{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.20833","arxiv_id":"2604.20833","integrity":{"available":true,"endpoint":"/pith/2604.20833/integrity.json","summary":{"critical":0,"advisory":9,"informational":0,"by_detector":{"doi_compliance":{"total":9,"critical":0,"advisory":9,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T01:33:01.649275Z","findings_count":9}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-72215-8_12.url:https://doi.org/10.1007/978-3-031-72215-8_12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-031-72215-8_12.url:https://doi.org/10.1007/978-3-031-72215-8_12","detected_arxiv_id":null,"ref_index":56,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.hybadv.2024.100277.url:https://www.sciencedirect.com/science/article/pii/S2773207X24001386) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.hybadv.2024.100277.url:https://www.sciencedirect.com/science/article/pii/S2773207X24001386","detected_arxiv_id":null,"ref_index":1,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3649447.url:https://doi.org/10.1145/3649447) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3649447.url:https://doi.org/10.1145/3649447","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.tics.2020.09.004.url:https://www.sciencedirect.com/science/article/pii/S1364661320302199) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.tics.2020.09.004.url:https://www.sciencedirect.com/science/article/pii/S1364661320302199","detected_arxiv_id":null,"ref_index":8,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2024.findings-acl.443.url:https://aclanthology.org/2024.findings-acl.443/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.18653/v1/2024.findings-acl.443.url:https://aclanthology.org/2024.findings-acl.443/","detected_arxiv_id":null,"ref_index":21,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect.com/science/article/pii/S0896627317305093) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect.com/science/article/pii/S0896627317305093","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-030-31760-7_2.url:https://doi.org/10.1007/978-3-030-31760-7_2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-030-31760-7_2.url:https://doi.org/10.1007/978-3-030-31760-7_2","detected_arxiv_id":null,"ref_index":22,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.findings-acl.1311.url:https://aclanthology.org/2025.findings-acl.1311/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.18653/v1/2025.findings-acl.1311.url:https://aclanthology.org/2025.findings-acl.1311/","detected_arxiv_id":null,"ref_index":14,"audited_at":"2026-05-20T01:33:01.649275Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2024.acl-long.847.url:https://aclanthology.org/2024.acl-long.847/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.18653/v1/2024.acl-long.847.url:https://aclanthology.org/2024.acl-long.847/","detected_arxiv_id":null,"ref_index":39,"audited_at":"2026-05-20T01:33:01.649275Z"}],"snapshot_sha256":"8c6e6aaf1987e3b09403b99f5a23bab2a3699efcd1e699b0080f96c479632dc8"},"events":[{"event_id":4022,"event_type":"pith.integrity.v1","payload_sha256":"1297e112694e6d5f71db9fa8b283f10533ac4f2db034a9d007a0268b8ae3e722","signature_b64":"lSpKvRJHSyIgu/0AcX9M034ZPY8TpxA1dWC1QziBrupgvtEvAKD32ty0YZt5SDspGFdCRrdviOxhHwnrruNVAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.061063+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-72215-8_12.url:https://doi.org/10.1007/978-3-031-72215-8_12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ramatoulaye Diallo, Codjo Edalo, and O. Olawale Awe. “Machine Learning Evaluation of Im- balanced Health Data: A Comparative Analysis of Balanced Accuracy, MCC, and F1 Score”. In: Practical Statistical Learning and Data Science Methods: Cas","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":56,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ramatoulaye Diallo, Codjo Edalo, and O. Olawale Awe. “Machine Learning Evaluation of Im- balanced Health Data: A Comparative Analysis of Balanced Accuracy, MCC, and F1 Score”. In: Practical Statistical Learning and Data Science Methods: Cas","reconstructed_doi":"10.1007/978-3-031-72215-8_12.url:https://doi.org/10.1007/978-3-031-72215-8_12"},"severity":"advisory","ref_index":56,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-72215-8_12.url:https://doi.org/10.1007/978-3-031-72215-8_12","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"b87e7ad9929eed15776880792dcf11fcfd0fc7f21e806edcb166a700a6e6f2b4","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4021,"event_type":"pith.integrity.v1","payload_sha256":"95962cc72d779bf4ae7b5bd648f4c373fb1ff3f7f43ce2f13bde1ecfd773ad1c","signature_b64":"3lXOWOc0f+1gF/uXdM9XkkQP9Nm7MMd+ICQd0647ZgeEpIKH8jQk3JE3jn7r6kE6dhVdih6t2v/Yq5LORhxQAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.059618+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2024.acl-long.847.url:https://aclanthology.org/2024.acl-long.847/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Zhuang Chen et al. “ToMBench: Benchmarking Theory of Mind in Large Language Models”. In: Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Ed. by Lun-Wei Ku, Andre Martins, and ","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":39,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Zhuang Chen et al. “ToMBench: Benchmarking Theory of Mind in Large Language Models”. In: Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Ed. by Lun-Wei Ku, Andre Martins, and ","reconstructed_doi":"10.18653/v1/2024.acl-long.847.url:https://aclanthology.org/2024.acl-long.847/"},"severity":"advisory","ref_index":39,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2024.acl-long.847.url:https://aclanthology.org/2024.acl-long.847/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e15756d80f52e7e0e71e9ddefbd5dfe2358bbd36afcce5532cc0ee0b4f614a58","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4020,"event_type":"pith.integrity.v1","payload_sha256":"ed058703aaa4bc49fc7f5d58f6d7d0b0cdbdd925de1f3a4052752a94dcd5ebc1","signature_b64":"j1fFBcjR7Cz6QQPJ9AY4Y2GaRlzKWABqjlb1Q34eE6o3Cj1E0gwZV7f5Kb6zJz7s20cHDNKBZM8fSfXGUUlDAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.057949+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-030-31760-7_2.url:https://doi.org/10.1007/978-3-030-31760-7_2) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Emilio Rafael Balda, Arash Behboodi, and Rudolf Mathar. “Adversarial Examples in Deep Neural Networks: An Overview”. In:Deep Learning: Algorithms and Applications. Ed. by Witold Pedrycz and Shyi-Ming Chen. Cham: Springer International Publi","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":22,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Emilio Rafael Balda, Arash Behboodi, and Rudolf Mathar. “Adversarial Examples in Deep Neural Networks: An Overview”. In:Deep Learning: Algorithms and Applications. Ed. by Witold Pedrycz and Shyi-Ming Chen. Cham: Springer International Publi","reconstructed_doi":"10.1007/978-3-030-31760-7_2.url:https://doi.org/10.1007/978-3-030-31760-7_2"},"severity":"advisory","ref_index":22,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-030-31760-7_2.url:https://doi.org/10.1007/978-3-030-31760-7_2","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"5f96206b47a9d5b66fe2fabc7ffd33da863ee68fd3c7236f7b02952340dc90e2","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4019,"event_type":"pith.integrity.v1","payload_sha256":"a1dd0d3d44d05f2e43d6ab24fbb1470dc1c209f62bd648cd0ce7747839cf2d92","signature_b64":"Qewwpa0wlYDo3SsqLuZAdjTKuHL2kTxbUW+xlBRO40+LaDRAmiYZJv5krYcdbSqqNsbgpVJTfgO8izt4kyccDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.056613+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2024.findings-acl.443.url:https://aclanthology.org/2024.findings-acl.443/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Zihao Xu et al. “A Comprehensive Study of Jailbreak Attack versus Defense for Large Language Models”. In:Findings of the Association for Computational Linguistics: ACL 2024. Ed. by Lun- Wei Ku, Andre Martins, and Vivek Srikumar. Bangkok, Th","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":21,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Zihao Xu et al. “A