{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.10888","arxiv_id":"2605.10888","integrity":{"available":true,"endpoint":"/pith/2605.10888/integrity.json","summary":{"critical":2,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":2,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T05:02:01.007542Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T14:33:49.416787Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T10:31:17.350010Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T08:55:46.390545Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.5555/3463952.3464013Shields) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.5555/3463952.3464013Shields","detected_arxiv_id":null,"ref_index":15,"audited_at":"2026-05-19T08:55:46.390545Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/3709347.3743554' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/3709347.3743554","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-19T08:55:46.390545Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5555/3463952.3464107' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5555/3463952.3464107","detected_arxiv_id":null,"ref_index":40,"audited_at":"2026-05-19T08:55:46.390545Z"}],"snapshot_sha256":"41e9703176a6cf93f74f5751396f98ccaef6ec5a611957517aae45af84799688"},"events":[{"event_id":536,"event_type":"pith.integrity.v1","payload_sha256":"13f767621c5f5edda856b4fef2cbc2fda29b66cf0428b7d3c48401465ecd1599","signature_b64":"iBT8QtxIRe4vhVff30HXaPi6U+i+wUmsNEZ5kHs+tgsoMtPCbhXLUE9kTtf5z/hjqBNb7rrgQzXXraq1CRFSCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T08:56:57.114524+00:00","payload":{"note":"Identifier '10.5555/3463952.3464107' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Van Havermaet, S., Khaluf, Y., Simoens, P.: No more hand-tuning rewards: Masked constrained policy optimization for safe reinforcement learning. In: AAMAS. pp. 1344–1352 (2021).https://doi.org/10.5555/3463952.3464107","arxiv_id":"2605.10888","detector":"doi_compliance","evidence":{"doi":"10.5555/3463952.3464107","arxiv_id":null,"ref_index":40,"raw_excerpt":"Van Havermaet, S., Khaluf, Y., Simoens, P.: No more hand-tuning rewards: Masked constrained policy optimization for safe reinforcement learning. In: AAMAS. pp. 1344–1352 (2021).https://doi.org/10.5555/3463952.3464107","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":40,"audited_at":"2026-05-19T08:55:46.390545Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3463952.3464107","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"7854740c35121275d0679a29018331f48f543eb3ef0b2f77dec729a43539c80d","paper_version":2,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":535,"event_type":"pith.integrity.v1","payload_sha256":"c291da1b22091bf21155c71075b18353d0ee282e9b2acc7e0475a7b7590b2f62","signature_b64":"2ZU/wdK9E1UHSZSaAEQVqaJB1Z0RJ0zHzqCcqGq8fryQoUI6W7Nto1ZcBnGwTeDqlYjA0OEa6b3q50nGLxasAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T08:56:57.111813+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.5555/3463952.3464013Shields) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"ElSayed-Aly, I., Bharadwaj, S., Amato, C., Ehlers, R., Topcu, U., Feng, L.: Safe multi-agent reinforcement learning via shielding. In: AAMAS. p. 483–491 (2021). https://doi.org/10.5555/3463952.3464013 Shields to Guarantee Probabilistic Safe","arxiv_id":"2605.10888","detector":"doi_compliance","evidence":{"ref_index":15,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"ElSayed-Aly, I., Bharadwaj, S., Amato, C., Ehlers, R., Topcu, U., Feng, L.: Safe multi-agent reinforcement learning via shielding. In: AAMAS. p. 483–491 (2021). https://doi.org/10.5555/3463952.3464013 Shields to Guarantee Probabilistic Safe","reconstructed_doi":"10.5555/3463952.3464013Shields"},"severity":"advisory","ref_index":15,"audited_at":"2026-05-19T08:55:46.390545Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3463952.3464013Shields","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"08f7d9d16bc2ed256c52b05996a2b5550e7329a0131ebf54ea9b9e265e1da844","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":534,"event_type":"pith.integrity.v1","payload_sha256":"c7ef34b2dc9a59850300feca56f583b58f938a97314d2e609d2f06177b9b3bb3","signature_b64":"UrXfXhh8SQ2pMLVAmFkj4eknlAxvKEpgotfV2qeL/XnNOdpQPuqsZz3dnL+LU2DA1ujAN5iNMpjs/3grAOTyBw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T08:56:57.109224+00:00","payload":{"note":"Identifier '10.5555/3709347.3743554' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Brorholt, A.H., Larsen, K.G., Schilling, C.: Compositional shielding and rein- forcement learning for multi-agent systems. In: AAMAS. pp. 399–407. Interna- tional Foundation for Autonomous Agents and Multiagent Systems / ACM (2025). https:/","arxiv_id":"2605.10888","detector":"doi_compliance","evidence":{"doi":"10.5555/3709347.3743554","arxiv_id":null,"ref_index":7,"raw_excerpt":"Brorholt, A.H., Larsen, K.G., Schilling, C.: Compositional shielding and rein- forcement learning for multi-agent systems. In: AAMAS. pp. 399–407. Interna- tional Foundation for Autonomous Agents and Multiagent Systems / ACM (2025). https://doi.org/10.5555/3709347.3743554","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":7,"audited_at":"2026-05-19T08:55:46.390545Z","event_type":"pith.integrity.v1","detected_doi":"10.5555/3709347.3743554","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"78c2c88a57b733c8dc7a3b8e4dfa0105172168c2c2734e4ff83272571d00ef92","paper_version":2,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.10888/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}