{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.03812","arxiv_id":"2605.03812","integrity":{"available":true,"endpoint":"/pith/2605.03812/integrity.json","summary":{"critical":0,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":0,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T13:33:43.033413Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T00:31:20.957926Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T15:01:55.599605Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-319-47099-39) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-319-47099-39","detected_arxiv_id":null,"ref_index":79,"audited_at":"2026-05-19T15:01:55.599605Z"}],"snapshot_sha256":"444b8907c2899ce86771ca067a2e61c9e5194f65e5db0c1bbab70b27793d01f4"},"events":[{"event_id":1763,"event_type":"pith.integrity.v1","payload_sha256":"d200f630ba595da1952ddb4a98cb68e81254e1c8a39797acbb4eb51b713381cb","signature_b64":"4ldd4BU/fHY5ZVbg5xmOsrqNeT2nHARWEq5ga2jAGrPBtJIOBLbFv8GTevbCNIBiKXHFDLWl+QOvwiRxt+bzBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T15:02:08.713016+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-319-47099-39) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"B. Di, J. Sun, and H. Chen, “A study of overflow vulnerabilities on GPUs,” inNetwork and Parallel Computing: 13th IFIP WG 10.3 International Conference, NPC 2016, Xi’an, China, October 28-29, 2016, Proceedings. Berlin, Heidelberg: Springer-","arxiv_id":"2605.03812","detector":"doi_compliance","evidence":{"ref_index":79,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"B. Di, J. Sun, and H. Chen, “A study of overflow vulnerabilities on GPUs,” inNetwork and Parallel Computing: 13th IFIP WG 10.3 International Conference, NPC 2016, Xi’an, China, October 28-29, 2016, Proceedings. Berlin, Heidelberg: Springer-","reconstructed_doi":"10.1007/978-3-319-47099-39"},"severity":"advisory","ref_index":79,"audited_at":"2026-05-19T15:01:55.599605Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-319-47099-39","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"de84e79cfd7c763195812c79927ec97d9cb3d58780d2f03021d48e6ef3efbe5f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.03812/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}