pith. sign in

Recoverable Identifier

arXiv:2604.20771 · detector doi_compliance · incontrovertible · 2026-05-20 01:36:57.250042+00:00

advisory doi_compliance recoverable_identifier

DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TVT.2024.3402366.Gordon-Rodriguez) was visible in the surrounding text but could not be confirmed against doi.org as printed.

Paper page Integrity report arXiv Try DOI

Evidence text

Brown, C. E. (1998). Coefficient of variation. In Applied multivariate statistics in geohydrology and related sciences (pp. 155–157). Springer. Chen, R., Chen, X., & Zhao, J. (2024). Private and utility enhanced intrusion detection based on attack behavior analysis with local differential privacy on IoV. Computer Networks, 250, Article 110560. Cheng, P., Hua, L., Jiang, H., & Liu, G. (2023). LSF-idm: Automotive intrusion detection model with lightweight attribution and semantic fusion. arXiv preprint arXiv:2308.01237. Derhab, A., Belaoued, M., Mohiuddin, I., Kurniawan, F., & Khan, M. K. (2021). Histogram-based intrusion detection and filtering framework for secure and safe in-vehicle networks. IEEE Transactions on Intelligent Transportation Systems, 23(3), 2366–2379. Devnath, M. K. H. (2023). GCNIDS: A graph convolutional network-based intrusion detection system for CAN bus. arXiv preprint arXiv:2309.10173. Fawcett, T. (2006). An Introduction to ROC Analysis. Pattern Recogn. Lett., 27(8), 861–874. Fu, M., Wang, P., Liu, M., Zhang, Z., & Zhou, X. (2025). IoV-BERT-IDS: Hybrid network intrusion detection system in IoV using large language models. IEEE Transactions on Vehicular Technology, 74(2), 1909–1921. http://dx.doi.org/10.1109/TVT.2024. 3402366. Gordon-Rodriguez, E., Loaiza-Ganem, G., Pleiss, G., & Cunningham, J. P. (2020). Uses and abuses of the cross-entropy loss: Case studies in modern deep learning. In J. Zosa Forde, F. Ruiz, M. F. Pradier, & A. Schein (Eds.), Proceedin

Evidence payload

{
  "printed_excerpt": "Brown, C. E. (1998). Coefficient of variation. In Applied multivariate statistics in geohydrology and related sciences (pp. 155\u2013157). Springer. Chen, R., Chen, X., & Zhao, J. (2024). Private and utility enhanced intrusion detection based on",
  "reconstructed_doi": "10.1109/TVT.2024.3402366.Gordon-Rodriguez",
  "ref_index": 3,
  "resolved_title": null,
  "verdict_class": "incontrovertible"
}