{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.12876","arxiv_id":"2605.12876","integrity":{"available":true,"endpoint":"/pith/2605.12876/integrity.json","summary":{"critical":0,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":0,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T11:01:24.317422Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T08:25:03.529036Z","findings_count":3},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-19T20:41:57.295146Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T09:38:43.966173Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2406.05113.10) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2406.05113.10","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-19T06:59:55.994099Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1162/colia) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1162/colia","detected_arxiv_id":null,"ref_index":18,"audited_at":"2026-05-19T06:59:55.994099Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2307.15043.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2307.15043.12","detected_arxiv_id":null,"ref_index":20,"audited_at":"2026-05-19T06:59:55.994099Z"}],"snapshot_sha256":"ee0c44e6fdc5084ce3ad5755acf2faeec54c3f081b31274d39d8f17a8313c405"},"events":[{"event_id":248,"event_type":"pith.integrity.v1","payload_sha256":"7dbd41f831760b0eb98e257b65ca75f4b8d112f4763b9fe2abfbb773fb88bc42","signature_b64":"UBbGAooaCZDvsxb03y/WGQiLiF1aaUkRNICTQ9VRk/5tbcyzhXH3JYLhuEsFveUWxc9FLVF73oO4xBnuZfb5CA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T07:01:53.695834+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2307.15043.12) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"doi: 10.48550/arXiv.2307. 15043. 12 Certified Robustness under Heterogeneous Perturbations A. Appendix A.1. Choice of Thresholdτ Randomized smoothing certifies robustness by bounding the smoothed classifier’s output under worst-case perturb","arxiv_id":"2605.12876","detector":"doi_compliance","evidence":{"ref_index":20,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"doi: 10.48550/arXiv.2307. 15043. 12 Certified Robustness under Heterogeneous Perturbations A. Appendix A.1. Choice of Thresholdτ Randomized smoothing certifies robustness by bounding the smoothed classifier’s output under worst-case perturb","reconstructed_doi":"10.48550/arXiv.2307.15043.12"},"severity":"advisory","ref_index":20,"audited_at":"2026-05-19T06:59:55.994099Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2307.15043.12","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"0e7f8b4f9126a875107a3048d659ca5222657b0b73543e4ea4823b8400899bbe","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":247,"event_type":"pith.integrity.v1","payload_sha256":"89340f414f1ad962e12f077642abb661a9f86203aeeadddae58b159fda0391f6","signature_b64":"mSE2t9BdbcPJkfmB9AphRRSmZ4B2cU2fx34/BtmyGwG8pRgXdPxs2o8M8Ng8NYCcqXxEreEVfIMEQdBEZFbkAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T07:01:53.694494+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1162/colia) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"doi: 10.1162/coli a 00476. Zhan, Q., Fang, R., Panchal, H. S., and Kang, D. Adaptive attacks break defenses against indirect prompt injection attacks on llm agents. InFindings of the Association for Computational Linguistics: NAACL,","arxiv_id":"2605.12876","detector":"doi_compliance","evidence":{"ref_index":18,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"doi: 10.1162/coli a 00476. Zhan, Q., Fang, R., Panchal, H. S., and Kang, D. Adaptive attacks break defenses against indirect prompt injection attacks on llm agents. InFindings of the Association for Computational Linguistics: NAACL,","reconstructed_doi":"10.1162/colia"},"severity":"advisory","ref_index":18,"audited_at":"2026-05-19T06:59:55.994099Z","event_type":"pith.integrity.v1","detected_doi":"10.1162/colia","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"a9e07f3f28e883bd066542d6200984e7667e4448a9256f86320efa2fc721b35a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":246,"event_type":"pith.integrity.v1","payload_sha256":"74ca52ea1b749c46020b03818e54931b12e4d45c1388c06d5d5a61f15503ecc0","signature_b64":"EzTpb6IGy/4FHop5JyP+dbOzMvTinpak9S8p3qX7ywtMA+RQeyayyFBt+HbE0v4YlaBxp8pcL9hBe4SH1LkoAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T07:01:53.692550+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2406.05113.10) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"doi: 10.48550/arXiv. 2406.05113. 10 Certified Robustness under Heterogeneous Perturbations Huang, Z., Chu, W., Li, L., Xu, C., and Li, B. Commit: Cer- tifying robustness of multi-sensor fusion systems against semantic attacks. InProceedings","arxiv_id":"2605.12876","detector":"doi_compliance","evidence":{"ref_index":7,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"doi: 10.48550/arXiv. 2406.05113. 10 Certified Robustness under Heterogeneous Perturbations Huang, Z., Chu, W., Li, L., Xu, C., and Li, B. Commit: Cer- tifying robustness of multi-sensor fusion systems against semantic attacks. InProceedings","reconstructed_doi":"10.48550/arXiv.2406.05113.10"},"severity":"advisory","ref_index":7,"audited_at":"2026-05-19T06:59:55.994099Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2406.05113.10","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"b9acc4eb62e60302dc737038a4db19923ec11fc4988e71622207cdc81356dcb6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.12876/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}