{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","short_pith_number":"pith:G5RGKBWB","canonical_record":{"source":{"id":"2605.20473","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-19T20:39:14Z","cross_cats_sorted":["cs.AI","cs.LG"],"title_canon_sha256":"989c5b5638e504d63c851ed2858faf43be1e11bef5cfa86c83c7996da2fa9b8b","abstract_canon_sha256":"f8e9082f7a2bc38975f55dedf8ff5d0b46f06e505927d09f729582049f373160"},"schema_version":"1.0"},"canonical_sha256":"37626506c19e2983604e627ce77771c69ac3d493b29e4b9046ddbf94a1c3a7cf","source":{"kind":"arxiv","id":"2605.20473","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20473","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20473v1","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20473","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"pith_short_12","alias_value":"G5RGKBWBTYUY","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"pith_short_16","alias_value":"G5RGKBWBTYUYGYCO","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"pith_short_8","alias_value":"G5RGKBWB","created_at":"2026-05-21T01:04:39Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"record","payload":{"canonical_record":{"source":{"id":"2605.20473","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-19T20:39:14Z","cross_cats_sorted":["cs.AI","cs.LG"],"title_canon_sha256":"989c5b5638e504d63c851ed2858faf43be1e11bef5cfa86c83c7996da2fa9b8b","abstract_canon_sha256":"f8e9082f7a2bc38975f55dedf8ff5d0b46f06e505927d09f729582049f373160"},"schema_version":"1.0"},"canonical_sha256":"37626506c19e2983604e627ce77771c69ac3d493b29e4b9046ddbf94a1c3a7cf","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-21T01:04:39.128463Z","signature_b64":"uypV5n7TI95wZfxV7s6n9Rntaoe83mbs73Pejiv+mWd1UplODSrKjSxDfvOhAKDtiZV+m/kjHT/86cE+WtzgCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"37626506c19e2983604e627ce77771c69ac3d493b29e4b9046ddbf94a1c3a7cf","last_reissued_at":"2026-05-21T01:04:39.128011Z","signature_status":"signed_v1","first_computed_at":"2026-05-21T01:04:39.128011Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.20473","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:39Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hZQpSr2PvpNAJsLXmgnaCXb058MCoy6LDSrNEpMKPdDcmuDt0VkbdvJfKAOKT4f9U6JmIbv7uJy3WG5xPdCuDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.680114Z"},"content_sha256":"305cdb0d3800831d2acb535245ab8a96a96724c686bfcd3b824c92faa6b47931","schema_version":"1.0","event_id":"sha256:305cdb0d3800831d2acb535245ab8a96a96724c686bfcd3b824c92faa6b47931"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Code Generation by Differential Test Time Scaling","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.AI","cs.LG"],"primary_cat":"cs.SE","authors_text":"Ethan Wang, Hao Chen, Jicheng Wang, Xuanxin Ouyang, Yifeng He","submitted_at":"2026-05-19T20:39:14Z","abstract_excerpt":"Test-time scaling has emerged as a promising approach for improving code generation by exploring large solution spaces at inference time. However, existing methods often rely on public test cases that are unavailable in practice, or require extensive LLM inference for candidate selection, leading to significant token consumption and time overhead. We present DiffCodeGen, a novel test-time scaling method for code generation based on coverage-guided differential analysis. DiffCodeGen generates diverse code candidates using various sampling and prompting strategies, then applies coverage-guided f"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20473","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.20473/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T01:04:39Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"IY5RcNRChzXkVsaX4cg5Kuh8/IdDoisv4P9k7EJNMrsscZwD6L8TCgtZvAZ9IPE8TUfoy8DUlxqTRoQso50sCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.680877Z"},"content_sha256":"eecc53e423b6ce9f7a178536eba4bf686211aa704973767ec6f575ad2abcc957","schema_version":"1.0","event_id":"sha256:eecc53e423b6ce9f7a178536eba4bf686211aa704973767ec6f575ad2abcc957"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.5281/zenodo.18426367.url:https://doi.org/10.5281/zenodo.18426367) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Anonymous.Artifacts for “Code Generation by Differential Test Time Scaling”.DOI:10.5281/zenodo.18426367.URL: https://doi.org/10.5281/zenodo.18426367. 21","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":96,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Anonymous.Artifacts for “Code Generation by Differential Test Time Scaling”.DOI:10.5281/zenodo.18426367.URL: https://doi.org/10.5281/zenodo.18426367. 21","reconstructed_doi":"10.5281/zenodo.18426367.url:https://doi.org/10.5281/zenodo.18426367"},"severity":"advisory","ref_index":96,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.5281/zenodo.18426367.url:https://doi.org/10.5281/zenodo.18426367","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"b330e667090cb644f0ceebd0a040a2e2db8f70ad277073e17fda0319bd1bd6c1","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5849,"payload_sha256":"b0164426c4a751805554fa551313fcb088c642540210420b2bbc7857b0c1221d","signature_b64":"jVJabBjC0jPpJWIN2ocY9ss9hRVmxFpYOBR5nfDaF6JAqHBgNCl+dwu1NkIiPHbpsvU4H4mGCbi2YsAFaRSEDg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fdN4lfk2w3g2qM+y1r9cPinpCa/7/coAF7Eu6DPF9ynRj48S1syP9Q5917J6kaJozTzCZMueIaoyy3DhLROiCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.684513Z"},"content_sha256":"bf1dd2dc6b58873556514797835a5b307c9197f3dfab082f819106a3afc34eab","schema_version":"1.0","event_id":"sha256:bf1dd2dc6b58873556514797835a5b307c9197f3dfab082f819106a3afc34eab"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI '10.18653/v1/2024.acl-long.78.url:https://aclanthology.org/2024.acl-long.78/' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Baizhou Huang, Shuai Lu, Xiaojun Wan, and Nan Duan. “Enhancing Large Language Models in Coding Through Multi- Perspective Self-Consistency”. In:Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume ","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":93,"raw_excerpt":"Baizhou Huang, Shuai Lu, Xiaojun Wan, and Nan Duan. “Enhancing Large Language Models in Coding Through Multi- Perspective Self-Consistency”. In:Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Bangkok, Thailand: Association for Computational Linguistics, Aug. 2024, pp. 1429–1450.DOI: 10.18653/v1/2024.acl-long.78.URL:https://aclantholo","verdict_class":"incontrovertible","doi_as_printed":"10.18653/v1/2024.acl-long.78.url:https://aclanthology.org/2024.acl-long.78/"},"severity":"critical","ref_index":93,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2024.acl-long.78.url:https://aclanthology.org/2024.acl-long.78/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"cc360d99bd4b24c154892dfa8201830adf05b4e77929bf9099690eaaf597e5f5","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5848,"payload_sha256":"ea5c2b2802c140547d1ff11fed19808e8e3d541a2e6fd496cac42c194733b6bc","signature_b64":"yyZTD2qwni6u/AUcKPgQ8S+H7MwbPNrEzSIFTRNa9ICBF4WJfbT0ubatPGdtRwm7ljRo3hQ/iECQH5DUbKXLCw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LvASkmhLIQPUqqhI1urEwCqEI4u9oJTCqEL+IuGkwD2FakQGsRr6V0+ssSSVBRY0IXTYXsxe5EK3Wh9wOvQZBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.684991Z"},"content_sha256":"a408ab111c800e3e08cf59e0639dab60b0f79aeb3758efcee5e5722381969aee","schema_version":"1.0","event_id":"sha256:a408ab111c800e3e08cf59e0639dab60b0f79aeb3758efcee5e5722381969aee"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2023.emnlp-main.67.URL:https) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Jiaxin Huang et al. “Large Language Models Can Self-Improve”. In:Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. Ed. by Houda Bouamor, Juan Pino, and Kalika Bali. Singapore: Association for Computatio","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":90,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Jiaxin Huang et al. “Large Language Models Can Self-Improve”. In:Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. Ed. by Houda Bouamor, Juan Pino, and Kalika Bali. Singapore: Association for Computatio","reconstructed_doi":"10.18653/v1/2023.emnlp-main.67.URL:https"},"severity":"advisory","ref_index":90,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2023.emnlp-main.67.URL:https","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"42d8ef7665239059fd4aaa74ffffbd5f3d843ea91f93f9110891da5781beec9f","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5847,"payload_sha256":"96ae480843e17522e897fc3460dafeb03505a5fadf6969129d1489a27c729cc7","signature_b64":"uBAh2kvs5LLavnbsuMSn4MVYvP/rSZHimIGCUFcxpCxm9Z+wFhoCkeddMNe7SZHbmJzwtNkBHOU29mOgqI4vCg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"c+I7jkuLeB8G9hDJARULPfrZlo6OGTWT5pe1g485KmFhY8TnWQ8c1o7LFeqgSGdKbdnJ3IrY1ijO91xsuwlxAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.685502Z"},"content_sha256":"11b3359d1e496912c76726783aa5b5c7cfa1380c79fbaac0f04b0d821d705a18","schema_version":"1.0","event_id":"sha256:11b3359d1e496912c76726783aa5b5c7cfa1380c79fbaac0f04b0d821d705a18"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2024.emnlp-industry.3.URL:https://aclanthology.org/2024.emnlp-industry.3/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Weimin Xiong, Yiwen Guo, and Hao Chen. “The Program Testing Ability of Large Language Models for Code”. In:Pro- ceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: