{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","short_pith_number":"pith:AFWYDOAO","canonical_record":{"source":{"id":"2605.20669","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2026-05-20T03:36:13Z","cross_cats_sorted":[],"title_canon_sha256":"ee123a5c2aa937cb7ee7cac0fac915569b37be52ed4e41987e2bfbc0d535b03c","abstract_canon_sha256":"07f5e1315d9743ded8a5fdb368b77dcae92a129678758dc52acbfbdc100c24fe"},"schema_version":"1.0"},"canonical_sha256":"016d81b80edee1f514bc345dffbd895f4b036aef58b4815f4be83a52f3acd0c0","source":{"kind":"arxiv","id":"2605.20669","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20669","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20669v1","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20669","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"pith_short_12","alias_value":"AFWYDOAO33Q7","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"pith_short_16","alias_value":"AFWYDOAO33Q7KFF4","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"pith_short_8","alias_value":"AFWYDOAO","created_at":"2026-05-21T01:04:48Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","target":"record","payload":{"canonical_record":{"source":{"id":"2605.20669","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2026-05-20T03:36:13Z","cross_cats_sorted":[],"title_canon_sha256":"ee123a5c2aa937cb7ee7cac0fac915569b37be52ed4e41987e2bfbc0d535b03c","abstract_canon_sha256":"07f5e1315d9743ded8a5fdb368b77dcae92a129678758dc52acbfbdc100c24fe"},"schema_version":"1.0"},"canonical_sha256":"016d81b80edee1f514bc345dffbd895f4b036aef58b4815f4be83a52f3acd0c0","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-21T01:04:48.309683Z","signature_b64":"GVVSw8wIrmcyClH5Qe5FbwXeDi/ww3je+1vr3AWQ1EsQXNzxidUQIIEIwL7tfydVqPybroxfts70FTsO+Mw7Bw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"016d81b80edee1f514bc345dffbd895f4b036aef58b4815f4be83a52f3acd0c0","last_reissued_at":"2026-05-21T01:04:48.308986Z","signature_status":"signed_v1","first_computed_at":"2026-05-21T01:04:48.308986Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.20669","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"iDzkvu8n89PpbrF/xFoGc9hPQj+Q9rB/eP6YbMlJj5CH/ta6b0bOqQb7AXy2zIbRVLGYsDEvN1ReJnvf26OuAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T11:43:41.326440Z"},"content_sha256":"5f8d5d1d9023491d06d10ce46147623538edcdd06683f9333e2001b49ccb5b0d","schema_version":"1.0","event_id":"sha256:5f8d5d1d9023491d06d10ce46147623538edcdd06683f9333e2001b49ccb5b0d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"GSA-YOLO: A High-Efficiency Framework via Structured Sparsity and Adaptive Knowledge Distillation for Real-Time X-ray Security Inspection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Jiahao Kong","submitted_at":"2026-05-20T03:36:13Z","abstract_excerpt":"X-ray security inspection requires accurate real-time detection of prohibited items, but existing models often struggle to balance the challenges of severe occlusion, complex clutter, and strict speed requirements. To overcome these challenges, this paper proposes GSA-YOLO, a novel lightweight framework built upon the YOLOv8n architecture, specifically engineered to enhance detection robustness and inference efficiency. GSA-YOLO strategically integrates structured sparsity and adaptive knowledge transfer through three core components: Group Lasso (GL) applied to the network neck for robust fea"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20669","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.20669/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Qd8DqO90IJW7AnSFWri0f23ugpFN04EnRJa1lUSOllpO6Vv535YiW5SExFrlbrQ2cJ2ysfaBAbKQ3a5nbKLIAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T11:43:41.326820Z"},"content_sha256":"74e389cfb72f5efeb2be49df222747705615ef3602c85c133d8f5457b8b6245c","schema_version":"1.0","event_id":"sha256:74e389cfb72f5efeb2be49df222747705615ef3602c85c133d8f5457b8b6245c"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","target":"integrity","payload":{"note":"Identifier '10.1016/j.engappai.2024.111898' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"S. Umirzakova, S. Mardieva, S. Muksimova, J. Baltayev, Y. Im Cho, It- erativecontextualandadaptivestrategiesforenhancedmonoculardepth estimation, Engineering Applications of Artificial Intelligence 160 (2025) 111898.doi:https://doi.org/10.1","arxiv_id":"2605.20669","detector":"doi_compliance","evidence":{"doi":"10.1016/j.engappai.2024.111898","arxiv_id":null,"ref_index":34,"raw_excerpt":"S. Umirzakova, S. Mardieva, S. Muksimova, J. Baltayev, Y. Im Cho, It- erativecontextualandadaptivestrategiesforenhancedmonoculardepth estimation, Engineering Applications of Artificial Intelligence 160 (2025) 