIBQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T01:06:56.420818Z","bundle_sha256":"be336d52fe57e3aa1c29843798550b7264efeb3b42d2cd69a875027f2012e135"}}