{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.05935","arxiv_id":"2605.05935","integrity":{"available":true,"endpoint":"/pith/2605.05935/integrity.json","summary":{"critical":1,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":1,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T13:22:04.408040Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T08:40:12.543228Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T19:31:19.374784Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T13:06:57.098265Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/978-3-319-11439-2_' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/978-3-319-11439-2_","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-19T13:06:57.098265Z"}],"snapshot_sha256":"3abff52a6772b9fb65e22c310784dc52b54de6415f958b2cc8b23a407a8bd764"},"events":[{"event_id":1425,"event_type":"pith.integrity.v1","payload_sha256":"979917f0b09187fc71afa186209d53c4ac623d9ea6724781d4a5513290f1fabc","signature_b64":"zXDagv1o6Dmwk5Z3hRy7GJn0XeUcfX2bBm3FAmJGKZfBuUpe2uYr3E/dn5N38avW162E9PPg6FH941aBeQJQDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T13:07:04.481297+00:00","payload":{"note":"Identifier '10.1007/978-3-319-11439-2_' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Proceedings, volume 8762 ofLecture Notes in Computer Science, pages112–124.Springer, 2014.doi:10.1007/978-3-319-11439-2_","arxiv_id":"2605.05935","detector":"doi_compliance","evidence":{"doi":"10.1007/978-3-319-11439-2_","arxiv_id":null,"ref_index":9,"raw_excerpt":"Proceedings, volume 8762 ofLecture Notes in Computer Science, pages112–124.Springer, 2014.doi:10.1007/978-3-319-11439-2_","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":9,"audited_at":"2026-05-19T13:06:57.098265Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-319-11439-2_","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"c35f49f2e0938602d01863d21befc38e0160006a814e8d7f07a1227acdeec8e6","paper_version":2,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.05935/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}