Industry Track. Miami, Florida, US: Associa","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":81,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Weimin Xiong, Yiwen Guo, and Hao Chen. “The Program Testing Ability of Large Language Models for Code”. In:Pro- ceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: Industry Track. Miami, Florida, US: Associa","reconstructed_doi":"10.18653/v1/2024.emnlp-industry.3.URL:https://aclanthology.org/2024.emnlp-industry.3/"},"severity":"advisory","ref_index":81,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2024.emnlp-industry.3.URL:https://aclanthology.org/2024.emnlp-industry.3/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"68678a30274916a63d0fd1d208f87b7940b0fb90c97dd2fdb64a4eab04ec960b","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5846,"payload_sha256":"c212515103ce67a795d33a21bb9e1448a1094988bd0d9413408944cf148e9ebf","signature_b64":"d0J9MLaCcBDF2aSYN2IQLhaiatSlEdCtE/0thJZF2qRwpfugYEumWGcyn1nrFlcsbKOvpqzR8zyTEOCpdKilAQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xAAOQ5VFcsdVWHFMgDFrGAHfItsj0VLVOvVH9hnFMH8gyP2JqH6skJ493FMp62pWOeItZt9ymRcQxaUvj5H3Cw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.686065Z"},"content_sha256":"a0ae3ed8e98ff64e288797713068e436047aab4aab7bf8ec0037de770dbcd21a","schema_version":"1.0","event_id":"sha256:a0ae3ed8e98ff64e288797713068e436047aab4aab7bf8ec0037de770dbcd21a"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1145/3650212.3680342.url:https://doi.org/10.1145/3650212.3680342' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Yifeng He et al. “UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing”. In:Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2024. Vi","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1145/3650212.3680342.url:https://doi.org/10.1145/3650212.3680342","arxiv_id":null,"ref_index":80,"raw_excerpt":"Yifeng He et al. “UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing”. In:Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2024. Vienna, Austria: Association for Computing Machinery, 2024, pp. 1061–1072.ISBN: 9798400706127.DOI: 10.1145/3650212.3680342.URL:https://doi.org/10.1145/3650212.368","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":80,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3650212.3680342.url:https://doi.org/10.1145/3650212.3680342","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"04bbb9e3e8c3ac199faf61dfd48dfcb809673bdade92954e4a8c4f300885201b","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5845,"payload_sha256":"b5dcef53dfd41f85d4aa7813b17c8a1a10756e55beeaf7892b98d19d7c5c78e9","signature_b64":"ZWKyG0a3NiCpIh8XUtkviO3jfqglLABGfReAQb4yOFk8CS6FXmdyM5LnSraSTTvnyrydNmZVxVq5jtvdefSvCA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Xkvo4ywAvPj80vhMxpENkOoCScUeGLOPbWD8oweg3fqXdvLVuu5ND2GgWpsaaSqZ9U3tFW199B1BbUPZSKBhAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.686623Z"},"content_sha256":"2ec3a40679d23e3eeeff74bb1aa74ae5fa3da4d20ae78183ac1cb1af3b7449a2","schema_version":"1.0","event_id":"sha256:2ec3a40679d23e3eeeff74bb1aa74ae5fa3da4d20ae78183ac1cb1af3b7449a2"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3597503.3623306.URL:https://doi.org/10.1145/3597503.3623306) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Qi Guo et al. “Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study”. In:Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. ICSE ’24. Lisbon, Portugal: Association for Computing","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":78,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Qi Guo et al. “Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study”. In:Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. ICSE ’24. Lisbon, Portugal: Association for Computing","reconstructed_doi":"10.1145/3597503.3623306.URL:https://doi.org/10.1145/3597503.3623306"},"severity":"advisory","ref_index":78,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3597503.3623306.URL:https://doi.org/10.1145/3597503.3623306","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"326859ac76114c0efba7d9275ccfee5564af53c3b1c350b7b2af347d1aaf66af","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5844,"payload_sha256":"c8f23bf3194d8e1bd9217f3d2969ecbe64300c6a7b9cf1e8cf8040cd0e0d9d2a","signature_b64":"8BBQwGQAKxUXAP0XbnnK5u+Z6x28VRNw9OvsobvyafIcQ5VnuyxIByXmjw9dfBuzrTaM6A2GFmKS9q4E6aIaBg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"33++m3GQc9YPwsHqNDmDYfq/Ug14Qq9hdxcjE0+J7sRVbCzmcwlMxKlcADZ+2Z/KJWohcs4xuLBpg1dvKq5fAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.687175Z"},"content_sha256":"16ec21bd168cc4fb4106d7f415718fb034e091919d1741ebbb1d13eaea5fc9ca","schema_version":"1.0","event_id":"sha256:16ec21bd168cc4fb4106d7f415718fb034e091919d1741ebbb1d13eaea5fc9ca"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1038/s41586-025-09422-z.URL:http://dx.doi.org/10.1038/s41586-025-09422-z) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Daya Guo et al. “DeepSeekR1 incentivizes reasoning in LLMs through reinforcement learning”. In:Nature645.8081 (Sept. 2025), pp. 633–638.ISSN: 1476-4687.DOI:10.1038/s41586- 025- 09422- z.URL:http://dx.doi.org/10.1038/ s41586-025-09422-z","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":76,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Daya Guo et al. “DeepSeekR1 incentivizes reasoning in LLMs through reinforcement learning”. In:Nature645.8081 (Sept. 2025), pp. 633–638.ISSN: 1476-4687.DOI:10.1038/s41586- 025- 09422- z.URL:http://dx.doi.org/10.1038/ s41586-025-09422-z","reconstructed_doi":"10.1038/s41586-025-09422-z.URL:http://dx.doi.org/10.1038/s41586-025-09422-z"},"severity":"advisory","ref_index":76,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1038/s41586-025-09422-z.URL:http://dx.doi.org/10.1038/s41586-025-09422-z","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4afa6879b447768d19605627b0bcf1f30d4c2a03e3497730df376080ebac58a6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5843,"payload_sha256":"f8b188a9f4acf7fc5dbb1309989c72a2cb0270c115ca00f73263b96b3f1f111b","signature_b64":"wWywO1nYhokBXJ1k+krfGbGj6weDkTZcaYxg9Xp0+B/2yL2Ienvhe2bu6oNW1tmJW3z+jdRUf4A2AeUszj6uBw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kqe0gjJyjsBy7uWmvGojqm131QfXTfwRiaHQ6yPs3r2E9iei+85Co8WjTjIjG4CwZMQoIrKXNX5v4gTUEKksCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.687812Z"},"content_sha256":"032d941b3a37a35097bfdeda3c5bdce17277a82cf830912b67ca567ec90deac5","schema_version":"1.0","event_id":"sha256:032d941b3a37a35097bfdeda3c5bdce17277a82cf830912b67ca567ec90deac5"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3747588.url:https://doi.org/10.1145/3747588) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Juyong Jiang, Fan Wang, Jiasi Shen, Sungju Kim, and Sunghun Kim. “A Survey on Large Language Models for Code Generation”. In:ACM Trans. Softw. Eng. Methodol.35.2 (Jan. 2026).ISSN: 1049-331X.DOI:10.1145/3747588.URL: https://doi.org/10.1145/3","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":74,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Juyong Jiang, Fan Wang, Jiasi Shen, Sungju Kim, and Sunghun Kim. “A Survey on Large Language Models for Code Generation”. In:ACM Trans. Softw. Eng. Methodol.35.2 (Jan. 2026).ISSN: 1049-331X.DOI:10.1145/3747588.URL: https://doi.org/10.1145/3","reconstructed_doi":"10.1145/3747588.url:https://doi.org/10.1145/3747588"},"severity":"advisory","ref_index":74,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3747588.url:https://doi.org/10.1145/3747588","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"46087b2748711286a7ad2a50406b514e74b7236ddbce6adc8bc23896684cbfc5","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5842,"payload_sha256":"70364841c7a346750e9040fc2ef90c087674740ad7b8f69cd7189c0123edf3f7","signature_b64":"qdHIpX82I0dle4wHVW00zCj6MIRgqPkpW+qVAWCf1+1SC7tkj/qWoCODsxxBWCip05LJ9dqyrPv2dqQNQIZyAQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"oWV0AFghxggk6yksGkcRWVIMCttZlvLogeYjOkurCX4P/DK2dWbvB6aCzGct8Ucw/vm3zQJk/5DpNt0A8HLCAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.688235Z"},"content_sha256":"eef3308c0b729e6e07095f621e9519fe79870c7e36ee8ca5e339093afefdf6ee","schema_version":"1.0","event_id":"sha256:eef3308c0b729e6e07095f621e9519fe79870c7e36ee8ca5e339093afefdf6ee"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1145/3650212.3680308.url:https://doi.org/10.1145/3650212.3680308' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Zhiyu Fan, Haifeng Ruan, Sergey Mechtaev, and Abhik Roychoudhury. “Oracle-Guided Program Selection from Large Language Models”. In:Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2024. Vie","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1145/3650212.3680308.url:https://doi.org/10.1145/3650212.3680308","arxiv_id":null,"ref_index":73,"raw_excerpt":"Zhiyu Fan, Haifeng Ruan, Sergey Mechtaev, and Abhik Roychoudhury. “Oracle-Guided Program Selection from Large Language Models”. In:Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2024. Vienna, Austria: Association for Computing Machinery, 2024, pp. 628–640.ISBN: 9798400706127.DOI: 