{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.17325","arxiv_id":"2605.17325","integrity":{"available":true,"endpoint":"/pith/2605.17325/integrity.json","summary":{"critical":0,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":0,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-21T00:01:30.849049Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T23:54:42.966388Z","findings_count":1},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T22:02:14.820353Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-19T21:33:23.746834Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/AC-CESS.2024.3454211) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/AC-CESS.2024.3454211","detected_arxiv_id":null,"ref_index":3,"audited_at":"2026-05-19T23:52:41.527262Z"}],"snapshot_sha256":"aecf59a7802183d2603f66640f2d6fabfce735e40ef3947fa0396ae22b428b9c"},"events":[{"event_id":3722,"event_type":"pith.integrity.v1","payload_sha256":"90e6b6fba37394df25021f01e20a82ebbec967a8f6861167289cffdfa0925762","signature_b64":"JKHbdblncoHoqnbswZ3jvNDETMPW5VE+qR5R6hy//eZWWMqduf3YflSw40h3z1PTs4Mzji0tBc4p3uNmdlOXAg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T23:57:28.097465+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/AC-CESS.2024.3454211) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"A. Vyas, P .-C. Lin, R.-H. Hwang and M. Tripathi, ‘‘Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Sur- vey’’,IEEE Access, vol. 12, pp. 127018-127050, 2024, doi: 10.1109/AC- CESS.2024.3454211","arxiv_id":"2605.17325","detector":"doi_compliance","evidence":{"ref_index":3,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"A. Vyas, P .-C. Lin, R.-H. Hwang and M. Tripathi, ‘‘Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Sur- vey’’,IEEE Access, vol. 12, pp. 127018-127050, 2024, doi: 10.1109/AC- CESS.2024.3454211","reconstructed_doi":"10.1109/AC-CESS.2024.3454211"},"severity":"advisory","ref_index":3,"audited_at":"2026-05-19T23:52:41.527262Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/AC-CESS.2024.3454211","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7457329776d0eb4e3c2f95cb923025346890bd8f4575b110722534b568b7bd9a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.17325/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}