{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.06188","arxiv_id":"2605.06188","integrity":{"available":true,"endpoint":"/pith/2605.06188/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T13:02:04.251764Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T08:35:33.770283Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T19:01:19.232099Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T12:54:18.608593Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.emnlp-main.165.URLhttps://aclanthology.org/2025.emnlp-main.165/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.18653/v1/2025.emnlp-main.165.URLhttps://aclanthology.org/2025.emnlp-main.165/","detected_arxiv_id":null,"ref_index":25,"audited_at":"2026-05-19T12:54:18.608593Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2509.07430.A) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2509.07430.A","detected_arxiv_id":null,"ref_index":38,"audited_at":"2026-05-19T12:54:18.608593Z"}],"snapshot_sha256":"0ee0ef5cd39e2e8953ba3f1a8ce7c25c0073abbc31e0b7f4c4a776b483ce812c"},"events":[{"event_id":1394,"event_type":"pith.integrity.v1","payload_sha256":"02a14b04b20cc842b3b4a6c199cbfd15ed34d9d6449306cc1bca1a1eddf3957d","signature_b64":"N+bRIX/eg1+dnjPOW09J61PRZryWR1kj0S1DO0PvsNBQ28DytxwRsCi6p6+vJ57SgqrR0feE6qRvPVA8PZ50CA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:57:04.186910+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2509.07430.A) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Long Li, Zhijian Zhou, Jiaran Hao, Jason Klein Liu, Yanting Miao, Wei Pang, Xiaoyu Tan, Wei Chu, Zhe Wang, Shirui Pan, Chao Qu, and Yuan Qi. The choice of divergence: A neglected key to mitigating diversity collapse in reinforcement learnin","arxiv_id":"2605.06188","detector":"doi_compliance","evidence":{"ref_index":38,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Long Li, Zhijian Zhou, Jiaran Hao, Jason Klein Liu, Yanting Miao, Wei Pang, Xiaoyu Tan, Wei Chu, Zhe Wang, Shirui Pan, Chao Qu, and Yuan Qi. The choice of divergence: A neglected key to mitigating diversity collapse in reinforcement learnin","reconstructed_doi":"10.48550/arXiv.2509.07430.A"},"severity":"advisory","ref_index":38,"audited_at":"2026-05-19T12:54:18.608593Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2509.07430.A","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"9b0f51ba8a71e0328537aea083157c2390b22eb50255ac0141b76d7be061ce8f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1393,"event_type":"pith.integrity.v1","payload_sha256":"1ec7d34881b96357f7847248ac014a7100b70bbca6927548e153b6f9535ec54b","signature_b64":"oAj2I9e2lVY+HIaMtyZlN0zq/HSXey0KNxUH/taTOJ2xDFAUp7iIfG2rLpoLVs7pfZF2Ks6UwtqFfilypNjLDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:57:04.185682+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.emnlp-main.165.URLhttps://aclanthology.org/2025.emnlp-main.165/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Heming Xia, Chak Tou Leong, Wenjie Wang, Yongqi Li, and Wenjie Li. Tokenskip: Controllable chain-of-thought compression in LLMs. In Christos Christodoulopoulos, Tanmoy Chakraborty, Carolyn Rose, and Violet Peng, editors,Proceedings of the 2","arxiv_id":"2605.06188","detector":"doi_compliance","evidence":{"ref_index":25,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Heming Xia, Chak Tou Leong, Wenjie Wang, Yongqi Li, and Wenjie Li. Tokenskip: Controllable chain-of-thought compression in LLMs. In Christos Christodoulopoulos, Tanmoy Chakraborty, Carolyn Rose, and Violet Peng, editors,Proceedings of the 2","reconstructed_doi":"10.18653/v1/2025.emnlp-main.165.URLhttps://aclanthology.org/2025.emnlp-main.165/"},"severity":"advisory","ref_index":25,"audited_at":"2026-05-19T12:54:18.608593Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.emnlp-main.165.URLhttps://aclanthology.org/2025.emnlp-main.165/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"e39301ad1698157f409d81772643e135273e2c8ee476f55461dab6142c285b7c","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.06188/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}