Comprehensive Study of Jailbreak Attack versus Defense for Large Language Models”. In:Findings of the Association for Computational Linguistics: ACL 2024. Ed. by Lun- Wei Ku, Andre Martins, and Vivek Srikumar. Bangkok, Th","reconstructed_doi":"10.18653/v1/2024.findings-acl.443.url:https://aclanthology.org/2024.findings-acl.443/"},"severity":"advisory","ref_index":21,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2024.findings-acl.443.url:https://aclanthology.org/2024.findings-acl.443/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"47c465ecc0f27313d6527194bf072bcb6ba357f6f2478562cb15f91c866509e9","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4018,"event_type":"pith.integrity.v1","payload_sha256":"956b47b22f61084357d1d18be24de03771fe122c022631608dd3535c0776393e","signature_b64":"tve0+BvqEWOPx2L5pcvYFShfrtFy60bZwgEBx4Cd7cmgN02/Vzbr445B51LIk9ydA6C/m06h5fQa6ZNR4gOgDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.054992+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.findings-acl.1311.url:https://aclanthology.org/2025.findings-acl.1311/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Yifan Jiang et al. “Red Queen: Exposing Latent Multi-Turn Risks in Large Language Models”. In: Findings of the Association for Computational Linguistics: ACL 2025. Ed. by Wanxiang Che et al. Vienna, Austria: Association for Computational Li","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":14,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Yifan Jiang et al. “Red Queen: Exposing Latent Multi-Turn Risks in Large Language Models”. In: Findings of the Association for Computational Linguistics: ACL 2025. Ed. by Wanxiang Che et al. Vienna, Austria: Association for Computational Li","reconstructed_doi":"10.18653/v1/2025.findings-acl.1311.url:https://aclanthology.org/2025.findings-acl.1311/"},"severity":"advisory","ref_index":14,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.findings-acl.1311.url:https://aclanthology.org/2025.findings-acl.1311/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"32a37d8cff9ecc58a6f290ce94178015f383ac7c66f44c6ea3a3943068800f67","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4017,"event_type":"pith.integrity.v1","payload_sha256":"e3383edbe705c112b675d01fb4ff63bab7fd4e40c05651afd4adb7e9e4facf46","signature_b64":"stNjWBdHX62H2F6MB9QQuGu0zLWBL3piq7ixiA7hMV6s+BHn0eaAXdvIre7LRr9E4aTkjSjPEHpPmC2GbZKnCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.053169+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect.com/science/article/pii/S0896627317305093) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Demis Hassabis et al. “Neuroscience-Inspired Artificial Intelligence”. In:Neuron95.2 (2017), pp. 245– 258.issn: 0896-6273.doi:10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect. com/science/article/pii/S0896627317305093","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":9,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Demis Hassabis et al. “Neuroscience-Inspired Artificial Intelligence”. In:Neuron95.2 (2017), pp. 245– 258.issn: 0896-6273.doi:10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect. com/science/article/pii/S0896627317305093","reconstructed_doi":"10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect.com/science/article/pii/S0896627317305093"},"severity":"advisory","ref_index":9,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.neuron.2017.06.011.url:https://www.sciencedirect.com/science/article/pii/S0896627317305093","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4b08bd7f0103815b44ac120e3861bbc23f942bf0b75980245218e86ba71bd509","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4016,"event_type":"pith.integrity.v1","payload_sha256":"a15fd87ca6cc2064868b325c2467302bd0a9accd90ccf82bbdec777fd938f00a","signature_b64":"XjnWUab7eQ3r6F33YGclodlpnVcNLZHBrukfr9Fr//5QHVFfTLfWlLrOloHY9xXE4J+05oMTbTijmTocMxAeAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.050203+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.tics.2020.09.004.url:https://www.sciencedirect.com/science/article/pii/S1364661320302199) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Raia Hadsell et al. “Embracing Change: Continual Learning in Deep Neural Networks”. In:Trends in Cognitive Sciences24.12 (2020), pp. 1028–1040.issn: 1364-6613.doi:10.1016/j.tics.2020. 