111898.doi:https://doi.org/10.1016/j.engappai.2024.111898","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":34,"audited_at":"2026-05-21T05:53:18.192112Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.engappai.2024.111898","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"4e0ab49aeb16708a118652c87e583382a79bd22ab8d201b0ea272c596f8e60ec","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5780,"payload_sha256":"a7feed16e24e7e13ba57b4b91c1b5bbbb358a04bf358e46c15a3a529ad2756c2","signature_b64":"E02bCYNFyMdq2Fl+9faDGWr5VRNGDzp1TPvB71A/PVW+x5W8cfGNHpY4p3hSPG3SI6DcxvfcJx2ITbn+vqfYBQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T05:54:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"05Zl2DrGYVpGcEaDNz4CBtQtzTB7b+WSWcAYhOpLEjfUgxpJ5s/z8XyPc+Cs3AxEShI1MMuaFDTh9CGdSA8nCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T11:43:41.327764Z"},"content_sha256":"db11587380dbe96756ff29dd7b26b42ce21589ec1b1222bc63a9a7963b58909b","schema_version":"1.0","event_id":"sha256:db11587380dbe96756ff29dd7b26b42ce21589ec1b1222bc63a9a7963b58909b"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","target":"integrity","payload":{"note":"Identifier '10.3390/sym17010xxx' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"H. Song, J. Xie, Liang, Y. Su, Y. Xiao, X. Zhang, Y. Ouyang, X. Li, S. Chen, Y. Li, Symmetrical learning and transferring: Efficient knowl- edge distillation for remote sensing image classification, Symmetry 17 (2025).doi:https://doi.org/10","arxiv_id":"2605.20669","detector":"doi_compliance","evidence":{"doi":"10.3390/sym17010xxx","arxiv_id":null,"ref_index":33,"raw_excerpt":"H. Song, J. Xie, Liang, Y. Su, Y. Xiao, X. Zhang, Y. Ouyang, X. Li, S. Chen, Y. Li, Symmetrical learning and transferring: Efficient knowl- edge distillation for remote sensing image classification, Symmetry 17 (2025).doi:https://doi.org/10.3390/sym17010XXX","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":33,"audited_at":"2026-05-21T05:53:18.192112Z","event_type":"pith.integrity.v1","detected_doi":"10.3390/sym17010xxx","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"ccbe6bfd628cb58563b4da9af9b83029146f10b4b8f8a574e7594a4ed9078618","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5779,"payload_sha256":"2bbc42e7a11e1f6e4cf69ec61269a6b9067ebbd4cdae7cf92a8f9901256fec66","signature_b64":"Auw7AV9NrkSXzmx490i6HXB3MxdRsVnRgJGVX1WIzodll6eBGWgnpAQErStftnGSImHSOZUZDfrrtsRBH/wJCQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T05:54:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bvQfwwKve+ZL9UNMF59Ovw4xVeidCxxk389UGn4SIyZieYF0nZfPgW60aB5voCOifCvD+OjSrMb7EQMZnCT+DA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T11:43:41.328061Z"},"content_sha256":"814f8867bb08476f638f812347e47d107b979c3bc6199499a1ebfa933f0feac9","schema_version":"1.0","event_id":"sha256:814f8867bb08476f638f812347e47d107b979c3bc6199499a1ebfa933f0feac9"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","target":"integrity","payload":{"note":"Identifier '10.1016/j.asr.2024.12.xxx' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"H. Song, J. Xie, Y. Duan, X. Xie, Y. Zhou, W. Wang, Cmkd-net: a cross-modal knowledge distillation method for remote sensing im- age classification, Advances in Space Research 75 (2025) 8515–8534. doi:https://doi.org/10.1016/j.asr.2024.12.X","arxiv_id":"2605.20669","detector":"doi_compliance","evidence":{"doi":"10.1016/j.asr.2024.12.xxx","arxiv_id":null,"ref_index":32,"raw_excerpt":"H. Song, J. Xie, Y. Duan, X. Xie, Y. Zhou, W. Wang, Cmkd-net: a cross-modal knowledge distillation method for remote sensing im- age classification, Advances in Space Research 75 (2025) 8515–8534. doi:https://doi.org/10.1016/j.asr.2024.12.XXX","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":32,"audited_at":"2026-05-21T05:53:18.192112Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.asr.2024.12.xxx","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"84af04adfd32702f146c86c09d319fd2793e54b407c3090b1282e838fb8ff67e","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5778,"payload_sha256":"f1a5c444d35fe158f7a0cdff3ecb1cb7e7efc410023aa841f68b10d9b64f3efb","signature_b64":"fdUf66mN/SFVYVXOO2vrGW5PFJ06l3CmPrEGurzLBfy3v6Qb6vChJZpvfdhAwHvP5q7bXyciwGDzcr51bapGAQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T05:54:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lz80YkRkrJyeMLTdZKxMFaCYb/p4n/NWyhEO6D7wxXew4DJiUnQTfBRX+J1tdWVdTZGgzfSk0xf3zj48lDiZCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T11:43:41.328386Z"},"content_sha256":"84248866321ae522c119f4880a9a956efd8c6511b91474710e137160aace0b93","schema_version":"1.0","event_id":"sha256:84248866321ae522c119f4880a9a956efd8c6511b91474710e137160aace0b93"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/AFWYDOAO33Q7KFF4GRO77PMJL5/bundle.json","state_url":"https://pith.science/pith/AFWYDOAO33Q7KFF4GRO77PMJL5/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/AFWYDOAO33Q7KFF4GRO77PMJL5/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T11:43:41Z","links":{"resolver":"https://pith.science/pith/AFWYDOAO33Q7KFF4GRO77PMJL5","bundle":"https://pith.science/pith/AFWYDOAO33Q7KFF4GRO77PMJL5/bundle.json","state":"https://pith.science/pith/AFWYDOAO33Q7KFF4GRO77PMJL5/state.json","well_known_bundle":"https://pith.science/.well-known/pith/AFWYDOAO33Q7KFF4GRO77PMJL5/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:AFWYDOAO33Q7KFF4GRO77PMJL5","merge_version":"pith-open-graph-merge-v1","event_count":5,"valid_event_count":5,"invalid_event_count":0,"equivocation_count":1,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"07f5e1315d9743ded8a5fdb368b77dcae92a129678758dc52acbfbdc100c24fe","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2026-05-20T03:36:13Z","title_canon_sha256":"ee123a5c2aa937cb7ee7cac0fac915569b37be52ed4e41987e2bfbc0d535b03c"},"schema_version":"1.0","source":{"id":"2605.20669","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20669","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20669v1","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20669","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"pith_short_12","alias_value":"AFWYDOAO33Q7","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"pith_short_16","alias_value":"AFWYDOAO33Q7KFF4","created_at":"2026-05-21T01:04:48Z"},{"alias_kind":"pith_short_8","alias_value":"AFWYDOAO","created_at":"2026-05-21T01:04:48Z"}],"graph_snapshots":[{"event_id":"sha256:74e389cfb72f5efeb2be49df222747705615ef3602c85c133d8f5457b8b6245c","target":"graph","created_at":"2026-05-21T01:04:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.20669/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"X-ray security inspection requires accurate real-time detection of prohibited items, but existing models often struggle to balance the challenges of severe occlusion, complex clutter, and strict speed requirements. To overcome these challenges, this paper proposes GSA-YOLO, a novel lightweight framework built upon the YOLOv8n architecture, specifically engineered to enhance detection robustness and inference efficiency. GSA-YOLO strategically integrates structured sparsity and adaptive knowledge transfer through three core components: Group Lasso (GL) applied to the network neck for robust fea","authors_text":"Jiahao Kong","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2026-05-20T03:36:13Z","title":"GSA-YOLO: A High-Efficiency Framework via Structured Sparsity and Adaptive Knowledge Distillation for Real-Time X-ray Security Inspection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20669","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5f8d5d1d9023491d06d10ce46147623538edcdd06683f9333e2001b49ccb5b0d","target":"record","created_at":"2026-05-21T01:04:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"07f5e1315d9743ded8a5fdb368b77dcae92a129678758dc52acbfbdc100c24fe","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2026-05-20T03:36:13Z","title_canon_sha256":"ee123a5c2aa937cb7ee7cac0fac915569b37be52ed4e41987e2bfbc0d535b03c"},"schema_version":"1.0","source":{"id":"2605.20669","kind":"arxiv","version":1}},"canonical_sha256":"016d81b80edee1f514bc345dffbd895f4b036aef58b4815f4be83a52f3acd0c0","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"016d81b80edee1f514bc345dffbd895f4b036aef58b4815f4be83a52f3acd0c0","first_computed_at":"2026-05-21T01:04:48.308986Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-21T01:04:48.308986Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"GVVSw8wIrmcyClH5Qe5FbwXeDi/ww3je+1vr3AWQ1EsQXNzxidUQIIEIwL7tfydVqPybroxfts70FTsO+Mw7Bw==","signature_status":"signed_v1","signed_at":"2026-05-21T01:04:48.309683Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.20669","source_kind":"arxiv","source_version":1}}},"equivocations":[{"signer_id":"pith.science","event_type":"integrity_finding","target":"integrity","event_ids":["sha256:814f8867bb08476f638f812347e47d107b979c3bc6199499a1ebfa933f0feac9","sha256:84248866321ae522c119f4880a9a956efd8c6511b91474710e137160aace0b93","sha256:db11587380dbe96756ff29dd7b26b42ce21589ec1b1222bc63a9a7963b58909b"]}],"invalid_events":[],"applied_event_ids":["sha256:5f8d5d1d9023491d06d10ce46147623538edcdd06683f9333e2001b49ccb5b0d","sha256:74e389cfb72f5efeb2be49df222747705615ef3602c85c133d8f5457b8b6245c"],"state_sha256":"fddc5bb95a6e1e9f82dc01578255907e1351e89814a68fa8f9fa352a27694aaf"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TqTA19bc49fYH2LKkfLxJPjkcQMbocltMADmv7NoNJ04nf6gf+FFFRWzbgyg581gpmR68XR/GHbRjrNJOgbZCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T11:43:41.331031Z","bundle_sha256":"7d3aca8ea26723d1159eb12f252566122969183794ae7e307ca9e721130e407d"}}