{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.09033","arxiv_id":"2605.09033","integrity":{"available":true,"endpoint":"/pith/2605.09033/integrity.json","summary":{"critical":1,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":1,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T08:22:01.731241Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:38:50.422746Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T13:31:19.305443Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T10:32:52.510765Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/tkde.2022.3201246' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/tkde.2022.3201246","detected_arxiv_id":null,"ref_index":31,"audited_at":"2026-05-19T10:32:52.510765Z"}],"snapshot_sha256":"130c237effb6212aa4c3ed7928d971ff093c3e5d1b0ac1cf2aa52bac1dcb1f36"},"events":[{"event_id":850,"event_type":"pith.integrity.v1","payload_sha256":"62a3e13c0691c6178da5900da38c1f7c395f61c4205687cc5a32efa77b3332b0","signature_b64":"O5sVVrOFnlN9XlmNfFpsPX4TbWXdJFBrGS/HFDM7CDK9IX8lStDzI5fTwYBJiLM5xsUnLHUa3KmyPNUVw5AZAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T10:36:59.538523+00:00","payload":{"note":"Identifier '10.1109/tkde.2022.3201246' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"L. Sun, Y . Dou, C. Yang, K. Zhang, J. Wang, P. S. Yu, L. He, and B. Li, “Adversarial attack and defense on graph data: A survey,”IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 8, pp. 7693–7711, 2022. [Online]. Available:","arxiv_id":"2605.09033","detector":"doi_compliance","evidence":{"doi":"10.1109/tkde.2022.3201246","arxiv_id":null,"ref_index":31,"raw_excerpt":"L. Sun, Y . Dou, C. Yang, K. Zhang, J. Wang, P. S. Yu, L. He, and B. Li, “Adversarial attack and defense on graph data: A survey,”IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 8, pp. 7693–7711, 2022. [Online]. Available: https://doi.org/10.1109/TKDE.2022.3201246","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":31,"audited_at":"2026-05-19T10:32:52.510765Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/tkde.2022.3201246","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"263a17133d3323c20effae9d058154d1feef54bae364943b83139e4bf0933c6f","paper_version":2,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.09033/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}