{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:DV4KRPXPYNTYI3MEQANMISBF52","short_pith_number":"pith:DV4KRPXP","canonical_record":{"source":{"id":"2605.19966","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:15:51Z","cross_cats_sorted":["cs.AI"],"title_canon_sha256":"4cb8f42048c82d0363e499226af1679d3a09865f1f480bd0e7966ea51810bd50","abstract_canon_sha256":"01faa17f9f97c2293014b299fd0d4593e37c13ac72a13ce3b8e0604d4834b002"},"schema_version":"1.0"},"canonical_sha256":"1d78a8beefc367846d84801ac44825eebd6cdd26d0802251831c6c417d8f1a3c","source":{"kind":"arxiv","id":"2605.19966","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.19966","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"arxiv_version","alias_value":"2605.19966v1","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.19966","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"pith_short_12","alias_value":"DV4KRPXPYNTY","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"pith_short_16","alias_value":"DV4KRPXPYNTYI3ME","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"pith_short_8","alias_value":"DV4KRPXP","created_at":"2026-05-20T02:05:57Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:DV4KRPXPYNTYI3MEQANMISBF52","target":"record","payload":{"canonical_record":{"source":{"id":"2605.19966","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:15:51Z","cross_cats_sorted":["cs.AI"],"title_canon_sha256":"4cb8f42048c82d0363e499226af1679d3a09865f1f480bd0e7966ea51810bd50","abstract_canon_sha256":"01faa17f9f97c2293014b299fd0d4593e37c13ac72a13ce3b8e0604d4834b002"},"schema_version":"1.0"},"canonical_sha256":"1d78a8beefc367846d84801ac44825eebd6cdd26d0802251831c6c417d8f1a3c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T02:05:57.411636Z","signature_b64":"eWmN7DdUTZ0Lou+Us+DQPqeHE7cyIqdGmcguqLH3woy9zeAtP/peKgSYlGXiI90QoxT2s9ZBr958MJXV77sRCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"1d78a8beefc367846d84801ac44825eebd6cdd26d0802251831c6c417d8f1a3c","last_reissued_at":"2026-05-20T02:05:57.411042Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T02:05:57.411042Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.19966","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T02:05:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"4cz9hdFDH4DWO4pLiEqUp2ijcKaKKgeaIk/5jugk64mQWICQ8PJAvbfYopq3qJ7W6OoiIsCNngPx4XlL1J2uBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T04:44:20.790779Z"},"content_sha256":"ad8f4cd101ceab34705682a955b01208d4382c16eb42d95a875640c630a1c275","schema_version":"1.0","event_id":"sha256:ad8f4cd101ceab34705682a955b01208d4382c16eb42d95a875640c630a1c275"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:DV4KRPXPYNTYI3MEQANMISBF52","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Detecting Fluent Optimization-Based Adversarial Prompts via Sequential Entropy Changes","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.AI"],"primary_cat":"cs.LG","authors_text":"Miguel R. D. Rodrigues, Mohammed Alshaalan","submitted_at":"2026-05-19T15:15:51Z","abstract_excerpt":"Optimization-based adversarial suffixes can jailbreak aligned large language models (LLMs) while remaining fluent, weakening static and windowed perplexity-based detectors. We cast adversarial suffix detection as an online change-point detection problem over the token-level next-token entropy stream. Using the LLM system prompt to estimate a robust baseline, we standardize user-token entropies and apply a one-sided CUSUM statistic. The resulting detector, CPD Online (CPD), is model-agnostic, training-free, runs online, and localizes the adversarial suffix onset. On a benchmark of 1,012 optimiz"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.19966","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.19966/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T02:05:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Ch9SwYCfMwwWx8+ZGS1lfXeEqeidJgkj5sh1rbN7cIuSjHSQxD5qNU005t1LMqD4fwDgDCK/GJAdfFYAuMvVDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T04:44:20.791501Z"},"content_sha256":"6a0f641968c513c8dfc087cf39eac19ab5fefef84dbacdbb75c661885c86a317","schema_version":"1.0","event_id":"sha256:6a0f641968c513c8dfc087cf39eac19ab5fefef84dbacdbb75c661885c86a317"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/DV4KRPXPYNTYI3MEQANMISBF52/bundle.json","state_url":"https://pith.science/pith