{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.20771","arxiv_id":"2604.20771","integrity":{"available":true,"endpoint":"/pith/2604.20771/integrity.json","summary":{"critical":0,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":0,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T01:36:57.250042Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TVT.2024.3402366.Gordon-Rodriguez) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/TVT.2024.3402366.Gordon-Rodriguez","detected_arxiv_id":null,"ref_index":3,"audited_at":"2026-05-20T01:36:57.250042Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TITS.2024.3509459.Alkhatib) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/TITS.2024.3509459.Alkhatib","detected_arxiv_id":null,"ref_index":2,"audited_at":"2026-05-20T01:36:57.250042Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TITS.2023.3271300.Yanmin) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/TITS.2023.3271300.Yanmin","detected_arxiv_id":null,"ref_index":8,"audited_at":"2026-05-20T01:36:57.250042Z"}],"snapshot_sha256":"8bdc24cdc71fe82c9b567636b2bfbc7aff5f90bb657d5614578b32f2072c9dd1"},"events":[{"event_id":4060,"event_type":"pith.integrity.v1","payload_sha256":"ac57d65e366ef6c7134078534b70bfd3b55c029d99026d26fe002cf167366768","signature_b64":"yBGA0QBWFUuEWu4unzrZaXwbclpaZpzdh5bVASLBk6eQ7OOcihQ5luUayOHz1C2ZXjB5VUggLNKz14lQo0LQAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.117247+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TITS.2023.3271300.Yanmin) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"http://dx.doi.org/10. 3390/electronics11223658. Yang, L., Moubayed, A., & Shami, A. (2021). MTH-ids: A multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet of Things Journal, 9(1), 616–632. Yang, T., Murguia","arxiv_id":"2604.20771","detector":"doi_compliance","evidence":{"ref_index":8,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"http://dx.doi.org/10. 3390/electronics11223658. Yang, L., Moubayed, A., & Shami, A. (2021). MTH-ids: A multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet of Things Journal, 9(1), 616–632. Yang, T., Murguia","reconstructed_doi":"10.1109/TITS.2023.3271300.Yanmin"},"severity":"advisory","ref_index":8,"audited_at":"2026-05-20T01:36:57.250042Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/TITS.2023.3271300.Yanmin","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"1572c7ff628b70975a4999b0e5bddd6a87e17eb38fa684707bd23bbc6ad55b86","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4059,"event_type":"pith.integrity.v1","payload_sha256":"f49186b155d37608d6b34c96e6ec62fef176b44f3179f9e5fa487bbb7db6c073","signature_b64":"7QN9vezA4J6SiuidYFTxsDnCg+j5o/w6Q+wHyl/Bp8WTnttR6LjXG+JBHKHrHj2a/pg+zjjI+ayg4GAqZHl7Dg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.115954+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TVT.2024.3402366.Gordon-Rodriguez) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Brown, C. E. (1998). Coefficient of variation. In Applied multivariate statistics in geohydrology and related sciences (pp. 155–157). Springer. Chen, R., Chen, X., & Zhao, J. (2024). Private and utility enhanced intrusion detection based on","arxiv_id":"2604.20771","detector":"doi_compliance","evidence":{"ref_index":3,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Brown, C. E. (1998). Coefficient of variation. In Applied multivariate statistics in geohydrology and related sciences (pp. 155–157). Springer. Chen, R., Chen, X., & Zhao, J. (2024). Private and utility enhanced intrusion detection based on","reconstructed_doi":"10.1109/TVT.2024.3402366.Gordon-Rodriguez"},"severity":"advisory","ref_index":3,"audited_at":"2026-05-20T01:36:57.250042Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/TVT.2024.3402366.Gordon-Rodriguez","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7cec0d30f279d74c31e078089ecbe49b9b09ef8231593d59450438ad59b002b6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4058,"event_type":"pith.integrity.v1","payload_sha256":"2ddbd6e9aef93a7ad63b904878b64a9896e760a4b514f1e112827dd43738510a","signature_b64":"UTcA7sf57wiw4JW/7jUo1kwpWeTvTyY08ulhOwEEul97vMouHAxV+G89Cxpq2zcDwZhcFz9rZxx7vj4WQ0FwBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.114482+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TITS.2024.3509459.Alkhatib) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Aliwa, E., Rana, O., Perera, C., & Burnap, P. (2021). Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys, 54(1), 1–37. Aljabri, W., Hamid, M. A., & Mosli, R. (2025a). Lightweight and adaptive data-driven intrusi","arxiv_id":"2604.20771","detector":"doi_compliance","evidence":{"ref_index":2,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Aliwa, E., Rana, O., Perera, C., & Burnap, P. (2021). Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys, 54(1), 1–37. Aljabri, W., Hamid, M. A., & Mosli, R. (2025a). Lightweight and adaptive data-driven intrusi","reconstructed_doi":"10.1109/TITS.2024.3509459.Alkhatib"},"severity":"advisory","ref_index":2,"audited_at":"2026-05-20T01:36:57.250042Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/TITS.2024.3509459.Alkhatib","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"61e007f2522ba0328197138fb4e42ae3095f78c242241c669f5627f497ae5eed","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.20771/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}