{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.18484","arxiv_id":"2605.18484","integrity":{"available":true,"endpoint":"/pith/2605.18484/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-21T09:39:02.905859Z","findings_count":2},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-21T09:31:39.804276Z","findings_count":0},{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-21T00:42:17.234375Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-20T00:33:33.540924Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3510487.3510494.Accessed) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3510487.3510494.Accessed","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-20T09:32:44.887549Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/s12525-024-00714-2.Accessed) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/s12525-024-00714-2.Accessed","detected_arxiv_id":null,"ref_index":7,"audited_at":"2026-05-20T09:32:44.887549Z"}],"snapshot_sha256":"1a6dccaaf2ec40026964d22d51661030f2336c502ce63f46c35464c3de664a47"},"events":[{"event_id":4977,"event_type":"pith.integrity.v1","payload_sha256":"bef2be599402de614d6e08854e0b089574b64ae389081ed3559b5d8b6b40b6a4","signature_b64":"GMfmgXoUmvSw8kWnYBYEsoXQMtNxqS1TeoJ2HLgxyD9z1V1sEjI0gaya8q0WiVp022hKo91JvRie/Js0p0aCAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T09:32:50.930157+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3510487.3510494.Accessed) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"M. Froehlich, P. Hulm, and F. Alt. Under pressure: A user-centered threat model for cryptocurrency owners. InProceedings of the 4th International Conference on Blockchain Technology and Applications (ICBTA 2021), pages 39–50. ACM, 2021. doi","arxiv_id":"2605.18484","detector":"doi_compliance","evidence":{"ref_index":9,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"M. Froehlich, P. Hulm, and F. Alt. Under pressure: A user-centered threat model for cryptocurrency owners. InProceedings of the 4th International Conference on Blockchain Technology and Applications (ICBTA 2021), pages 39–50. ACM, 2021. doi","reconstructed_doi":"10.1145/3510487.3510494.Accessed"},"severity":"advisory","ref_index":9,"audited_at":"2026-05-20T09:32:44.887549Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3510487.3510494.Accessed","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"453e17d26fe19f4cbfa291ac78e67191d4bed71e9ad230d7d3cce61ac193db47","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4976,"event_type":"pith.integrity.v1","payload_sha256":"aa89f97a22067ba076238c247f0399b376d285a20b81204030c4acfb1d984f51","signature_b64":"Nu1HGVz/hkis0O6fAccbf2bWTLg2dzv4CpRAX3WAYpo19dJPu9+XRaKmGskaM/qjUV6adqHDCaoesJFHflZxCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T09:32:50.928975+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/s12525-024-00714-2.Accessed) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"S. Hägele. Centralized exchanges vs. decentralized exchanges in cryptocurrency markets: A systematic literature review.Electronic Markets, 34(33), 2024. doi: 10.1007/s12525-024-0 0714-2. Accessed: 13 Feb 2026","arxiv_id":"2605.18484","detector":"doi_compliance","evidence":{"ref_index":7,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"S. Hägele. Centralized exchanges vs. decentralized exchanges in cryptocurrency markets: A systematic literature review.Electronic Markets, 34(33), 2024. doi: 10.1007/s12525-024-0 0714-2. Accessed: 13 Feb 2026","reconstructed_doi":"10.1007/s12525-024-00714-2.Accessed"},"severity":"advisory","ref_index":7,"audited_at":"2026-05-20T09:32:44.887549Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/s12525-024-00714-2.Accessed","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"c6d3669c6a6503c77adf09a2700ba45b3b2071b125a75c81413532fa2c15d2c9","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.18484/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}