10.1145/3650212.3680308.URL:https://doi.org/10.1145/3650212.368030","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":73,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3650212.3680308.url:https://doi.org/10.1145/3650212.3680308","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"f4ae2ed1d137224f606daeeaf7576e3e79cc2b9f6519c1fcb6045b4bcec7875c","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5841,"payload_sha256":"6c9d336e34664eb8fce796a9d54e0e3f944af065c03d79cf8a421cad9cc00de8","signature_b64":"kYMMNintja49HUPUtNqM84c5ZG5RBqpJqvAz1BRkLF6WjlzSkUJwafSWFZ+bxDc2zLt341fqizMYrMGICx0uCQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Oa0rrl5OlhXEWBg0yOCIpbgK74UbCwp/cOffwJZV1NTVpYLd1XRv+yz9Xfi/eyyiirFDMy06+tvivy1F/VYGDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.688592Z"},"content_sha256":"98b76105f2a2ca279c0af509c0f500771b8123da756a00f541f735602ccd9bf9","schema_version":"1.0","event_id":"sha256:98b76105f2a2ca279c0af509c0f500771b8123da756a00f541f735602ccd9bf9"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3600006.3613165.URL:https://doi.org/10.1145/3600006.3613165) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Woosuk Kwon et al. “Efficient Memory Management for Large Language Model Serving with PagedAttention”. In:Pro- ceedings of the 29th Symposium on Operating Systems Principles. SOSP ’23. Koblenz, Germany: Association for Comput- ing Machinery","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":65,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Woosuk Kwon et al. “Efficient Memory Management for Large Language Model Serving with PagedAttention”. In:Pro- ceedings of the 29th Symposium on Operating Systems Principles. SOSP ’23. Koblenz, Germany: Association for Comput- ing Machinery","reconstructed_doi":"10.1145/3600006.3613165.URL:https://doi.org/10.1145/3600006.3613165"},"severity":"advisory","ref_index":65,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3600006.3613165.URL:https://doi.org/10.1145/3600006.3613165","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"5f5deded003c9a661df3df24edce7e707da7f62969d8576bc91ec4a7db8243b4","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5840,"payload_sha256":"a049dff08de371dbd7c730eff8592feef262da1a18037675b54dc9b9de698430","signature_b64":"IGCNDwrP+0EGHpAsob2nPsAeXWfevQvyV8prFwEjwRnWHo5j31WhlOQWuSmATrL+YjVrR/KQv0g2LAq7hLLhCA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GZachzcnn+8r5EzcejCPu2UOHEKM6ourt0DWW5o8dDQ/ZDl4WqYCpoMeHF9pa3rnOywZUHFOU9lNRNaVZcJyBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.688934Z"},"content_sha256":"bee9a7465479bd81f978f1c270b36c34bbfd987abbcf841261a8602c146a08bc","schema_version":"1.0","event_id":"sha256:bee9a7465479bd81f978f1c270b36c34bbfd987abbcf841261a8602c146a08bc"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.physa.2021.126433.URL:https://www.sciencedirect.com/science/article/pii/S0378437121007068) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Eric K. Tokuda, Cesar H. Comin, and Luciano da F. Costa. “Revisiting agglomerative clustering”. In:Physica A: Statistical Mechanics and its Applications585 (2022), p. 126433.ISSN: 0378-4371.DOI:https://doi.org/10.1016/j.physa. 2021.126433.U","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":63,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Eric K. Tokuda, Cesar H. Comin, and Luciano da F. Costa. “Revisiting agglomerative clustering”. In:Physica A: Statistical Mechanics and its Applications585 (2022), p. 126433.ISSN: 0378-4371.DOI:https://doi.org/10.1016/j.physa. 2021.126433.U","reconstructed_doi":"10.1016/j.physa.2021.126433.URL:https://www.sciencedirect.com/science/article/pii/S0378437121007068"},"severity":"advisory","ref_index":63,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.physa.2021.126433.URL:https://www.sciencedirect.com/science/article/pii/S0378437121007068","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"d3732080c5bfc91ec8a2bebfca41b9bf2d9a5970ec14f605d732c5d0f77fcfee","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5839,"payload_sha256":"541c6f4e02ac237fde885469365f49c50d6e7cac0df3924b53685d1a6dc65aec","signature_b64":"sVHx+VozOg0a5KVg70LgKer26bIF39YB38jlwXd5g7nyQ3hFBfVZvA6z2Xzoviibz1zYlydnzz0wbwp0FudwAw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Ykxr7M49XG6XXkPQ+8YIMSoTx9oaR8iO+lVrNwUmmxt6+uniKvIBOxdDoziPBRA/4ga1xshk+z42mQO+T1aaBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.689290Z"},"content_sha256":"3fc14cf915d191a0e0aa26f58eb8eeffe2ca15dceb897dd22e8db340090d61b9","schema_version":"1.0","event_id":"sha256:3fc14cf915d191a0e0aa26f58eb8eeffe2ca15dceb897dd22e8db340090d61b9"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2023.findings-acl.678.url:https://aclanthology.org/2023.findings-acl.678/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, and Hao Chen. “Understanding Programs by Exploiting (Fuzzing) Test Cases”. In:Findings of the Association for Computational Linguistics: ACL 2023. Toronto, Canada: Association for Computationa","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":57,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, and Hao Chen. “Understanding Programs by Exploiting (Fuzzing) Test Cases”. In:Findings of the Association for Computational Linguistics: ACL 2023. Toronto, Canada: Association for Computationa","reconstructed_doi":"10.18653/v1/2023.findings-acl.678.url:https://aclanthology.org/2023.findings-acl.678/"},"severity":"advisory","ref_index":57,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2023.findings-acl.678.url:https://aclanthology.org/2023.findings-acl.678/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"0442c2b34f50a2796edfe1af24822efe9f9cd8115daacb8de3a1e5a98cae1088","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5838,"payload_sha256":"f4c286c4283448488acb259908a67ff9c93b73807b4c41fc12e366fe9573c97b","signature_b64":"vOrTQoVT1r0pWVfI5B2nDEYXgdm2DhlCO09w5D1AHemQ8EuZf8DO6weX26NOh20nRaEdBMgtV3hvmbp4yfoFAA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LMryeBXI24kz7bUzeWaQFG3R6kc2pNRS730VxNpfnvW5wo1Rzgp8RlMkSbbu/TpqVqkUACMYeK2U9UAuFgLuCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.689851Z"},"content_sha256":"e1c6a8eda88629806691fc99143248f9ce490c321f3ec8e32278a85cdf8721aa","schema_version":"1.0","event_id":"sha256:e1c6a8eda88629806691fc99143248f9ce490c321f3ec8e32278a85cdf8721aa"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI '10.18653/v1/2021.emnlp-main.119.url:https://aclanthology.org/2021.emnlp-main.119/' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Lalchand Pandia and Allyson Ettinger. “Sorting through the noise: Testing robustness of information processing in pre- trained language models”. In:Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. Onli","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":54,"raw_excerpt":"Lalchand Pandia and Allyson Ettinger. “Sorting through the noise: Testing robustness of information processing in pre- trained language models”. In:Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. Online and Punta Cana, Dominican Republic: Association for Computational Linguistics, Nov. 2021, pp. 1583–1596.DOI: 10.18653/v1/2021.emnlp-main.119.URL:https://acla","verdict_class":"incontrovertible","doi_as_printed":"10.18653/v1/2021.emnlp-main.119.url:https://aclanthology.org/2021.emnlp-main.119/"},"severity":"critical","ref_index":54,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2021.emnlp-main.119.url:https://aclanthology.org/2021.emnlp-main.119/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"75f91c3ef22e86eefb9c952453150ffc80ec699870d9878d6595883d072307fd","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5837,"payload_sha256":"8e4f10c76aa8b924b5bf6615bf3ea40bae417f1d3d37e1f3a7c1ecb842e50c02","signature_b64":"Zt2MeoRZQcOReaL2rM4wn3S3wyskGSoyk0fxq2ei48JzmXvdITsbNwrXWSBZK/wba0eb/JVfEdp3kX+IcL68CQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"E7A1f0wOZlwmpK8jnL9gGr0TzYUY+S4Rxrl6WQr86TXmxkPcssWgCO5clNsMcqX78lJsKy5TCgpRbDaNeP3UCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.690331Z"},"content_sha256":"dd57d645d9393bd87f5e02f05670d681b5de226423984ff5b72b1eb6cd73829d","schema_version":"1.0","event_id":"sha256:dd57d645d9393bd87f5e02f05670d681b5de226423984ff5b72b1eb6cd73829d"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI '10.18653/v1/w17-3207.url:https://aclanthology.org/w17-3207/' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Markus Freitag and Yaser Al-Onaizan. “Beam Search Strategies for Neural Machine Translation”. In:Proceedings of the First Workshop on Neural Machine Translation. Vancouver: Association for Computational Linguistics, Aug. 2017, pp. 56– 60.DO","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":50,"raw_excerpt":"Markus Freitag and Yaser Al-Onaizan. “Beam Search Strategies for Neural Machine Translation”. In:Proceedings of the First Workshop on Neural Machine Translation. Vancouver: Association for Computational Linguistics, Aug. 2017, pp. 56– 60.DOI:10.18653/v1/W17-3207.URL:https://aclanthology.org/W17-3207/","verdict_class":"incontrovertible","doi_as_printed":"10.18653/v1/w17-3207.url:https://aclanthology.org/w17-3207/"},"severity":"critical","ref_index":50,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/w17-3207.url:https://aclanthology.org/w17-3207/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"d5ca6ec6bfcdd7df3b66c8bab106a77d002b9654b9b6d58c6f10259b73dcff6a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5836,"payload_sha256":"9856117019694f7764d109a1e20ccb765642d4b235d1f34f16ae074e248058d9","signature_b64":"tg0K/O04i/nQsxyOchGouS5WcZ4WEyXE80Ctt8qhd37RArbPihjO74Z9VBJWPIk/Haxj47K8bGLoXsuYoONnBA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"g7QLOjXAvx5xgBOwrsUzTXIhzjSEZZA2GHsfTtFmqbCi5Ge972fcrUGr73aSO+Nt2PUT5MDEpKJLppHGrS/wAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.690700Z"},"content_sha256":"d43d6c517129b0efd33f35810661adf250abf8c8562b6f885363d6f297661562","schema_version":"1.0","event_id":"sha256:d43d6c517129b0efd33f35810661adf250abf8c8562b6f885363d6f297661562"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3613904.3642706.URL:https://doi.org/10.1145/3613904.3642706) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Sydney