{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.19867","arxiv_id":"2605.19867","integrity":{"available":true,"endpoint":"/pith/2605.19867/integrity.json","summary":{"critical":2,"advisory":5,"informational":0,"by_detector":{"doi_compliance":{"total":7,"critical":2,"advisory":5,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-21T03:42:20.343792Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-21T02:13:51.833311Z","findings_count":7},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-21T02:01:32.343377Z","findings_count":0},{"name":"cited_work_retraction","version":"1.0.0","status":"completed","ran_at":"2026-05-20T01:51:58.618766Z","findings_count":0},{"name":"shingle_duplication","version":"0.1.0","status":"skipped","ran_at":"2026-05-20T01:49:56.311416Z","findings_count":0},{"name":"citation_quote_validity","version":"0.1.0","status":"skipped","ran_at":"2026-05-20T01:49:55.537586Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"skipped","ran_at":"2026-05-20T01:33:25.274302Z","findings_count":0}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/4086.url:https://www.ams.org/mcom/0000-000-00/S0025-5718-2025-04086-9/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/4086.url:https://www.ams.org/mcom/0000-000-00/S0025-5718-2025-04086-9/","detected_arxiv_id":null,"ref_index":23,"audited_at":"2026-05-20T02:05:03.777993Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2209.01231.url:http://arxiv.org/abs/2209.01231) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2209.01231.url:http://arxiv.org/abs/2209.01231","detected_arxiv_id":null,"ref_index":14,"audited_at":"2026-05-20T02:05:03.777993Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2305.16368.url:http://arxiv.org/abs/2305.16368.26) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2305.16368.url:http://arxiv.org/abs/2305.16368.26","detected_arxiv_id":null,"ref_index":20,"audited_at":"2026-05-20T02:05:03.777993Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2508.00101.url:http://arxiv.org/abs/2508.00101) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.2508.00101.url:http://arxiv.org/abs/2508.00101","detected_arxiv_id":null,"ref_index":28,"audited_at":"2026-05-20T02:05:03.777993Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.48550/arxiv.2412.07127.url:http://arxiv.org/abs/2412.07127' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.48550/arxiv.2412.07127.url:http://arxiv.org/abs/2412.07127","detected_arxiv_id":null,"ref_index":31,"audited_at":"2026-05-20T02:05:03.777993Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1515/cmam-2025-0170/html) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1515/cmam-2025-0170/html","detected_arxiv_id":null,"ref_index":52,"audited_at":"2026-05-20T02:05:03.777993Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.48550/arxiv.2602.06842.url:http://arxiv.org/abs/2602.06842' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.48550/arxiv.2602.06842.url:http://arxiv.org/abs/2602.06842","detected_arxiv_id":null,"ref_index":55,"audited_at":"2026-05-20T02:05:03.777993Z"}],"snapshot_sha256":"573e398ceb3dc0b4ac2d914ab3719637d32df942cfa37ce9adc8b78fef71cec8"},"events":[{"event_id":4191,"event_type":"pith.integrity.v1","payload_sha256":"ac291c5614b5098af47bb4cd4b7844db935c5717983255daa0e1fd0291204d0e","signature_b64":"swgycMcBn/kxxDINVL9/7kq2VuZN0b86rYZKAlASf7M/V3GIzEGdX9PxDeO5PMoxXE6pviRzFPF0mC8xjDmYCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.312109+00:00","payload":{"note":"Identifier '10.48550/arxiv.2602.06842.url:http://arxiv.org/abs/2602.06842' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Y. Wu et al. “Are Deep Learning Based Hybrid PDE Solvers Reliable? Why Training Paradigms and Update Strategies Matter”. In: arXiv:2602.06842 (2026). arXiv:2602.06842 [math].doi:10.48550/arXiv.2602.06842.url:http://arxiv.org/abs/2602.06842","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"doi":"10.48550/arxiv.2602.06842.url:http://arxiv.org/abs/2602.06842","arxiv_id":null,"ref_index":55,"raw_excerpt":"Y. Wu et al. “Are Deep Learning Based Hybrid PDE Solvers Reliable? Why Training Paradigms and Update Strategies Matter”. In: arXiv:2602.06842 (2026). arXiv:2602.06842 [math].doi:10.48550/arXiv.2602.06842.url:http://arxiv.org/abs/2602.06842","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":55,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arxiv.2602.06842.url:http://arxiv.org/abs/2602.06842","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"43af5c73bdff18ae2925bb41977ef65b88cb7e8bcba4902a6ffd13f3d772fe6b","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4190,"event_type":"pith.integrity.v1","payload_sha256":"fb4f0086faca30463d1496d580ecbb048b99c2cce2975331a24b179686df660e","signature_b64":"vLGt/6sW2s4WfpRaWio+HHsD22EX2aWB3gmrqjft89fjx8dO2ZyTZ9eoHa8SCT10aUBg4y3LOILK8bTL9Ef7Cw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.309384+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1515/cmam-2025-0170/html) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"V. Trifonov et al. “Learning from linear algebra: A graph neural network approach to precon- ditioner design for conjugate gradient solvers”. In:Computational Methods in Applied Math- ematics0 (2026).url:https://www.degruyterbrill.com/docum","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"ref_index":52,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"V. Trifonov et al. “Learning from linear algebra: A graph neural network approach to precon- ditioner design for conjugate gradient solvers”. In:Computational Methods in Applied Math- ematics0 (2026).url:https://www.degruyterbrill.com/docum","reconstructed_doi":"10.1515/cmam-2025-0170/html"},"severity":"advisory","ref_index":52,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.1515/cmam-2025-0170/html","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"824812f4e3f206399b9101cc325d0bf4b8fd3c13d33f44346988562390cd3ec7","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4189,"event_type":"pith.integrity.v1","payload_sha256":"e96947b79398ee478d73fd42f51ae23b708b4f48a51c3126287704b6b618455b","signature_b64":"AGuaeZqs94DujQbllgITEvd0DJFGXt1wHYdwgLKgqkJS0p67fe6l8GaVU4SlEkT7SqMXeca81nuVoZNs/6LGCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.306598+00:00","payload":{"note":"Identifier '10.48550/arxiv.2412.07127.url:http://arxiv.org/abs/2412.07127' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"R. Li, S. Wang, and C. Wang. “Deep Learning-Enhanced Preconditioning for Efficient Con- jugate Gradient Solvers in Large-Scale PDE Systems”. In:arXiv preprint arXiv:2412.07127 [cs](2024).doi:10.48550/arXiv.2412.07127.url:http://arxiv.org/ab","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"doi":"10.48550/arxiv.2412.07127.url:http://arxiv.org/abs/2412.07127","arxiv_id":null,"ref_index":31,"raw_excerpt":"R. Li, S. Wang, and C. Wang. “Deep Learning-Enhanced Preconditioning for Efficient Con- jugate Gradient Solvers in Large-Scale PDE Systems”. In:arXiv preprint arXiv:2412.07127 [cs](2024).doi:10.48550/arXiv.2412.07127.url:http://arxiv.org/abs/2412.07127","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":31,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arxiv.2412.07127.url:http://arxiv.org/abs/2412.07127","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"40907b56f2ecc6fe8fc5d367f7818cc92cd63b2d4c7030d65b0399c174161b6b","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4188,"event_type":"pith.integrity.v1","payload_sha256":"aa840d3b43a8b0e41043aa7495d78c9fdce825b43b2b0ccb064c5aa25170f23c","signature_b64":"uJ1SzWW3pM9z92u1AdU+FtpYpFPTiNIB4nPWBgcbDXfOU8rbSf00fqeFWxNIR9WQZ0asagj3nznGz58mMGlBCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.303826+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2508.00101.url:http://arxiv.org/abs/2508.00101) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"A. Kopaniˇ c´ akov´ a, Y. Lee, and G.E. Karniadakis. “Leveraging Operator Learning to Acceler- ate Convergence of the Preconditioned Conjugate Gradient Method”. In: arXiv:2508.00101 (2025). arXiv:2508.00101 [math].doi:10.48550/arXiv.2508.00","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"ref_index":28,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"A. Kopaniˇ c´ akov´ a, Y. Lee, and G.E. Karniadakis. “Leveraging Operator Learning to Acceler- ate Convergence of the Preconditioned Conjugate Gradient Method”. In: arXiv:2508.00101 (2025). arXiv:2508.00101 [math].doi:10.48550/arXiv.2508.00","reconstructed_doi":"10.48550/arXiv.2508.00101.url:http://arxiv.org/abs/2508.00101"},"severity":"advisory","ref_index":28,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2508.00101.url:http://arxiv.org/abs/2508.00101","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"0e9afdeaa1324596048753839520cf28fb998697550ac88b6e5b7e69e8f0538e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4187,"event_type":"pith.integrity.v1","payload_sha256":"f24778c99af86a5b13a1dc8d245419d4f13ed5d82728d194b17acb5e08d520f0","signature_b64":"E1OHTLgg1J2kEcyaJ7pLqjx9K9RuMGG5GpevM1HHFhwNvBaRO1xBOyUNmpAnnSWn4yaMwsA+u9p5M/77cCqfDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.300915+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/4086.url:https://www.ams.org/mcom/0000-000-00/S0025-5718-2025-04086-9/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"J. Hu