09.004.url:https://www.sciencedirect.com/science/article","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":8,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Raia Hadsell et al. “Embracing Change: Continual Learning in Deep Neural Networks”. In:Trends in Cognitive Sciences24.12 (2020), pp. 1028–1040.issn: 1364-6613.doi:10.1016/j.tics.2020. 09.004.url:https://www.sciencedirect.com/science/article","reconstructed_doi":"10.1016/j.tics.2020.09.004.url:https://www.sciencedirect.com/science/article/pii/S1364661320302199"},"severity":"advisory","ref_index":8,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.tics.2020.09.004.url:https://www.sciencedirect.com/science/article/pii/S1364661320302199","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7105ceb9e1c2321e4ae22036538cd65c1abc65b6712aaf3470147e39eaee04c6","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4015,"event_type":"pith.integrity.v1","payload_sha256":"b109eef009307825f82b0b15d0ac9994c6c25ea1bc052519303f8823fa56ece9","signature_b64":"3PaVLVWxV3HYgNSbHQ69kC4eoQm5dA9SggRZa84j2pCwgMEZp8yIYCf9uz59tJ9D1SOXnl4SXwutvU8laN2PDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.045695+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3649447.url:https://doi.org/10.1145/3649447) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Fei Zhao, Chengcui Zhang, and Baocheng Geng. “Deep Multimodal Data Fusion”. In:ACM Com- put. Surv.56.9 (Apr. 2024).issn: 0360-0300.doi:10.1145/3649447.url:https://doi.org/10. 1145/3649447","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":7,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Fei Zhao, Chengcui Zhang, and Baocheng Geng. “Deep Multimodal Data Fusion”. In:ACM Com- put. Surv.56.9 (Apr. 2024).issn: 0360-0300.doi:10.1145/3649447.url:https://doi.org/10. 1145/3649447","reconstructed_doi":"10.1145/3649447.url:https://doi.org/10.1145/3649447"},"severity":"advisory","ref_index":7,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3649447.url:https://doi.org/10.1145/3649447","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"2982f160493fe0895ef894729f4d6eaa042ed95dac2a984d8ae06c8e333a7c32","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4014,"event_type":"pith.integrity.v1","payload_sha256":"9e368e37e05e15c49f382f3b8927d5f4cf7127d61c1a0dcbdfc3edc9f72eb9ff","signature_b64":"wsm+i4636OC0+qw9ACmLU24rtRhXwKri/zNfiwghVEcfH9wUzIMQP3guMfvR6gR+Ewo17IN5pkWDfHJFT8IaCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T01:37:31.028629+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.hybadv.2024.100277.url:https://www.sciencedirect.com/science/article/pii/S2773207X24001386) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Adib Bin Rashid and MD Ashfakul Karim Kausik. “AI revolutionizing industries worldwide: A comprehensive overview of its diverse applications”. In:Hybrid Advances7 (2024), p. 100277.issn: 2773-207X.doi:10.1016/j.hybadv.2024.100277.url:https:","arxiv_id":"2604.20833","detector":"doi_compliance","evidence":{"ref_index":1,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Adib Bin Rashid and MD Ashfakul Karim Kausik. “AI revolutionizing industries worldwide: A comprehensive overview of its diverse applications”. In:Hybrid Advances7 (2024), p. 100277.issn: 2773-207X.doi:10.1016/j.hybadv.2024.100277.url:https:","reconstructed_doi":"10.1016/j.hybadv.2024.100277.url:https://www.sciencedirect.com/science/article/pii/S2773207X24001386"},"severity":"advisory","ref_index":1,"audited_at":"2026-05-20T01:33:01.649275Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.hybadv.2024.100277.url:https://www.sciencedirect.com/science/article/pii/S2773207X24001386","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"1740da45467ac21cbcae31e620a85d72854910d7abc6fe683eabe4059584b911","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.20833/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}