Nguyen et al. “How Beginning Programmers and Code LLMs (Mis)read Each Other”. In:Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. CHI ’24. Honolulu, HI, USA: Association for Computing Ma- chinery, 2024.IS","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":47,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Sydney Nguyen et al. “How Beginning Programmers and Code LLMs (Mis)read Each Other”. In:Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. CHI ’24. Honolulu, HI, USA: Association for Computing Ma- chinery, 2024.IS","reconstructed_doi":"10.1145/3613904.3642706.URL:https://doi.org/10.1145/3613904.3642706"},"severity":"advisory","ref_index":47,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3613904.3642706.URL:https://doi.org/10.1145/3613904.3642706","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"c9b874b00b7b01399bd33b9bf2c54907f730cd3704fbea9cba2d7f237db2e5ea","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5835,"payload_sha256":"87cb3f285ec01ceb6b8577bde90ef514e552112d14c87e57cd4e769f7638366a","signature_b64":"lm+d8aC3eYIl6F9IpuZ6qwdIHbdXuVSpvozB+DSkB60AYB+e/sisAjeWy9MV+VVacvNGME2TdY2tIa7GmATaAw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KuLASwaBgFZ9gkh8ZMIbQutzKAvaSBzbIs9Z8wX5WduGyM9qMyRUdaWzGF6HwzuINopmU6vnoEWI3Vq27PSyAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.691214Z"},"content_sha256":"8f67a698a1c09d6150660ed299f35de51f0fad89df5c949e789082071cfaffaf","schema_version":"1.0","event_id":"sha256:8f67a698a1c09d6150660ed299f35de51f0fad89df5c949e789082071cfaffaf"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1145/3722108.url:https://doi.org/10.1145/3722108' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Catherine Tony, Nicol ´as E. D´ıaz Ferreyra, Markus Mutas, Salem Dhif, and Riccardo Scandariato. “Prompting Techniques for Secure Code Generation: A Systematic Investigation”. In:ACM Trans. Softw. Eng. Methodol.34.8 (Oct. 2025).ISSN: 1049-3","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1145/3722108.url:https://doi.org/10.1145/3722108","arxiv_id":null,"ref_index":46,"raw_excerpt":"Catherine Tony, Nicol ´as E. D´ıaz Ferreyra, Markus Mutas, Salem Dhif, and Riccardo Scandariato. “Prompting Techniques for Secure Code Generation: A Systematic Investigation”. In:ACM Trans. Softw. Eng. Methodol.34.8 (Oct. 2025).ISSN: 1049-331X.DOI:10.1145/3722108.URL:https://doi.org/10.1145/3722108","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":46,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3722108.url:https://doi.org/10.1145/3722108","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"410a8c8859a8e0fadca8910acdfd2c65b6e4f9fb12b730c6b6568872c44fcc32","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5834,"payload_sha256":"55e13912636ecda444c05ad68f487d862ac797b846cd6bcb35cf48b7fdf444ae","signature_b64":"dATTceI3jcqjfp8zQlPhiosU6ENEHeYpS7WwFOErL5VS5HM0cImxY2gDW//8Y2hDuL8jXAgdXL9/9NVgy/v6Dw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XCmyV3qkL93iwCNt1CukyY/SMAUhTXdQEF0l9jNXLjp4l8YOlAkKAn51e+cT0sBCi44lku/eypcgZz0EaXxqCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.691824Z"},"content_sha256":"ea2a0f4f7b5762f2f800ae1169ac17696209026467069fd3fc0d3a326f6ab2e8","schema_version":"1.0","event_id":"sha256:ea2a0f4f7b5762f2f800ae1169ac17696209026467069fd3fc0d3a326f6ab2e8"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3715754.URL:https://doi.org/10.1145/3715754) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Chunqiu Steven Xia, Yinlin Deng, Soren Dunn, and Lingming Zhang. “Demystifying LLM-Based Software Engineering Agents”. In:Proc. ACM Softw. Eng.2.FSE (June 2025).DOI:10.1145/3715754.URL:https://doi.org/10.1145/ 3715754","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":40,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Chunqiu Steven Xia, Yinlin Deng, Soren Dunn, and Lingming Zhang. “Demystifying LLM-Based Software Engineering Agents”. In:Proc. ACM Softw. Eng.2.FSE (June 2025).DOI:10.1145/3715754.URL:https://doi.org/10.1145/ 3715754","reconstructed_doi":"10.1145/3715754.URL:https://doi.org/10.1145/3715754"},"severity":"advisory","ref_index":40,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3715754.URL:https://doi.org/10.1145/3715754","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"472ad98a75b76b62a2e7324261dc7957407bec093612671ee74839792342780b","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5833,"payload_sha256":"190bb2406b49ef384ea863349da4c24d47dbe9d9420d1199c394e2c22963f9c1","signature_b64":"MHd9wSzsZlZGffeAWhNQAb5UaSx6h0gVoA/6GEmWrRUkvZneKPQi6YagthyH7+HeYKAX685TkKusV59y33SUDg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FzMNavM/uZVGfE2DA03IZdhn8CDyujxUyF2sn1x+Wiy4CPtF0INepFUX8W25Rxzlo4SqPDOgbNXaFue73G/gCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.692185Z"},"content_sha256":"577ff461911dec2bceb80e74da8428af500aa832d6c2997172c7cd1fe900d544","schema_version":"1.0","event_id":"sha256:577ff461911dec2bceb80e74da8428af500aa832d6c2997172c7cd1fe900d544"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2024.findings-emnlp.432.URL:https://aclanthology.org/2024.findings-emnlp.432/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Matthew Renze. “The Effect of Sampling Temperature on Problem Solving in Large Language Models”. In:Findings of the Association for Computational Linguistics: EMNLP 2024. Miami, Florida, USA: Association for Computational Linguistics, Nov. ","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":39,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Matthew Renze. “The Effect of Sampling Temperature on Problem Solving in Large Language Models”. In:Findings of the Association for Computational Linguistics: EMNLP 2024. Miami, Florida, USA: Association for Computational Linguistics, Nov. ","reconstructed_doi":"10.18653/v1/2024.findings-emnlp.432.URL:https://aclanthology.org/2024.findings-emnlp.432/"},"severity":"advisory","ref_index":39,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2024.findings-emnlp.432.URL:https://aclanthology.org/2024.findings-emnlp.432/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4926433b554e9690d6d7e2137a2ee944c3331d7ec7213e52f9a80f3043e47072","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5832,"payload_sha256":"79bc3df0bceb6aa1e4228c856d607ded60d651e74d0695673fd8ebaf24291f1b","signature_b64":"rHcYanBJ8NIHIXIzSDx1xCWTLCGzJkNJrlKA0q+5n5Hrnc+OYMsR2Hh66LUvqgreN274+TD4a6c6FwzrYZS8BQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OuiAzMLbrQXkaMVi6woViKCF7ZCBv0SC+QThhl0Iwx2p/FF+gFvdEwg2ub+CO8/EtRxcVQVyCCqagAFrktH2DQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.692516Z"},"content_sha256":"bd8a7507d81482960193d8deee78afc7bc2f60821e967dacbdbbd3daf642070f","schema_version":"1.0","event_id":"sha256:bd8a7507d81482960193d8deee78afc7bc2f60821e967dacbdbbd3daf642070f"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI '10.18653/v1/w17-4912.url:https://aclanthology.org/w17-4912/' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Jessica Ficler and Yoav Goldberg. “Controlling Linguistic Style Aspects in Neural Language Generation”. In:Proceedings of the Workshop on Stylistic Variation. Copenhagen, Denmark: Association for Computational Linguistics, Sept. 2017, pp. 9","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":38,"raw_excerpt":"Jessica Ficler and Yoav Goldberg. “Controlling Linguistic Style Aspects in Neural Language Generation”. In:Proceedings of the Workshop on Stylistic Variation. Copenhagen, Denmark: Association for Computational Linguistics, Sept. 2017, pp. 94–104.DOI:10.18653/v1/W17-4912.URL:https://aclanthology.org/W17-4912/","verdict_class":"incontrovertible","doi_as_printed":"10.18653/v1/w17-4912.url:https://aclanthology.org/w17-4912/"},"severity":"critical","ref_index":38,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/w17-4912.url:https://aclanthology.org/w17-4912/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"38e8b4de8f7d29f53495c236fd5c59aae9fbe94cc5a0e51739c319aa187e6217","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5831,"payload_sha256":"39102c592624f0130ead6df73e6a7d5b3dd2ec8809b4ed724568ec632cbddcbd","signature_b64":"R8p9156LTQn1zkMqjr9uy0y3SJfFzpG7iReSHyii1fpBRly82gefwpbjHf7X94sA+2ZPpl9dyAZfj6nuvqq1Bg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vyDV0xVLHylkMVkDkVOUBtNe0Nbtgjg+byhRXuaqOq7c+TuybAwNzb9UeIiJzUHHXYgo+w/SHkCm64qV0rJrCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.692869Z"},"content_sha256":"0639e90cf5148baf93125b1b2fc73f0356ad684c9d3377963bf99f76dba6d92e","schema_version":"1.0","event_id":"sha256:0639e90cf5148baf93125b1b2fc73f0356ad684c9d3377963bf99f76dba6d92e"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI '10.18653/v1/2025.emnlp-main.150.url:https://aclanthology.org/2025.emnlp-main.150/' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Hongxiang Zhang, Hao Chen, Muhao Chen, and Tianyi Zhang. “Active Layer-Contrastive Decoding Reduces Hallucination in Large Language Model Generation”. In:Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":35,"raw_excerpt":"Hongxiang Zhang, Hao