{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:US23MALPLD2RP4GNA7PPA3SN3D","short_pith_number":"pith:US23MALP","schema_version":"1.0","canonical_sha256":"a4b5b6016f58f517f0cd07def06e4dd8cfd309ab837ec33f8cf5b88077b1a0fd","source":{"kind":"arxiv","id":"1903.10346","version":2},"attestation_state":"computed","paper":{"title":"Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","cs.SD","stat.ML"],"primary_cat":"eess.AS","authors_text":"Colin Raffel, Garrison Cottrell, Ian Goodfellow, Nicholas Carlini, Yao Qin","submitted_at":"2019-03-22T17:46:35Z","abstract_excerpt":"Adversarial examples are inputs to machine learning models designed by an adversary to cause an incorrect output. So far, adversarial examples have been studied most extensively in the image domain. In this domain, adversarial examples can be constructed by imperceptibly modifying images to cause misclassification, and are practical in the physical world. In contrast, current targeted adversarial examples applied to speech recognition systems have neither of these properties: humans can easily identify the adversarial perturbations, and they are not effective when played over-the-air. This pap"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1903.10346","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.AS","submitted_at":"2019-03-22T17:46:35Z","cross_cats_sorted":["cs.LG","cs.SD","stat.ML"],"title_canon_sha256":"a638b1f04d5a83b0f9d26cee31908a3e15857760cf80147319cd5f5fbfc9f79e","abstract_canon_sha256":"ba0ac7e57056fcabc371819beb9657976006d4718bb44650ef86aa5bf9e4058d"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:43:56.177948Z","signature_b64":"q31KiK0UKibB+4mclDEHaKw/iUZJO1SVlvHaJWKAkqpZA+EdsxJ/2/KWVxDjLHTA29NohpW2r73zvRsTuZapDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a4b5b6016f58f517f0cd07def06e4dd8cfd309ab837ec33f8cf5b88077b1a0fd","last_reissued_at":"2026-05-17T23:43:56.177234Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:43:56.177234Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","cs.SD","stat.ML"],"primary_cat":"eess.AS","authors_text":"Colin Raffel, Garrison Cottrell, Ian Goodfellow, Nicholas Carlini, Yao Qin","submitted_at":"2019-03-22T17:46:35Z","abstract_excerpt":"Adversarial examples are inputs to machine learning models designed by an adversary to cause an incorrect output. So far, adversarial examples have been studied most extensively in the image domain. In this domain, adversarial examples can be constructed by imperceptibly modifying images to cause misclassification, and are practical in the physical world. In contrast, current targeted adversarial examples applied to speech recognition systems have neither of these properties: humans can easily identify the adversarial perturbations, and they are not effective when played over-the-air. This pap"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.10346","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1903.10346","created_at":"2026-05-17T23:43:56.177361+00:00"},{"alias_kind":"arxiv_version","alias_value":"1903.10346v2","created_at":"2026-05-17T23:43:56.177361+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.10346","created_at":"2026-05-17T23:43:56.177361+00:00"},{"alias_kind":"pith_short_12","alias_value":"US23MALPLD2R","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_16","alias_value":"US23MALPLD2RP4GN","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_8","alias_value":"US23MALP","created_at":"2026-05-18T12:33:30.264802+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2605.20519","citing_title":"Codec-Robust Attacks on Audio LLMs","ref_index":28,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D","json":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D.json","graph_json":"https://pith.science/api/pith-number/US23MALPLD2RP4GNA7PPA3SN3D/graph.json","events_json":"https://pith.science/api/pith-number/US23MALPLD2RP4GNA7PPA3SN3D/events.json","paper":"https://pith.science/paper/US23MALP"},"agent_actions":{"view_html":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D","download_json":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D.json","view_paper":"https://pith.science/paper/US23MALP","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1903.10346&json=true","fetch_graph":"https://pith.science/api/pith-number/US23MALPLD2RP4GNA7PPA3SN3D/graph.json","fetch_events":"https://pith.science/api/pith-number/US23MALPLD2RP4GNA7PPA3SN3D/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D/action/timestamp_anchor","attest_storage":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D/action/storage_attestation","attest_author":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D/action/author_attestation","sign_citation":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D/action/citation_signature","submit_replication":"https://pith.science/pith/US23MALPLD2RP4GNA7PPA3SN3D/action/replication_record"}},"created_at":"2026-05-17T23:43:56.177361+00:00","updated_at":"2026-05-17T23:43:56.177361+00:00"}