{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.06745","arxiv_id":"2605.06745","integrity":{"available":true,"endpoint":"/pith/2605.06745/integrity.json","summary":{"critical":1,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":1,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T12:42:03.997498Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T07:43:36.054533Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T18:31:19.257307Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T12:44:45.812567Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.12407/j.issn.2097-2075.2024.03.021) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.12407/j.issn.2097-2075.2024.03.021","detected_arxiv_id":null,"ref_index":8,"audited_at":"2026-05-19T12:44:45.812567Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.11873/j.issn.1004-0323.2024.3.0547' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.11873/j.issn.1004-0323.2024.3.0547","detected_arxiv_id":null,"ref_index":5,"audited_at":"2026-05-19T12:44:45.812567Z"}],"snapshot_sha256":"8b4548dea3b3248523b75eef52ee0d1cb4b85aa042ac54a0f1efed5ad5f88721"},"events":[{"event_id":1246,"event_type":"pith.integrity.v1","payload_sha256":"006f672a8bae852529225560fb377135f474e037ba2fd238e74c7bcf0c6f9148","signature_b64":"2sVv9m9YOTzXlUgrbs8dOEmaZSSUhdhdYSh2uNKlw6qRhRCSeBIcvdf2HUCqb+9qQ3FFFfNrCAG7w46+TKOWCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:47:04.023953+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.12407/j.issn.2097-2075.2024.03.021) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ren, P., Xu, X., Huang, A., et al.: Optimizing the objective detection for RISC-V architecture. Artificial Intelligence Security. 3(3), 21–33 (2024). https://doi.org/10.12407/j.issn.2097- 2075.2024.03.021","arxiv_id":"2605.06745","detector":"doi_compliance","evidence":{"ref_index":8,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ren, P., Xu, X., Huang, A., et al.: Optimizing the objective detection for RISC-V architecture. Artificial Intelligence Security. 3(3), 21–33 (2024). https://doi.org/10.12407/j.issn.2097- 2075.2024.03.021","reconstructed_doi":"10.12407/j.issn.2097-2075.2024.03.021"},"severity":"advisory","ref_index":8,"audited_at":"2026-05-19T12:44:45.812567Z","event_type":"pith.integrity.v1","detected_doi":"10.12407/j.issn.2097-2075.2024.03.021","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"dda74e75216ed759e010af73c6347266a2ac3aea87abcb184b1c513daf2f29d5","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1245,"event_type":"pith.integrity.v1","payload_sha256":"9f9390e865ffbe1d4f8006640090e26422f58df60b26fe9ecf9d607a125ae78c","signature_b64":"xFrOUdykcSP9UkddDeSQGtfyM/KB4eRHxsIYOH73Tl9WM9RlVXW+RJls8QBXk3ZX7tKfIw3haMfE8j+lsfBkDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:47:04.022701+00:00","payload":{"note":"Identifier '10.11873/j.issn.1004-0323.2024.3.0547' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Wang, W., Cheng, Y., Zhou, Y., et al.: Research on lightweight network for rapid detection of remote sensing image targets based on YOLO. Remote Sens. Technol. Appl. 39(3), 547–556 (2024). https://doi.org/10.11873/j.issn.1004-0323.2024.3.05","arxiv_id":"2605.06745","detector":"doi_compliance","evidence":{"doi":"10.11873/j.issn.1004-0323.2024.3.0547","arxiv_id":null,"ref_index":5,"raw_excerpt":"Wang, W., Cheng, Y., Zhou, Y., et al.: Research on lightweight network for rapid detection of remote sensing image targets based on YOLO. Remote Sens. Technol. Appl. 39(3), 547–556 (2024). https://doi.org/10.11873/j.issn.1004-0323.2024.3.0547","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":5,"audited_at":"2026-05-19T12:44:45.812567Z","event_type":"pith.integrity.v1","detected_doi":"10.11873/j.issn.1004-0323.2024.3.0547","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"25b5903d59aac8987d31dab6c1c6b17d7b00e9ee0f4a2bb0d15dd5450210b167","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.06745/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}