and P. Jin. “A hybrid iterative method based on MIONet for PDEs: Theory and numerical examples”. In:Mathematics of Computation(2025). Published electronically. DOI https://doi.org/10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/408","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"ref_index":23,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"J. Hu and P. Jin. “A hybrid iterative method based on MIONet for PDEs: Theory and numerical examples”. In:Mathematics of Computation(2025). Published electronically. DOI https://doi.org/10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/408","reconstructed_doi":"10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/4086.url:https://www.ams.org/mcom/0000-000-00/S0025-5718-2025-04086-9/"},"severity":"advisory","ref_index":23,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.1090/mcom/4086.doi:https://doi.org/10.1090/mcom/4086.url:https://www.ams.org/mcom/0000-000-00/S0025-5718-2025-04086-9/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4591f033e005653b3aebf3458e73da20d8d0974103e47b75899d5802f266cc03","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4186,"event_type":"pith.integrity.v1","payload_sha256":"601024649b9ec168fbfbc17d0e30af5afc0bd2bd2a82f0f6af786bed8f230c3a","signature_b64":"6KpiWBmTQnp1PlK0DbfMRBBYGHqlN6QfX2ul4clJbk6aG7hF4EoiZ2aQ+vhizCxaqEpQ7gV0O19ryyNro3VUDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.296450+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2305.16368.url:http://arxiv.org/abs/2305.16368.26) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"P. H¨ ausner, O. ¨Oktem, and J. Sj¨ olund. “Neural incomplete factorization: learning precondi- tioners for the conjugate gradient method”. en. In:arXiv preprint arXiv:2305.16368 [math] (2024).doi:10.48550/arXiv.2305.16368.url:http://arxiv.","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"ref_index":20,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"P. H¨ ausner, O. ¨Oktem, and J. Sj¨ olund. “Neural incomplete factorization: learning precondi- tioners for the conjugate gradient method”. en. In:arXiv preprint arXiv:2305.16368 [math] (2024).doi:10.48550/arXiv.2305.16368.url:http://arxiv.","reconstructed_doi":"10.48550/arXiv.2305.16368.url:http://arxiv.org/abs/2305.16368.26"},"severity":"advisory","ref_index":20,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2305.16368.url:http://arxiv.org/abs/2305.16368.26","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f7ff445cc466139f9a2ab9a5622d98ddde21bb2b6bfed371d20469eafbbfdee7","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4185,"event_type":"pith.integrity.v1","payload_sha256":"60c2eec0bfa6369e329ee69456ba8c7a9473bfc1473e7e7685a124c8f3d21527","signature_b64":"I/1+7XXTPesJIcjcaDzakRlr7bFkUzboE2BniCTiIYCkzNxp+Kc70rSvZrepKQe2AQclJS6sIjo4Bj0atovjCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T02:07:39.289754+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.2209.01231.url:http://arxiv.org/abs/2209.01231) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"M. Embree. “How Descriptive are GMRES Convergence Bounds?” In: arXiv:2209.01231 (2022). arXiv:2209.01231 [math].doi:10.48550/arXiv.2209.01231.url:http://arxiv. org/abs/2209.01231","arxiv_id":"2605.19867","detector":"doi_compliance","evidence":{"ref_index":14,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"M. Embree. “How Descriptive are GMRES Convergence Bounds?” In: arXiv:2209.01231 (2022). arXiv:2209.01231 [math].doi:10.48550/arXiv.2209.01231.url:http://arxiv. org/abs/2209.01231","reconstructed_doi":"10.48550/arXiv.2209.01231.url:http://arxiv.org/abs/2209.01231"},"severity":"advisory","ref_index":14,"audited_at":"2026-05-20T02:05:03.777993Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.2209.01231.url:http://arxiv.org/abs/2209.01231","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"6d1ade83dc780167fe842e2ece4c56ffd053081e1ba377c314283bcb738d1310","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.19867/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}