{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.14207","arxiv_id":"2605.14207","integrity":{"available":true,"endpoint":"/pith/2605.14207/integrity.json","summary":{"critical":2,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":2,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-21T06:57:51.564086Z","findings_count":3},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T18:02:09.873825Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T06:31:22.711821Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-19T06:41:53.385357Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/s0166-4115(08' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/s0166-4115(08","detected_arxiv_id":null,"ref_index":64,"audited_at":"2026-05-19T05:48:54.671955Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ACCESS.2022.3208573.48) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/ACCESS.2022.3208573.48","detected_arxiv_id":null,"ref_index":89,"audited_at":"2026-05-19T05:48:54.671955Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1201/9781315800349-4' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1201/9781315800349-4","detected_arxiv_id":null,"ref_index":11,"audited_at":"2026-05-19T05:48:54.671955Z"}],"snapshot_sha256":"f4d0d05faa2399cd45120da759209cb9c2a697b67b23e2f5dc3a80b57039a396"},"events":[{"event_id":56,"event_type":"pith.integrity.v1","payload_sha256":"4dc3868dccd7ec41b24d66f943a41688dbbffc23cc372e6c9d8c1d84324e7374","signature_b64":"28NPAz8EjkcyKlothFyuuM4ExWZ21UiVYaWT+jI83ikMeYrd4OQW5YKXY0KgG86zPDbveG18mrgMyD0/AvYCDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:51:52.022773+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ACCESS.2022.3208573.48) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Lundberg, H., Mowla, N.I., Abedin, S.F., Thar, K., Mahmood, A., Gidlund, M., Raza, S., 2022. Experimental Analysis of Trustworthy In- Vehicle Intrusion Detection System Using eXplainable Artificial Intel- ligence (XAI). IEEE Access 10, 1028","arxiv_id":"2605.14207","detector":"doi_compliance","evidence":{"ref_index":89,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Lundberg, H., Mowla, N.I., Abedin, S.F., Thar, K., Mahmood, A., Gidlund, M., Raza, S., 2022. Experimental Analysis of Trustworthy In- Vehicle Intrusion Detection System Using eXplainable Artificial Intel- ligence (XAI). IEEE Access 10, 1028","reconstructed_doi":"10.1109/ACCESS.2022.3208573.48"},"severity":"advisory","ref_index":89,"audited_at":"2026-05-19T05:48:54.671955Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ACCESS.2022.3208573.48","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"620839183899cac9f099f95361827673bc7c97ada620e6a36ff837c77bbadcda","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":55,"event_type":"pith.integrity.v1","payload_sha256":"922b6542b94f750247881efc6591f4a2bc8639431a39b944e992cc39747e4e80","signature_b64":"1de6J9nbU4wl+lQmN3C8PEkWF8UrfSQq4sbXREjznW6CrTmKx+Dr5INoQtuI4VlaqM3PY2YhPeU6sM4/0UNaDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:51:52.020685+00:00","payload":{"note":"Identifier '10.1016/s0166-4115(08' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Hart, S.G., Staveland, L.E., 1988. Development of NASA-TLX (task load index): Results of empirical and theoretical research, in: Han- cock, P.A., Meshkati, N. (Eds.), Human Mental Workload. North- Holland, Elsevier, Amsterdam. volume 52 ofA","arxiv_id":"2605.14207","detector":"doi_compliance","evidence":{"doi":"10.1016/s0166-4115(08","arxiv_id":null,"ref_index":64,"raw_excerpt":"Hart, S.G., Staveland, L.E., 1988. Development of NASA-TLX (task load index): Results of empirical and theoretical research, in: Han- cock, P.A., Meshkati, N. (Eds.), Human Mental Workload. North- Holland, Elsevier, Amsterdam. volume 52 ofAdvances in Psychol- ogy, pp. 139–183. URL:https://doi.org/10.1016/S0166-4115(08) 62386-9, doi:10.1016/S0166-4115(08)62386-9. 45","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":64,"audited_at":"2026-05-19T05:48:54.671955Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/s0166-4115(08","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"5dcc742c35bc8c6ea4454c87bd7d57bcb9973b94c6b108103509986ef6d311f5","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":54,"event_type":"pith.integrity.v1","payload_sha256":"e557f468d62613c37aa6720bdb00a7317ec08143355501e1a539fc491cd291e2","signature_b64":"Q07Zx9GPgLpL2+56EugKuF/AAh4pMHub7dk9KF2lZlT4a83HYBaZH4gygixfLYOvLMtrXtI7zDvtmbEJ4+C2BA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T05:51:52.018382+00:00","payload":{"note":"Identifier '10.1201/9781315800349-4' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Bannon, L.J., 1991. From human factors to human actors: The role of psychology and human-computer interaction studies in system design, in: Greenbaum, J., Kyng, M. (Eds.), Design at Work: Cooperative Design of Computer Systems. Lawrence Erl","arxiv_id":"2605.14207","detector":"doi_compliance","evidence":{"doi":"10.1201/9781315800349-4","arxiv_id":null,"ref_index":11,"raw_excerpt":"Bannon, L.J., 1991. From human factors to human actors: The role of psychology and human-computer interaction studies in system design, in: Greenbaum, J., Kyng, M. (Eds.), Design at Work: Cooperative Design of Computer Systems. Lawrence Erlbaum Associates, Hillsdale, NJ, pp. 25–44. URL:https://doi.org/10.1201/9781315800349-4, doi:10.1201/9781315800349-4","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":11,"audited_at":"2026-05-19T05:48:54.671955Z","event_type":"pith.integrity.v1","detected_doi":"10.1201/9781315800349-4","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"f7b26ca10c205fd5565c0311462de8d1cb191ee8d37c4b49ca4dbca368222366","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.14207/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}