{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:GEHMMSNSKJQGQFDUX6ZFYDBSJS","short_pith_number":"pith:GEHMMSNS","canonical_record":{"source":{"id":"1803.03870","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-11T00:37:41Z","cross_cats_sorted":[],"title_canon_sha256":"bf8bc17d97034ff60c7769e35ddb8e89523c5edca9a99d3a5d9c0e0e80d00cb1","abstract_canon_sha256":"8e5a43952e53403c24b665e76f58c2276cc7f727ce69d359fc808e417a3207e9"},"schema_version":"1.0"},"canonical_sha256":"310ec649b25260681474bfb25c0c324caa4ea76e7c9cd2f5dbf0c88e0f2aa113","source":{"kind":"arxiv","id":"1803.03870","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.03870","created_at":"2026-05-17T23:43:18Z"},{"alias_kind":"arxiv_version","alias_value":"1803.03870v3","created_at":"2026-05-17T23:43:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.03870","created_at":"2026-05-17T23:43:18Z"},{"alias_kind":"pith_short_12","alias_value":"GEHMMSNSKJQG","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GEHMMSNSKJQGQFDU","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GEHMMSNS","created_at":"2026-05-18T12:32:25Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:GEHMMSNSKJQGQFDUX6ZFYDBSJS","target":"record","payload":{"canonical_record":{"source":{"id":"1803.03870","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-11T00:37:41Z","cross_cats_sorted":[],"title_canon_sha256":"bf8bc17d97034ff60c7769e35ddb8e89523c5edca9a99d3a5d9c0e0e80d00cb1","abstract_canon_sha256":"8e5a43952e53403c24b665e76f58c2276cc7f727ce69d359fc808e417a3207e9"},"schema_version":"1.0"},"canonical_sha256":"310ec649b25260681474bfb25c0c324caa4ea76e7c9cd2f5dbf0c88e0f2aa113","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:43:18.176404Z","signature_b64":"wTSthsAjFxe9dUMiX4aC1Crw77BYw3ENJfk01AFII+MypPEsSMD0KOMtNczulD/xoQF24dNEsT+4Ryjl6WY+CA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"310ec649b25260681474bfb25c0c324caa4ea76e7c9cd2f5dbf0c88e0f2aa113","last_reissued_at":"2026-05-17T23:43:18.175681Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:43:18.175681Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.03870","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:43:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"qsPmJUMnshOPdUujRmpOgO6/b8/PtWidt6HnUgCATxr8KRVoQyDy4BJInb7Zbwr/jE/Kbp86ipwog6/vr4T8Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T07:34:43.602448Z"},"content_sha256":"6c1a6feb93d805bced98341fd9de895bfa05d2baa239ade227ee1288e36ac7ca","schema_version":"1.0","event_id":"sha256:6c1a6feb93d805bced98341fd9de895bfa05d2baa239ade227ee1288e36ac7ca"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:GEHMMSNSKJQGQFDUX6ZFYDBSJS","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Detecting Adversarial Examples via Neural Fingerprinting","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.LG","authors_text":"Richard M. Murray, Stephan Zheng, Sumanth Dathathri, Tianwei Yin, Yisong Yue","submitted_at":"2018-03-11T00:37:41Z","abstract_excerpt":"Deep neural networks are vulnerable to adversarial examples, which dramatically alter model output using small input changes. We propose Neural Fingerprinting, a simple, yet effective method to detect adversarial examples by verifying whether model behavior is consistent with a set of secret fingerprints, inspired by the use of biometric and cryptographic signatures. The benefits of our method are that 1) it is fast, 2) it is prohibitively expensive for an attacker to reverse-engineer which fingerprints were used, and 3) it does not assume knowledge of the adversary. In this work, we pose a