/DV4KRPXPYNTYI3MEQANMISBF52/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/DV4KRPXPYNTYI3MEQANMISBF52/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T04:44:20Z","links":{"resolver":"https://pith.science/pith/DV4KRPXPYNTYI3MEQANMISBF52","bundle":"https://pith.science/pith/DV4KRPXPYNTYI3MEQANMISBF52/bundle.json","state":"https://pith.science/pith/DV4KRPXPYNTYI3MEQANMISBF52/state.json","well_known_bundle":"https://pith.science/.well-known/pith/DV4KRPXPYNTYI3MEQANMISBF52/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:DV4KRPXPYNTYI3MEQANMISBF52","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"01faa17f9f97c2293014b299fd0d4593e37c13ac72a13ce3b8e0604d4834b002","cross_cats_sorted":["cs.AI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:15:51Z","title_canon_sha256":"4cb8f42048c82d0363e499226af1679d3a09865f1f480bd0e7966ea51810bd50"},"schema_version":"1.0","source":{"id":"2605.19966","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.19966","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"arxiv_version","alias_value":"2605.19966v1","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.19966","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"pith_short_12","alias_value":"DV4KRPXPYNTY","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"pith_short_16","alias_value":"DV4KRPXPYNTYI3ME","created_at":"2026-05-20T02:05:57Z"},{"alias_kind":"pith_short_8","alias_value":"DV4KRPXP","created_at":"2026-05-20T02:05:57Z"}],"graph_snapshots":[{"event_id":"sha256:6a0f641968c513c8dfc087cf39eac19ab5fefef84dbacdbb75c661885c86a317","target":"graph","created_at":"2026-05-20T02:05:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.19966/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Optimization-based adversarial suffixes can jailbreak aligned large language models (LLMs) while remaining fluent, weakening static and windowed perplexity-based detectors. We cast adversarial suffix detection as an online change-point detection problem over the token-level next-token entropy stream. Using the LLM system prompt to estimate a robust baseline, we standardize user-token entropies and apply a one-sided CUSUM statistic. The resulting detector, CPD Online (CPD), is model-agnostic, training-free, runs online, and localizes the adversarial suffix onset. On a benchmark of 1,012 optimiz","authors_text":"Miguel R. D. Rodrigues, Mohammed Alshaalan","cross_cats":["cs.AI"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:15:51Z","title":"Detecting Fluent Optimization-Based Adversarial Prompts via Sequential Entropy Changes"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.19966","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ad8f4cd101ceab34705682a955b01208d4382c16eb42d95a875640c630a1c275","target":"record","created_at":"2026-05-20T02:05:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"01faa17f9f97c2293014b299fd0d4593e37c13ac72a13ce3b8e0604d4834b002","cross_cats_sorted":["cs.AI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-19T15:15:51Z","title_canon_sha256":"4cb8f42048c82d0363e499226af1679d3a09865f1f480bd0e7966ea51810bd50"},"schema_version":"1.0","source":{"id":"2605.19966","kind":"arxiv","version":1}},"canonical_sha256":"1d78a8beefc367846d84801ac44825eebd6cdd26d0802251831c6c417d8f1a3c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"1d78a8beefc367846d84801ac44825eebd6cdd26d0802251831c6c417d8f1a3c","first_computed_at":"2026-05-20T02:05:57.411042Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T02:05:57.411042Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"eWmN7DdUTZ0Lou+Us+DQPqeHE7cyIqdGmcguqLH3woy9zeAtP/peKgSYlGXiI90QoxT2s9ZBr958MJXV77sRCw==","signature_status":"signed_v1","signed_at":"2026-05-20T02:05:57.411636Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.19966","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ad8f4cd101ceab34705682a955b01208d4382c16eb42d95a875640c630a1c275","sha256:6a0f641968c513c8dfc087cf39eac19ab5fefef84dbacdbb75c661885c86a317"],"state_sha256":"2b55ea1467670bcd855404f9cd3e245fea2ded1fc27ecaff176ef0c8397071d7"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FAPWQcVzKysAKq9hQlZ6NCQVOnzJwcfXe5clugeprgVtfacdIS8efSV1zNuK9qKNVlMiSMN+rsBZ0pu92gQCDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T04:44:20.795105Z","bundle_sha256":"2ddb170ca1ac3e41e7a3e96850905a22d6053fd8c123f2293b928fa80bb586d9"}}