{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.20255","arxiv_id":"2604.20255","integrity":{"available":true,"endpoint":"/pith/2604.20255/integrity.json","summary":{"critical":2,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":2,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T15:33:43.760310Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T02:08:57.327760Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.future.2024.09.002) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.future.2024.09.002","detected_arxiv_id":null,"ref_index":61,"audited_at":"2026-05-20T02:08:57.327760Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/s0031-3203(03)00003-5' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/s0031-3203(03)00003-5","detected_arxiv_id":null,"ref_index":19,"audited_at":"2026-05-20T02:08:57.327760Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1186/s40537-020-00324-9' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1186/s40537-020-00324-9","detected_arxiv_id":null,"ref_index":51,"audited_at":"2026-05-20T02:08:57.327760Z"}],"snapshot_sha256":"f4d0b6ad23607daacf2e0143e97bb88daf5c7065da593c05b95d47d22c7a40d9"},"events":[{"event_id":4264,"event_type":"pith.integrity.v1","payload_sha256":"97b4104900e0c6a9c688b3cab236219e72ef8ae4c62233d492d95648b92de9fa","signature_b64":"b9JAQERIVV+SpfveYr1gsKN++SR6ZJrAnemwO4NHHaJX2AD7pBsCQlvEHxl0x3bJCR1yXXyxUc4dyjy9VB+HAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:12:39.519915+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.future.2024.09.002) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Tommaso Zoppi et al. 2024. Anomaly-based Error and Intrusion Detection in Tabular Data.Future Generation Computer Systems(2024). doi:10.1016/j.future. 2024.09.002 A Appendix: Datasets Details The dataset information used in the experiments ","arxiv_id":"2604.20255","detector":"doi_compliance","evidence":{"ref_index":61,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Tommaso Zoppi et al. 2024. Anomaly-based Error and Intrusion Detection in Tabular Data.Future Generation Computer Systems(2024). doi:10.1016/j.future. 2024.09.002 A Appendix: Datasets Details The dataset information used in the experiments ","reconstructed_doi":"10.1016/j.future.2024.09.002"},"severity":"advisory","ref_index":61,"audited_at":"2026-05-20T02:08:57.327760Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.future.2024.09.002","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"1e45420deff2d1929ff12e4ed9332e2e5d76e4b174672a072b5f22f34bf38d0e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4263,"event_type":"pith.integrity.v1","payload_sha256":"87dd453dc0686369e3e39639f4594daf2307ef8c5a8d36a70defc7e7fb51719d","signature_b64":"S5x6J85tumXVohwdxga+SeDYc87tc654FBt7m+qWagveuBkMMkd+TYYWY0B7qQ/iGecjYjeXwK3rF6jmX+tTAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:12:39.517667+00:00","payload":{"note":"Identifier '10.1186/s40537-020-00324-9' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Srujana Thudumu, Philip Branch, Jia Jin, and Andy Kenyon. 2020. A Compre- hensive Survey of Anomaly Detection Techniques for High Dimensional Data. Journal of Big Data7, 1 (2020), 26. doi:10.1186/s40537-020-00324-9","arxiv_id":"2604.20255","detector":"doi_compliance","evidence":{"doi":"10.1186/s40537-020-00324-9","arxiv_id":null,"ref_index":51,"raw_excerpt":"Srujana Thudumu, Philip Branch, Jia Jin, and Andy Kenyon. 2020. A Compre- hensive Survey of Anomaly Detection Techniques for High Dimensional Data. Journal of Big Data7, 1 (2020), 26. doi:10.1186/s40537-020-00324-9","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":51,"audited_at":"2026-05-20T02:08:57.327760Z","event_type":"pith.integrity.v1","detected_doi":"10.1186/s40537-020-00324-9","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"9d08ade5a1666915dfadbeae9eb69358d82aa62c155f89918397f9bc437d3dad","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4262,"event_type":"pith.integrity.v1","payload_sha256":"5a51cdbb92261870f0df05ed3475ff6880952cfd73f752d1553c2150e898b3b6","signature_b64":"Y04p1xbXdl7lzEZnYa1SiGo+5Hm6j9fNbzh72syxsXTUH5XDi/EZf2hBWnXSZ4TuHStEy9XTvIYTzXG55hBkCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:12:39.515152+00:00","payload":{"note":"Identifier '10.1016/s0031-3203(03)00003-5' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Z He, X Xu, and S Deng. 2003. Discovering cluster-based local outliers.Pattern Recognition36, 12 (2003), 2701–2712. doi:10.1016/S0031-3203(03)00003-5","arxiv_id":"2604.20255","detector":"doi_compliance","evidence":{"doi":"10.1016/s0031-3203(03)00003-5","arxiv_id":null,"ref_index":19,"raw_excerpt":"Z He, X Xu, and S Deng. 2003. Discovering cluster-based local outliers.Pattern Recognition36, 12 (2003), 2701–2712. doi:10.1016/S0031-3203(03)00003-5","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":19,"audited_at":"2026-05-20T02:08:57.327760Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/s0031-3203(03)00003-5","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"e0560a6d57f2c3eb85b16e81cb4f3b2dd2062597b196aaf60cd792933130c0fd","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.20255/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}