Chen, Muhao Chen, and Tianyi Zhang. “Active Layer-Contrastive Decoding Reduces Hallucination in Large Language Model Generation”. In:Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing. Suzhou, China: Association for Computational Linguistics, Nov. 2025, pp. 3028–3046.ISBN: 979-8-89176-332- 6.DOI:10.18653/v1/2025.emnlp-main.150.URL:https://ac","verdict_class":"incontrovertible","doi_as_printed":"10.18653/v1/2025.emnlp-main.150.url:https://aclanthology.org/2025.emnlp-main.150/"},"severity":"critical","ref_index":35,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.emnlp-main.150.url:https://aclanthology.org/2025.emnlp-main.150/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"e9464b1ea42adbd3278d9985c42fe60e1e72cca276f14d4833d5292662816717","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5830,"payload_sha256":"70e3102c7b476cfaffcd86ad0d4dd88d3ea488a8d140fed250641d48ae9fa85c","signature_b64":"0H+SQsKWnLZe87LWF3nD5wcXfa3soFCmywgp590+ZAePM+77+rHslRWOKWROkR+Dy/z6nYlgdj0K4iR3HwxxCw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"NlZX5zhJN92PgENTtdcSEo9vDv6S4QQCX8g4QIDMt2rgQkulRj6TEoauXETxP0aWGZqE3d3ENXH5yNzngTD7CA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.693198Z"},"content_sha256":"e6815480fae26998eef19c06a81f43e418060a70aa1ec61fe2db1ebd43f586af","schema_version":"1.0","event_id":"sha256:e6815480fae26998eef19c06a81f43e418060a70aa1ec61fe2db1ebd43f586af"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/P18-1082.URL:https://aclanthology.org/P18-1082/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Angela Fan, Mike Lewis, and Yann Dauphin. “Hierarchical Neural Story Generation”. In:Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Melbourne, Australia: Association for Comp","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":33,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Angela Fan, Mike Lewis, and Yann Dauphin. “Hierarchical Neural Story Generation”. In:Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Melbourne, Australia: Association for Comp","reconstructed_doi":"10.18653/v1/P18-1082.URL:https://aclanthology.org/P18-1082/"},"severity":"advisory","ref_index":33,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/P18-1082.URL:https://aclanthology.org/P18-1082/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"520d634e36ccdf0c98ba087f0f4e153fe9aa18aa42cbc8db3feb54a63ebeb540","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5829,"payload_sha256":"bcc74ac3eb7dc79c6355e8e6792a87a0f51b0799945813100b57dcf7a1ed9ed9","signature_b64":"d/LGx2ZQPdFttLnSCjRJ8cErtB556CbUs4IH0jVdEqVb/ATX4zVIq+RxH4D21UjhfaEVymR7wnzKe040GW61CA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ZVP534gcCCtY50ZmjBk4vhTodIoVMbfSZtS+yJ/7ItjKgAYN2Z8T3ifqr/EK+zTAYTGskMqkuOh5tMq1CMXKCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.693509Z"},"content_sha256":"49f514ca057b27e1c8ec38a3cc04c7ad9c4df16b42948f3fbe7278c4e17d66b4","schema_version":"1.0","event_id":"sha256:49f514ca057b27e1c8ec38a3cc04c7ad9c4df16b42948f3fbe7278c4e17d66b4"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI '10.18653/v1/p18-1152.url:https://aclanthology.org/p18-1152/' as printed in the bibliography is syntactically invalid and cannot resolve.","snippet":"Ari Holtzman et al. “Learning to Write with Cooperative Discriminators”. In:Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Melbourne, Australia: Association for Computational","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":31,"raw_excerpt":"Ari Holtzman et al. “Learning to Write with Cooperative Discriminators”. In:Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Melbourne, Australia: Association for Computational Linguistics, July 2018, pp. 1638–1649.DOI:10.18653/v1/P18-1152.URL:https://aclanthology.org/P18-1152/","verdict_class":"incontrovertible","doi_as_printed":"10.18653/v1/p18-1152.url:https://aclanthology.org/p18-1152/"},"severity":"critical","ref_index":31,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/p18-1152.url:https://aclanthology.org/p18-1152/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"broken_identifier","evidence_hash":"91c577ab0c8961a5bca71007ce879e068cd8aaaa82bd108e1990c2a60686e67d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5828,"payload_sha256":"1b9fc5a19f11d413d6d349ac19bf6b728adf7897894615ae75189d624e03dd72","signature_b64":"onjd5TnuCYzY7H04eu2Mzk2gxiW19zI7R9Rblas4+VkfpRAh546/0/JoQKY96Ry7tjUxiQOpWVIc9ZKcVJTDCw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"d2Rd+VYuzLm9RIIb+UGMBY416c5bbM43vmGv6mkTzSU457xI+oVd4U3zAEA3ZHa1F5gy9k6IrKoZ4eSI07BnBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.693801Z"},"content_sha256":"c9eb6848e47dd8615b16e061589dd8bb4251e8dc6f6188aeddc477100ba6194b","schema_version":"1.0","event_id":"sha256:c9eb6848e47dd8615b16e061589dd8bb4251e8dc6f6188aeddc477100ba6194b"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.findings-emnlp.847.URL:https://aclanthology.org/2025.findings-emnlp.847/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Yifeng He, Jicheng Wang, Yuyang Rong, and Hao Chen. “FuzzAug: Data Augmentation by Coverage-guided Fuzzing for Neural Test Generation”. In:Findings of the Association for Computational Linguistics: EMNLP 2025. Suzhou, China: Association for","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":30,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Yifeng He, Jicheng Wang, Yuyang Rong, and Hao Chen. “FuzzAug: Data Augmentation by Coverage-guided Fuzzing for Neural Test Generation”. In:Findings of the Association for Computational Linguistics: EMNLP 2025. Suzhou, China: Association for","reconstructed_doi":"10.18653/v1/2025.findings-emnlp.847.URL:https://aclanthology.org/2025.findings-emnlp.847/"},"severity":"advisory","ref_index":30,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.findings-emnlp.847.URL:https://aclanthology.org/2025.findings-emnlp.847/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"94bd336842ff528ab15020c0bcf499a03977da9bf8051b490724082dfd0d1450","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5827,"payload_sha256":"e2b1882a36ff012ed1d9498613b860bc9ebcde2fd3c9fd25441d59d05770c5c3","signature_b64":"EL2fe73RnseVKrlN+xmmSni+wvQmn4qATm32fUk27A1zsOT2t9leHV6NF/kGbwtt8qNNNmkGspd58NyiEdYmDw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8h0Xa+RDGRcHSDQLg11n0NxGY5ynnam8M2pZXPGXnova9iWImpv7zpvgdbUL1629Hv6WjEdY9LPC6EoqiXx1Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.694089Z"},"content_sha256":"977da92c34e2a6dd23db191e69ca63247c22d8bdebbd6a7a025fae360553a19c","schema_version":"1.0","event_id":"sha256:977da92c34e2a6dd23db191e69ca63247c22d8bdebbd6a7a025fae360553a19c"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1145/2884781.2884878.url:https://doi.org/10.1145/2884781.2884878' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Junjie Chen et al. “An empirical comparison of compiler testing techniques”. In:Proceedings of the 38th International Conference on Software Engineering. ICSE ’16. Austin, Texas: Association for Computing Machinery, 2016, pp. 180–190. ISBN:","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1145/2884781.2884878.url:https://doi.org/10.1145/2884781.2884878","arxiv_id":null,"ref_index":28,"raw_excerpt":"Junjie Chen et al. “An empirical comparison of compiler testing techniques”. In:Proceedings of the 38th International Conference on Software Engineering. ICSE ’16. Austin, Texas: Association for Computing Machinery, 2016, pp. 180–190. ISBN: 9781450342056.DOI:10.1145/2884781.2884878.URL:https://doi.org/10.1145/2884781.2884878","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":28,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/2884781.2884878.url:https://doi.org/10.1145/2884781.2884878","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"2613217c5bcc4d4cf1467ed10014f89f606074ea42e0bc2b73901fcde01934f0","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5826,"payload_sha256":"2e5bc55144bda1d4305646480f7ce7bea79a0886eaf46510a086a1521d4af148","signature_b64":"+prA/r/U/v0+vCCc6Zr7N/V0rdxLVwpRiYRg5ue68cZTP1whb0vZ58vRPrNCpDEQCyVu6qMYsewphePHKteHDg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1ainvJ7AX6UtrljAFWvGz2QLmrbmuqiVOCFi0hgLzBP+xnirbsxrC/Rdei0jqEIT/P0kdl5zhQ5Vy8wbA1oUDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.694405Z"},"content_sha256":"478ea423523b34a9d5473699d8f1b5ddba03881b4a7ae0e5e9c2ce76d44db3d4","schema_version":"1.0","event_id":"sha256:478ea423523b34a9d5473699d8f1b5ddba03881b4a7ae0e5e9c2ce76d44db3d4"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/ICSE.2019.00122.URL:https://doi.org/10.1109/ICSE.2019.00122) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Shirin Nilizadeh, Yannic Noller, and Corina S. P ˘as˘areanu. “DifFuzz: differential fuzzing for side-channel analysis”. In: Proceedings of the 41st International Conference on Software Engineering. ICSE ’19. Montreal, Quebec, Canada: IEEE P","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":27,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Shirin Nilizadeh, Yannic Noller, and Corina S. P ˘as˘areanu. “DifFuzz: differential fuzzing for side-channel analysis”. In: Proceedings of the 41st International Conference on Software Engineering. ICSE ’19. Montreal, Quebec, Canada: IEEE