pith. sign in

Integrity report for Detecting Data Exfiltration through I2P Anonymity Networks: A Two-Phase Machine Learning Approach

A machine-verified record of the checks Pith has run against this paper: detector runs, findings, signed bundle events, and canonical identifiers.

arXiv:2605.20546 · pith:2026:URHD75H4QM53PJT6U3LGXYRQVY

0Critical
0Advisory
5Detectors run
2026-05-21Last checked

Paper page arXiv integrity.json bundle.json

Detector runs

cited_work_retraction completed v1.0.0 · findings 0 · 2026-05-21 16:52:50.075709+00:00
doi_compliance completed v1.0.0 · findings 0 · 2026-05-21 06:33:09.554466+00:00
doi_title_agreement completed v1.0.0 · findings 0 · 2026-05-21 06:31:37.925746+00:00
claim_evidence completed v1.0.0 · findings 0 · 2026-05-21 02:42:20.352600+00:00
ai_meta_artifact skipped v1.0.0 · findings 0 · 2026-05-21 02:33:38.710888+00:00

Findings

No public integrity findings for this paper.

Signed record

The machine-readable record for this paper lives at /pith/URHD75H4/integrity.json. Pith Number bundles also include signed pith.integrity.v1 events where a Pith Number exists.