{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.19233","arxiv_id":"2605.19233","integrity":{"available":true,"endpoint":"/pith/2605.19233/integrity.json","summary":{"critical":1,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":1,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-21T04:42:20.723303Z","findings_count":0},{"name":"citation_quote_validity","version":"0.1.0","status":"completed","ran_at":"2026-05-20T23:51:23.961640Z","findings_count":0},{"name":"cited_work_retraction","version":"1.0.0","status":"completed","ran_at":"2026-05-20T16:52:54.789398Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-20T05:31:22.764944Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T05:29:27.286712Z","findings_count":2},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-20T02:33:37.134219Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.engappai.2024.10796110) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.engappai.2024.10796110","detected_arxiv_id":null,"ref_index":16,"audited_at":"2026-05-20T05:29:27.286712Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1109/jiot.2020.2973140' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1109/jiot.2020.2973140","detected_arxiv_id":null,"ref_index":13,"audited_at":"2026-05-20T05:29:27.286712Z"}],"snapshot_sha256":"20aca7cd9bf4bb5d7b2820f74c8af066a70aaa39044d9081a7fbd993f76a51ba"},"events":[{"event_id":4806,"event_type":"pith.integrity.v1","payload_sha256":"dcfd52801c7e692573dc9a006c7a8d5f0694d895f94c7ac7500c1bde7aa50d64","signature_b64":"3A4KzZegkeeCbY3z4+5ogbz3lgiCF/mEVg2PDtWqI+m3qn+wl8lCRcZiPf3a/3y4Qbb/7m/RZng2LFtmcXQPAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T05:32:44.246917+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.engappai.2024.10796110) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"H. Deng, Y. Lu, T. Yang, Z. Liu, and J. Chen, “Unmanned aerial vehicles anomaly detection model based on sensor information fusion and hybrid multimodal neural network,”Eng. Appl. Artif. Intell., vol. 132, p. 107961, 2024. https://doi.org/1","arxiv_id":"2605.19233","detector":"doi_compliance","evidence":{"ref_index":16,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"H. Deng, Y. Lu, T. Yang, Z. Liu, and J. Chen, “Unmanned aerial vehicles anomaly detection model based on sensor information fusion and hybrid multimodal neural network,”Eng. Appl. Artif. Intell., vol. 132, p. 107961, 2024. https://doi.org/1","reconstructed_doi":"10.1016/j.engappai.2024.10796110"},"severity":"advisory","ref_index":16,"audited_at":"2026-05-20T05:29:27.286712Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.engappai.2024.10796110","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f400f4502cf7f2ec91214c8d8c05b82bfb974fc3644c5ae6d087580615c2101d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4805,"event_type":"pith.integrity.v1","payload_sha256":"74dbd71e8869b1f5e8beba87a99ef84b60b834de2671eb22bd9c95778b8a532b","signature_b64":"zHgcLngk21KAd2b8IAVvzVeHcpSVQS2GodCQtXlNeI8rNGk2WcJOc08C/kBEeoR1qLp9bnVpTBLwrGXNy2JlBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T05:32:44.242800+00:00","payload":{"note":"Identifier '10.1109/jiot.2020.2973140' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"G. Choudhary, V. Sharma, I. You, K. Yim, R. Chen, and J. H. Cho, “Intrusion detection systems for networked unmanned aerial vehicles: A survey,”IEEE Internet Things J., vol. 7, no. 7, pp. 6047–6064, 2020.https://doi.org/10.1109/JIOT.2020.29","arxiv_id":"2605.19233","detector":"doi_compliance","evidence":{"doi":"10.1109/jiot.2020.2973140","arxiv_id":null,"ref_index":13,"raw_excerpt":"G. Choudhary, V. Sharma, I. You, K. Yim, R. Chen, and J. H. Cho, “Intrusion detection systems for networked unmanned aerial vehicles: A survey,”IEEE Internet Things J., vol. 7, no. 7, pp. 6047–6064, 2020.https://doi.org/10.1109/JIOT.2020.2973140","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":13,"audited_at":"2026-05-20T05:29:27.286712Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/jiot.2020.2973140","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"352da77879873752a3b9b6d9bdd760d643de822a439822ee26cbc7276710384d","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.19233/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}