P","reconstructed_doi":"10.1109/ICSE.2019.00122.URL:https://doi.org/10.1109/ICSE.2019.00122"},"severity":"advisory","ref_index":27,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/ICSE.2019.00122.URL:https://doi.org/10.1109/ICSE.2019.00122","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"83786b2575a5967e766949db06d36035ad4efba31d4dc99d9581e7de07f04914","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5825,"payload_sha256":"f42b1236a816353010c6c339f4febec7cd4c0cae3847ea204de6d29bd4c83345","signature_b64":"z3xKUc+AFkRJN/c2Ti/RlbBk8IPIE0F4buSqmADQpsLyowH/4H6uXy+HOz1Jq9dYcqrH1ooFoBjVFcKhHOt1Aw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"zgPXYNcSyN3KsRxJGadvKSg7xMlmMYpJu9xNUpQsuk7FNR+H1+L6iHh7brlsmolNfYXjDCe99ZKyfax7SvRSDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.694744Z"},"content_sha256":"8905f70224b68f6ac468f2441aad1d03391f4e140ff928b1f7f7fa19ca97ea03","schema_version":"1.0","event_id":"sha256:8905f70224b68f6ac468f2441aad1d03391f4e140ff928b1f7f7fa19ca97ea03"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3319535.3363225.url:https://doi.org/10.1145/3319535.3363225) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Peng Chen, Jianzhong Liu, and Hao Chen. “Matryoshka: Fuzzing Deeply Nested Branches”. In:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS ’19. London, United Kingdom: Association for Computing Machi","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":24,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Peng Chen, Jianzhong Liu, and Hao Chen. “Matryoshka: Fuzzing Deeply Nested Branches”. In:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS ’19. London, United Kingdom: Association for Computing Machi","reconstructed_doi":"10.1145/3319535.3363225.url:https://doi.org/10.1145/3319535.3363225"},"severity":"advisory","ref_index":24,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3319535.3363225.url:https://doi.org/10.1145/3319535.3363225","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"5a99f7ba2c6828ff8b6568039d6a319249aac0b0682b530f82c8cf9e952618f2","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5824,"payload_sha256":"550e7e057e937fd1136a3385837942023866fc0d2a34626f9d170bd0077404be","signature_b64":"yP34wqnctIhMV8laLs9LtTuP+aqrwmMBAOjctnxXLtDVRGUzCamMwihdjoxm0uHAiGXrIDLvDm8PZzpNeDNUBg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"k2GHzb7zCaJNohVfi0oilW0giaQxtERJyWJkFPHWMXmS5EMopfx4X3ytORllXDYFFPIQ6bu8WgsScEE10dzaCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.695037Z"},"content_sha256":"9c328185246db07da2097ef3844bf60240a11f9e5347b8b03a90aed013a01822","schema_version":"1.0","event_id":"sha256:9c328185246db07da2097ef3844bf60240a11f9e5347b8b03a90aed013a01822"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.60882/cispa.24614928.v1.url:https://publications.cispa.de/articles/book/the_fuzzing_Book/24614928) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Andreas Zeller, Rahul Gopinath, Marcel B ¨ohme, Gordon Fraser, and Christian Holler. “The Fuzzing Book”. In: (Jan. 2019). DOI:10.60882/cispa.24614928.v1.URL:https://publications.cispa.de/articles/book/The_Fuzzing_ Book/24614928","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":23,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Andreas Zeller, Rahul Gopinath, Marcel B ¨ohme, Gordon Fraser, and Christian Holler. “The Fuzzing Book”. In: (Jan. 2019). DOI:10.60882/cispa.24614928.v1.URL:https://publications.cispa.de/articles/book/The_Fuzzing_ Book/24614928","reconstructed_doi":"10.60882/cispa.24614928.v1.url:https://publications.cispa.de/articles/book/the_fuzzing_Book/24614928"},"severity":"advisory","ref_index":23,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.60882/cispa.24614928.v1.url:https://publications.cispa.de/articles/book/the_fuzzing_Book/24614928","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"3b744308aaf3e72f4f2bae2940aa10234f623956536af4730e923ca3d7fc08bc","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5823,"payload_sha256":"b388cbb82ee65b0a81043c0a5be9d135c5ffb4c3acaa8231ab2a586e38d7d276","signature_b64":"oKqa+LVveZbpEzNDiCC2/ARlGIpTDza0rBHGR1eFY9mm6o5nAiuJuMmzGGEkEykjgoTnWdFLZ+ZMZ/0B/QlgAQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8XFRqfB2QZMyvVazT01gKdA3cIxud5K5cuFz1INEEtc44wjHh/LQwmu7xNk06y008BH77IV8SKxy1cGANcdgDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.695367Z"},"content_sha256":"b3b20fc516af97f71ec9673d3497c7013aca5de1e2ac3f282ff062f2fd13e1aa","schema_version":"1.0","event_id":"sha256:b3b20fc516af97f71ec9673d3497c7013aca5de1e2ac3f282ff062f2fd13e1aa"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1145/3428279.url:https://doi.org/10.1145/3428279' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Manuel Rigger and Zhendong Su. “Testing Database Engines via Pivoted Query Synthesis”. In:Proc. ACM Program. Lang. 4.OOPSLA (Nov. 2020).DOI:10.1145/3428279.URL:https://doi.org/10.1145/3428279","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1145/3428279.url:https://doi.org/10.1145/3428279","arxiv_id":null,"ref_index":19,"raw_excerpt":"Manuel Rigger and Zhendong Su. “Testing Database Engines via Pivoted Query Synthesis”. In:Proc. ACM Program. Lang. 4.OOPSLA (Nov. 2020).DOI:10.1145/3428279.URL:https://doi.org/10.1145/3428279","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":19,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3428279.url:https://doi.org/10.1145/3428279","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"51195e6932bba5c37986a7f59008fc9ace46e56446aa341e4db9e46933d83a13","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5822,"payload_sha256":"56f8751952082e7b699503ff26cf39ac360375ee47ca5624d039406c8e0805c8","signature_b64":"LfwgPFioMKol+n94vYpwVO69Jx6NZiIShac38rsByMO+O0DhRq9Nuh2QA1e/9qIdstmnTCSnT4/WqujO0d2bBg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8r86pzpFaDH25OG7J5o9aWkyz0ILMGOH5JppblF48hU4vURL+dkeEg1sjssSDfjdeCtfOFvbZxdhnIuJZ5yhBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.695811Z"},"content_sha256":"670163c40d1d4a1d45fba956fa04c9cc27283f3bc3e7d4a7d5e217d88bdd2bf4","schema_version":"1.0","event_id":"sha256:670163c40d1d4a1d45fba956fa04c9cc27283f3bc3e7d4a7d5e217d88bdd2bf4"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3022671.2984038.URL:https://doi.org/10.1145/3022671.2984038) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Chengnian Sun, Vu Le, and Zhendong Su. “Finding compiler bugs via live code mutation”. In:SIGPLAN Not.51.10 (Oct. 2016), pp. 849–863.ISSN: 0362-1340.DOI:10.1145/3022671.2984038.URL:https://doi.org/10.1145/3022671. 2984038","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":18,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Chengnian Sun, Vu Le, and Zhendong Su. “Finding compiler bugs via live code mutation”. In:SIGPLAN Not.51.10 (Oct. 2016), pp. 849–863.ISSN: 0362-1340.DOI:10.1145/3022671.2984038.URL:https://doi.org/10.1145/3022671. 2984038","reconstructed_doi":"10.1145/3022671.2984038.URL:https://doi.org/10.1145/3022671.2984038"},"severity":"advisory","ref_index":18,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3022671.2984038.URL:https://doi.org/10.1145/3022671.2984038","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"bf543331a71cd2fa61bdf23672b11a144304bec81c1c0b8f9ef49452cac51bb4","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5821,"payload_sha256":"40f82ef1a50fa3a6df54e8f054b2b787b305f7d3a53f5d70c254873814610687","signature_b64":"zRWjCCZmieEnR0UyDvITyBJrZ4HP7MBWT4v2lsNn6EJzafb1MJLfkt3BpPrBgx6QWcu6pbSF33c5cy5MlibfDg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SxrFkkn/YTOfNSkaBnExuOqUzSxNTIWGdUsChSoIe87jJpWxoAq3sybqeCTewWWA/siSJumk/ElaJNFqbEDhDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.696143Z"},"content_sha256":"27d52faf621fc10b0ce320701b4984d21620a5e74433963e1ec70b0e73f63a93","schema_version":"1.0","event_id":"sha256:27d52faf621fc10b0ce320701b4984d21620a5e74433963e1ec70b0e73f63a93"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/2666356.2594334.URL:https://doi.org/10.1145/2666356.2594334) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Vu Le, Mehrdad Afshari, and Zhendong Su. “Compiler validation via equivalence modulo inputs”. In:SIGPLAN Not.49.6 (June 2014), pp. 216–226.ISSN: 0362-1340.DOI:10.1145/2666356.2594334.URL:https://doi.org/10.1145/ 2666356.2594334","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":17,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Vu Le, Mehrdad Afshari, and Zhendong Su. “Compiler validation via equivalence modulo inputs”. In:SIGPLAN Not.49.6 (June 2014), pp. 216–226.ISSN: 0362-1340.DOI:10.1145/2666356.2594334.URL:https://doi.org/10.1145/ 2666356.2594334","reconstructed_doi":"10.1145/2666356.2594334.URL:https://doi.org/10.1145/2666356.2594334"},"severity":"advisory","ref_index":17,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/2666356.2594334.URL:https://doi.org/10.1145/2666356.2594334","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f92900276c2b94cc0a991c616bf467539e982a1e95c15ce871297ca2eb32c8d0","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5820,"payload_sha256":"45271785f5a96aa6a89103a12bb5160df3b170446af4905493380664927f052c","signature_b64":"SlcN7ekODa5cFIrkRjZmwUMnvpZBW5yiA1tbWf6B3YqNb3gRVsEiPBoBHkqhYXHRUIq/Ibbiy+R6nyQIsKV6Cg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xloTqW+jEGqaunYhWxmRTkQeRxtUBf/y6CvYYLJlFv5q/yfydqGKmOfI+ml8Tzp4+Cp9u7FbIpg+S51JrO1LAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.696494Z"},"content_sha256":"c96fb7adb023a37a9b3d7ca3086ed625cd8d381d81e12bc2743d79e4ed80bdc4","schema_version":"1.0","event_id":"sha256:c96fb7adb023a37a9b3d7ca3086ed625cd8d381d81e12bc2743d79e4ed80bdc4"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1993316.1993532.URL:https://doi.org/10.1145/1993316.1993532) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Xuejun Yang, Yang Chen, Eric Eide, and John Regehr. “Finding and understanding bugs in C compilers”. In:SIGPLAN Not.46.6 (June 2011), pp. 283–294.ISSN: 0362-1340.DOI:10.1145/1993316.1993532.URL:https://doi.org/10. 