fo"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.03870","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:43:18Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"njOzBLFpjv4SKexX3Kvel5Wlc+fWp43otrs6Uek+P93ILRS5YvBhsYC4qLw1QZ516ze5JaV4NQobf1m+EleuCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T07:34:43.602796Z"},"content_sha256":"b6e806cfa267664887679ee2e40d20a93967c1ea3bd7b4d9d284c2fd1e3f5b1b","schema_version":"1.0","event_id":"sha256:b6e806cfa267664887679ee2e40d20a93967c1ea3bd7b4d9d284c2fd1e3f5b1b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS/bundle.json","state_url":"https://pith.science/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T07:34:43Z","links":{"resolver":"https://pith.science/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS","bundle":"https://pith.science/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS/bundle.json","state":"https://pith.science/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GEHMMSNSKJQGQFDUX6ZFYDBSJS/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:GEHMMSNSKJQGQFDUX6ZFYDBSJS","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8e5a43952e53403c24b665e76f58c2276cc7f727ce69d359fc808e417a3207e9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-11T00:37:41Z","title_canon_sha256":"bf8bc17d97034ff60c7769e35ddb8e89523c5edca9a99d3a5d9c0e0e80d00cb1"},"schema_version":"1.0","source":{"id":"1803.03870","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.03870","created_at":"2026-05-17T23:43:18Z"},{"alias_kind":"arxiv_version","alias_value":"1803.03870v3","created_at":"2026-05-17T23:43:18Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.03870","created_at":"2026-05-17T23:43:18Z"},{"alias_kind":"pith_short_12","alias_value":"GEHMMSNSKJQG","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GEHMMSNSKJQGQFDU","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GEHMMSNS","created_at":"2026-05-18T12:32:25Z"}],"graph_snapshots":[{"event_id":"sha256:b6e806cfa267664887679ee2e40d20a93967c1ea3bd7b4d9d284c2fd1e3f5b1b","target":"graph","created_at":"2026-05-17T23:43:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Deep neural networks are vulnerable to adversarial examples, which dramatically alter model output using small input changes. We propose Neural Fingerprinting, a simple, yet effective method to detect adversarial examples by verifying whether model behavior is consistent with a set of secret fingerprints, inspired by the use of biometric and cryptographic signatures. The benefits of our method are that 1) it is fast, 2) it is prohibitively expensive for an attacker to reverse-engineer which fingerprints were used, and 3) it does not assume knowledge of the adversary. In this work, we pose a fo","authors_text":"Richard M. Murray, Stephan Zheng, Sumanth Dathathri, Tianwei Yin, Yisong Yue","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-11T00:37:41Z","title":"Detecting Adversarial Examples via Neural Fingerprinting"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.03870","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6c1a6feb93d805bced98341fd9de895bfa05d2baa239ade227ee1288e36ac7ca","target":"record","created_at":"2026-05-17T23:43:18Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8e5a43952e53403c24b665e76f58c2276cc7f727ce69d359fc808e417a3207e9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-03-11T00:37:41Z","title_canon_sha256":"bf8bc17d97034ff60c7769e35ddb8e89523c5edca9a99d3a5d9c0e0e80d00cb1"},"schema_version":"1.0","source":{"id":"1803.03870","kind":"arxiv","version":3}},"canonical_sha256":"310ec649b25260681474bfb25c0c324caa4ea76e7c9cd2f5dbf0c88e0f2aa113","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"310ec649b25260681474bfb25c0c324caa4ea76e7c9cd2f5dbf0c88e0f2aa113","first_computed_at":"2026-05-17T23:43:18.175681Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:43:18.175681Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"wTSthsAjFxe9dUMiX4aC1Crw77BYw3ENJfk01AFII+MypPEsSMD0KOMtNczulD/xoQF24dNEsT+4Ryjl6WY+CA==","signature_status":"signed_v1","signed_at":"2026-05-17T23:43:18.176404Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.03870","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6c1a6feb93d805bced98341fd9de895bfa05d2baa239ade227ee1288e36ac7ca","sha256:b6e806cfa267664887679ee2e40d20a93967c1ea3bd7b4d9d284c2fd1e3f5b1b"],"state_sha256":"ca3ec936c2e371bdb9b6960dfd81a91bc71e2530aabe2474ad0c0c6f5086929a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Vd+CHBSLywdArBb29gLNW24KMndaZ71AX6f1CCmgEglV7ooWJyvBYhfRrY/YeI3pTvpIzXjF9dMO5XnPPi0GCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T07:34:43.604885Z","bundle_sha256":"0aa5d261449216909cd80d42a48b64ce67ea8f664037de96207c8a1aeefeba15"}}