{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2025:3VG2ECZPJXLSMG43Q6NGIXSX75","short_pith_number":"pith:3VG2ECZP","schema_version":"1.0","canonical_sha256":"dd4da20b2f4dd7261b9b879a645e57ff6ca3a873a0c73a4d9561d9837eb22773","source":{"kind":"arxiv","id":"2510.19973","version":4},"attestation_state":"computed","paper":{"title":"A Tutorial on Cognitive Biases in Agentic AI-Driven 6G Autonomous Networks","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.AI"],"primary_cat":"cs.NI","authors_text":"Christos Verikoukis, Farhad Rezazadeh, Hatim Chergui, Merouane Debbah","submitted_at":"2025-10-22T19:05:04Z","abstract_excerpt":"The path to higher network autonomy in 6G lies beyond the mere optimization of key performance indicators (KPIs), requiring systems that perceive and reason over the network environment as it is. This can be achieved through agentic AI, where large language model (LLM)-powered agents utilize multimodal telemetry, memory, and cross-domain negotiation to achieve multi-objective goals. However, deploying such agents introduces cognitive biases inherited from human design, which can severely distort reasoning and actuation. This paper provides a comprehensive tutorial on well-known cognitive biase"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"2510.19973","kind":"arxiv","version":4},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NI","submitted_at":"2025-10-22T19:05:04Z","cross_cats_sorted":["cs.AI"],"title_canon_sha256":"e13bada288db376a51cd71b2b085350b5c36af2e3aa176b5e7fafbb6d752c457","abstract_canon_sha256":"cb8b0d99cd5b03406276da49167111751b1cfb289cef9ef2184bc77b0b180443"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:17.255383Z","signature_b64":"i9C7qHS4y4XsYxI/SLwlkhdjK6gj1JOlv+e5odxTH4L5aoD7e09pfPcx59kl6kpMhJo/d2c+VIByDMgjeuDjAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dd4da20b2f4dd7261b9b879a645e57ff6ca3a873a0c73a4d9561d9837eb22773","last_reissued_at":"2026-05-17T23:39:17.254608Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:17.254608Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"A Tutorial on Cognitive Biases in Agentic AI-Driven 6G Autonomous Networks","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.AI"],"primary_cat":"cs.NI","authors_text":"Christos Verikoukis, Farhad Rezazadeh, Hatim Chergui, Merouane Debbah","submitted_at":"2025-10-22T19:05:04Z","abstract_excerpt":"The path to higher network autonomy in 6G lies beyond the mere optimization of key performance indicators (KPIs), requiring systems that perceive and reason over the network environment as it is. This can be achieved through agentic AI, where large language model (LLM)-powered agents utilize multimodal telemetry, memory, and cross-domain negotiation to achieve multi-objective goals. However, deploying such agents introduces cognitive biases inherited from human design, which can severely distort reasoning and actuation. This paper provides a comprehensive tutorial on well-known cognitive biase"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2510.19973","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2510.19973","created_at":"2026-05-17T23:39:17.254736+00:00"},{"alias_kind":"arxiv_version","alias_value":"2510.19973v4","created_at":"2026-05-17T23:39:17.254736+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2510.19973","created_at":"2026-05-17T23:39:17.254736+00:00"},{"alias_kind":"pith_short_12","alias_value":"3VG2ECZPJXLS","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_16","alias_value":"3VG2ECZPJXLSMG43","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_8","alias_value":"3VG2ECZP","created_at":"2026-05-18T12:33:37.589309+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":2,"sample":[{"citing_arxiv_id":"2511.19175","citing_title":"LLM-Based Agentic Negotiation for 6G: Addressing Uncertainty Neglect and Tail-Event Risk","ref_index":7,"is_internal_anchor":true},{"citing_arxiv_id":"2605.02584","citing_title":"Beyond State Machines: Executing Network Procedures with Agentic Tool-Calling Sequences","ref_index":21,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75","json":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75.json","graph_json":"https://pith.science/api/pith-number/3VG2ECZPJXLSMG43Q6NGIXSX75/graph.json","events_json":"https://pith.science/api/pith-number/3VG2ECZPJXLSMG43Q6NGIXSX75/events.json","paper":"https://pith.science/paper/3VG2ECZP"},"agent_actions":{"view_html":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75","download_json":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75.json","view_paper":"https://pith.science/paper/3VG2ECZP","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2510.19973&json=true","fetch_graph":"https://pith.science/api/pith-number/3VG2ECZPJXLSMG43Q6NGIXSX75/graph.json","fetch_events":"https://pith.science/api/pith-number/3VG2ECZPJXLSMG43Q6NGIXSX75/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75/action/timestamp_anchor","attest_storage":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75/action/storage_attestation","attest_author":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75/action/author_attestation","sign_citation":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75/action/citation_signature","submit_replication":"https://pith.science/pith/3VG2ECZPJXLSMG43Q6NGIXSX75/action/replication_record"}},"created_at":"2026-05-17T23:39:17.254736+00:00","updated_at":"2026-05-17T23:39:17.254736+00:00"}