1145/1993316.1993532","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":16,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Xuejun Yang, Yang Chen, Eric Eide, and John Regehr. “Finding and understanding bugs in C compilers”. In:SIGPLAN Not.46.6 (June 2011), pp. 283–294.ISSN: 0362-1340.DOI:10.1145/1993316.1993532.URL:https://doi.org/10. 1145/1993316.1993532","reconstructed_doi":"10.1145/1993316.1993532.URL:https://doi.org/10.1145/1993316.1993532"},"severity":"advisory","ref_index":16,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/1993316.1993532.URL:https://doi.org/10.1145/1993316.1993532","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"a34c0efab8c99f0a9105141fd332f7d6dee79ee113ef1604702e3f2dc23c8734","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5819,"payload_sha256":"4fb87206ebc624fba074121acca407f2dc4c6b3812bb3df3920edc0677672886","signature_b64":"wPt4e1u6UcNRw5OuVehT4Q6I6GLkZGPyWS519cuQGyK5SX6iHsST2tDq8SulUakbVxWWR8UQhSYrk1Lsu7thAg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"YGWvYTf1AKEP9Wu2NjsA+SxbkCMq9V+pFunWE7o17K/spMFzC1NK07YwTfY3VqUvx68rlezjY/8INIKL/L25Aw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.696794Z"},"content_sha256":"e183976fbf397696c723dec5000ae036667883ad5892926fc0da824d61a9d922","schema_version":"1.0","event_id":"sha256:e183976fbf397696c723dec5000ae036667883ad5892926fc0da824d61a9d922"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1145/3582016.3582053.url:https://doi.org/10.1145/3582016.3582053' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Shaohua Li and Zhendong Su. “Finding Unstable Code via Compiler-Driven Differential Testing”. In:Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3. ASPLOS","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1145/3582016.3582053.url:https://doi.org/10.1145/3582016.3582053","arxiv_id":null,"ref_index":14,"raw_excerpt":"Shaohua Li and Zhendong Su. “Finding Unstable Code via Compiler-Driven Differential Testing”. In:Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3. ASPLOS 2023. Vancouver, BC, Canada: Association for Computing Machinery, 2023, pp. 238–251.ISBN: 9781450399180.DOI:10.1145/3582016.3582053.URL:https://doi.org/10.1145","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":14,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3582016.3582053.url:https://doi.org/10.1145/3582016.3582053","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"f9cfc74863cdc897fae961d5987a999451176e67737f46707c8bf11ea9fd1031","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5818,"payload_sha256":"7329f6f5dd5142e3664d4e87cad4c34373baa81ac6136181c86639a63e7c6907","signature_b64":"+D9WHh731HQKZMvOI4hs9ybG0WgnTazS4mDDwFnAH+eAjjSpIFCYRg4JOQWq+iywQwaFVHBchiOfUDx3ZbDYAQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hYi8+e80LKuciRa39oU38nMbxWJGQV2Yo07IVNm5tOlLUFGeqsFyrTQW9QEPDqAfRVl+vJjwyCD9gddqvlDFCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.697105Z"},"content_sha256":"4210c1b1d67abf30cb9c359e380ae03914c6d23f413e8a37dd9b5e703f80c12e","schema_version":"1.0","event_id":"sha256:4210c1b1d67abf30cb9c359e380ae03914c6d23f413e8a37dd9b5e703f80c12e"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"Identifier '10.1109/icse.2019.00061.url:https://doi.org/10.1109/icse.2019.00061' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Yibiao Yang et al. “Hunting for bugs in code coverage tools via randomized differential testing”. In:Proceedings of the 41st International Conference on Software Engineering. ICSE ’19. Montreal, Quebec, Canada: IEEE Press, 2019, pp. 488–499","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"doi":"10.1109/icse.2019.00061.url:https://doi.org/10.1109/icse.2019.00061","arxiv_id":null,"ref_index":13,"raw_excerpt":"Yibiao Yang et al. “Hunting for bugs in code coverage tools via randomized differential testing”. In:Proceedings of the 41st International Conference on Software Engineering. ICSE ’19. Montreal, Quebec, Canada: IEEE Press, 2019, pp. 488–499. DOI:10.1109/ICSE.2019.00061.URL:https://doi.org/10.1109/ICSE.2019.00061","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":13,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/icse.2019.00061.url:https://doi.org/10.1109/icse.2019.00061","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"343f504eb9c6decc593eb759439c9346761e8254747b93fe5f515a50f57b2a06","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5817,"payload_sha256":"5b2452cac1c23da6b43fc50cb8eca418147b153a474d4bc7b1f7c66651104e53","signature_b64":"PEqhrjFAr2Me6IyumMZAbytFOxNA5t+6BEPxMxSeMzL2SJBlL/Hs/xklF6PJ5tgl3RXgKY/GJ5QwNUKnvKTuDQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vFy7yw0wXb+++vfPd793/BgRwBNGJ3DwSLzsRgg1RoWiFaskcZtSJVFSF9TmciBJ7DZOH1dyHLlC/8sjXWxsAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.697408Z"},"content_sha256":"3572ae5fd4ef6be3287d4c197b5a30be2464952b377f59af1af737e7be1253fd","schema_version":"1.0","event_id":"sha256:3572ae5fd4ef6be3287d4c197b5a30be2464952b377f59af1af737e7be1253fd"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1295014.1295038.URL:https://doi.org/10.1145/1295014.1295038) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Robert B. Evans and Alberto Savoia. “Differential testing: a new approach to change detection”. In:The 6th Joint Meeting on European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engi- neering:","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":12,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Robert B. Evans and Alberto Savoia. “Differential testing: a new approach to change detection”. In:The 6th Joint Meeting on European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engi- neering:","reconstructed_doi":"10.1145/1295014.1295038.URL:https://doi.org/10.1145/1295014.1295038"},"severity":"advisory","ref_index":12,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/1295014.1295038.URL:https://doi.org/10.1145/1295014.1295038","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"64161fb474457add09dc77af1af4658dd418dcc22da1ce2dc0620b077493e06d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5816,"payload_sha256":"c8978d905c2a4e0eb4745cbc3ed4145704c8d03eb93eda88c4c18c19bd6f98fc","signature_b64":"Z7PapnOyi+YH3wRKYjSjjEVAeeDwdsge5OjyeSo80uexXu1Dzsr1oKpnWtZXImgN6zThlVkIy2vr1eduVzkCBw==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"HVO0Qw1OExhHoGpyylUh5ZXd53AHq0jgqPhoAEuLxnu6y50EKPkVSQttUgNSV+9d5mR+kIszSfp21z18eVv1CQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.697712Z"},"content_sha256":"2fdb897ae6a4f8672f2279743440923283bda37ac73677a5e6666a44cf38e776","schema_version":"1.0","event_id":"sha256:2fdb897ae6a4f8672f2279743440923283bda37ac73677a5e6666a44cf38e776"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.acl-long.881.URL:https://aclanthology.org/2025.acl-long.881/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Xiancai Chen et al. “Revisit Self-Debugging with Self-Generated Tests for Code Generation”. In:Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Vienna, Austria: Association for","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":10,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Xiancai Chen et al. “Revisit Self-Debugging with Self-Generated Tests for Code Generation”. In:Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Vienna, Austria: Association for","reconstructed_doi":"10.18653/v1/2025.acl-long.881.URL:https://aclanthology.org/2025.acl-long.881/"},"severity":"advisory","ref_index":10,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.acl-long.881.URL:https://aclanthology.org/2025.acl-long.881/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"9d0a0654afaf2b6f5350defde48f7d77bf4849c4a7ce573b3d913f63f0b61551","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5815,"payload_sha256":"97e3f1f22c6433e81ba8790a7e99c648669a69bb19dae4d6da342d68b5c2527e","signature_b64":"DFaoyAOFLEcGw67TaEkpbBBwsQq45dWBktyYU0TOrNtDBulFY7lbgdYQYz1PI93zbMiCb7ewDShrYKm7eSEJDg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uxYuVaZeT+YLHD1dokexOn/166I+0UlDCKeH8qr2j9fTpirnpfYRID+RVxhpbB2umNuZZKENKIKXhpUhsoHoDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.698025Z"},"content_sha256":"c79cb364badd22714646ce3c77e173103d5fb27a211120d8103fe797b1c6dce9","schema_version":"1.0","event_id":"sha256:c79cb364badd22714646ce3c77e173103d5fb27a211120d8103fe797b1c6dce9"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.findings-emnlp.865.URL:https://aclanthology.org/2025.findings-emnlp.865/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Dacheng Li et al. “S*: Test Time Scaling for Code Generation”. In:Findings of the Association for Computational Lin- guistics: EMNLP 2025. Suzhou, China: Association for Computational Linguistics, Nov. 2025, pp. 15964–15978.ISBN: 979-8-8917","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":9,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Dacheng Li et al. “S*: Test Time Scaling for Code Generation”. In:Findings of the Association for Computational Lin- guistics: EMNLP 2025. Suzhou, China: Association for Computational Linguistics, Nov. 2025, pp. 15964–15978.ISBN: 979-8-8917","reconstructed_doi":"10.18653/v1/2025.findings-emnlp.865.URL:https://aclanthology.org/2025.findings-emnlp.865/"},"severity":"advisory","ref_index":9,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.findings-emnlp.865.URL:https://aclanthology.org/2025.findings-emnlp.865/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"dd2be5494b2b0656d0542709e1e2f08fd277d5331802180758e5c11569e64cf1","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5814,"payload_sha256":"954bb5907294af7b6ef9d9db0ee341fb33389c2218bc459dce16850c21b02083","signature_b64":"+XuKKgVSWbU6ORJAYUQY2Q55HBk4hTGwSTwcGSggCfVV75qZ0zBWRIsAAnQ2qsgMEufC1uXbzk3bv8bMfX/QAQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SEw87N3O5g7I1anLvSfHNu0x/GGq4C34LQocDkWyamh2aNsyaW6MW15Ydx50L6WfNvFJrH+HKdiVBL/P21S3Aw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.698339Z"},"content_sha256":"49b6fee0b4e11d792f82cc03a5d81bb540e5a55e3175414c4ffdc9fa9f1e917c","schema_version":"1.0","event_id":"sha256:49b6fee0b4e11d792f82cc03a5d81bb540e5a55e3175414c4ffdc9fa9f1e917c"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.18653/v1/2025.emnlp-main.1025.URL:https://aclanthology.org/2025.emnlp-main.1025/) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Niklas Muennighoff et al. “s1: Simple test-time scaling”. In:Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing. Suzhou, China: Association for Computational Linguistics, Nov. 2025, pp. 20275–20321. ISBN:","arxiv_id":"2605.20473","detector":"doi_compliance","evidence":{"ref_index":6,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Niklas Muennighoff et al. “s1: Simple test-time scaling”. In:Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing. Suzhou, China: Association for Computational Linguistics, Nov. 2025, pp. 20275–20321. ISBN:","reconstructed_doi":"10.18653/v1/2025.emnlp-main.1025.URL:https://aclanthology.org/2025.emnlp-main.1025/"},"severity":"advisory","ref_index":6,"audited_at":"2026-05-21T06:53:58.518080Z","event_type":"pith.integrity.v1","detected_doi":"10.18653/v1/2025.emnlp-main.1025.URL:https://aclanthology.org/2025.emnlp-main.1025/","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4387aa8a96b129ab35f79a11b4640236138a2bdebd5d2ff3d45ade516ed7d270","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5813,"payload_sha256":"c3fc56f02f0fe30f5cb71387ca9b97e05c70abcac01f8e7dd8d459d6c38e8a2f","signature_b64":"Mj5sjmBAYG+rMnlWi4C0HOFk5izFzg91I0bcII46Vzzm04KNUYSXZTOkysokmNSuF5pa14MV4pZqgvdU0yw9Dg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-21T06:54:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"jQszjtYcamsL36CaIF7UhXzxRqj91QRV1laPWdICdcnJcznu8ZOYBqnYmi3NbmFlZNci1Ax8WWY9JJvFzz3DAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:42:35.698639Z"},"content_sha256":"d650bf3e0cdcb2e4f1bd779612786c8496b2f62a225fa1c0fb880140789dabd6","schema_version":"1.0","event_id":"sha256:d650bf3e0cdcb2e4f1bd779612786c8496b2f62a225fa1c0fb880140789dabd6"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2/bundle.json","state_url":"https://pith.science/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T22:42:35Z","links":{"resolver":"https://pith.science/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2","bundle":"https://pith.science/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2/bundle.json","state":"https://pith.science/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2/state.json","well_known_bundle":"https://pith.science/.well-known/pith/G5RGKBWBTYUYGYCOMJ6OO53RY2/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:G5RGKBWBTYUYGYCOMJ6OO53RY2","merge_version":"pith-open-graph-merge-v1","event_count":39,"valid_event_count":39,"invalid_event_count":0,"equivocation_count":1,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f8e9082f7a2bc38975f55dedf8ff5d0b46f06e505927d09f729582049f373160","cross_cats_sorted":["cs.AI","cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-19T20:39:14Z","title_canon_sha256":"989c5b5638e504d63c851ed2858faf43be1e11bef5cfa86c83c7996da2fa9b8b"},"schema_version":"1.0","source":{"id":"2605.20473","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.20473","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"arxiv_version","alias_value":"2605.20473v1","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.20473","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"pith_short_12","alias_value":"G5RGKBWBTYUY","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"pith_short_16","alias_value":"G5RGKBWBTYUYGYCO","created_at":"2026-05-21T01:04:39Z"},{"alias_kind":"pith_short_8","alias_value":"G5RGKBWB","created_at":"2026-05-21T01:04:39Z"}],"graph_snapshots":[{"event_id":"sha256:eecc53e423b6ce9f7a178536eba4bf686211aa704973767ec6f575ad2abcc957","target":"graph","created_at":"2026-05-21T01:04:39Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.20473/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Test-time scaling has emerged as a promising approach for improving code generation by exploring large solution spaces at inference time. However, existing methods often rely on public test cases that are unavailable in practice, or require extensive LLM inference for candidate selection, leading to significant token consumption and time overhead. We present DiffCodeGen, a novel test-time scaling method for code generation based on coverage-guided differential analysis. DiffCodeGen generates diverse code candidates using various sampling and prompting strategies, then applies coverage-guided f","authors_text":"Ethan Wang, Hao Chen, Jicheng Wang, Xuanxin Ouyang, Yifeng He","cross_cats":["cs.AI","cs.LG"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-19T20:39:14Z","title":"Code Generation by Differential Test Time Scaling"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.20473","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:305cdb0d3800831d2acb535245ab8a96a96724c686bfcd3b824c92faa6b47931","target":"record","created_at":"2026-05-21T01:04:39Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f8e9082f7a2bc38975f55dedf8ff5d0b46f06e505927d09f729582049f373160","cross_cats_sorted":["cs.AI","cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-19T20:39:14Z","title_canon_sha256":"989c5b5638e504d63c851ed2858faf43be1e11bef5cfa86c83c7996da2fa9b8b"},"schema_version":"1.0","source":{"id":"2605.20473","kind":"arxiv","version":1}},"canonical_sha256":"37626506c19e2983604e627ce77771c69ac3d493b29e4b9046ddbf94a1c3a7cf","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"37626506c19e2983604e627ce77771c69ac3d493b29e4b9046ddbf94a1c3a7cf","first_computed_at":"2026-05-21T01:04:39.128011Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-21T01:04:39.128011Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"uypV5n7TI95wZfxV7s6n9Rntaoe83mbs73Pejiv+mWd1UplODSrKjSxDfvOhAKDtiZV+m/kjHT/86cE+WtzgCQ==","signature_status":"signed_v1","signed_at":"2026-05-21T01:04:39.128463Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.20473","source_kind":"arxiv","source_version":1}}},"equivocations":[{"signer_id":"pith.science","event_type":"integrity_finding","target":"integrity","event_ids":["sha256:032d941b3a37a35097bfdeda3c5bdce17277a82cf830912b67ca567ec90deac5","sha256:0639e90cf5148baf93125b1b2fc73f0356ad684c9d3377963bf99f76dba6d92e","sha256:11b3359d1e496912c76726783aa5b5c7cfa1380c79fbaac0f04b0d821d705a18","sha256:16ec21bd168cc4fb4106d7f415718fb034e091919d1741ebbb1d13eaea5fc9ca","sha256:27d52faf621fc10b0ce320701b4984d21620a5e74433963e1ec70b0e73f63a93","sha256:2ec3a40679d23e3eeeff74bb1aa74ae5fa3da4d20ae78183ac1cb1af3b7449a2","sha256:2fdb897ae6a4f8672f2279743440923283bda37ac73677a5e6666a44cf38e776","sha256:3572ae5fd4ef6be3287d4c197b5a30be2464952b377f59af1af737e7be1253fd","sha256:3fc14cf915d191a0e0aa26f58eb8eeffe2ca15dceb897dd22e8db340090d61b9","sha256:4210c1b1d67abf30cb9c359e380ae03914c6d23f413e8a37dd9b5e703f80c12e","sha256:478ea423523b34a9d5473699d8f1b5ddba03881b4a7ae0e5e9c2ce76d44db3d4","sha256:49b6fee0b4e11d792f82cc03a5d81bb540e5a55e3175414c4ffdc9fa9f1e917c","sha256:49f514ca057b27e1c8ec38a3cc04c7ad9c4df16b42948f3fbe7278c4e17d66b4","sha256:577ff461911dec2bceb80e74da8428af500aa832d6c2997172c7cd1fe900d544","sha256:670163c40d1d4a1d45fba956fa04c9cc27283f3bc3e7d4a7d5e217d88bdd2bf4","sha256:8905f70224b68f6ac468f2441aad1d03391f4e140ff928b1f7f7fa19ca97ea03","sha256:8f67a698a1c09d6150660ed299f35de51f0fad89df5c949e789082071cfaffaf","sha256:977da92c34e2a6dd23db191e69ca63247c22d8bdebbd6a7a025fae360553a19c","sha256:98b76105f2a2ca279c0af509c0f500771b8123da756a00f541f735602ccd9bf9","sha256:9c328185246db07da2097ef3844bf60240a11f9e5347b8b03a90aed013a01822","sha256:a0ae3ed8e98ff64e288797713068e436047aab4aab7bf8ec0037de770dbcd21a","sha256:a408ab111c800e3e08cf59e0639dab60b0f79aeb3758efcee5e5722381969aee","sha256:b3b20fc516af97f71ec9673d3497c7013aca5de1e2ac3f282ff062f2fd13e1aa","sha256:bd8a7507d81482960193d8deee78afc7bc2f60821e967dacbdbbd3daf642070f","sha256:bee9a7465479bd81f978f1c270b36c34bbfd987abbcf841261a8602c146a08bc","sha256:bf1dd2dc6b58873556514797835a5b307c9197f3dfab082f819106a3afc34eab","sha256:c79cb364badd22714646ce3c77e173103d5fb27a211120d8103fe797b1c6dce9","sha256:c96fb7adb023a37a9b3d7ca3086ed625cd8d381d81e12bc2743d79e4ed80bdc4","sha256:c9eb6848e47dd8615b16e061589dd8bb4251e8dc6f6188aeddc477100ba6194b","sha256:d43d6c517129b0efd33f35810661adf250abf8c8562b6f885363d6f297661562","sha256:d650bf3e0cdcb2e4f1bd779612786c8496b2f62a225fa1c0fb880140789dabd6","sha256:dd57d645d9393bd87f5e02f05670d681b5de226423984ff5b72b1eb6cd73829d","sha256:e183976fbf397696c723dec5000ae036667883ad5892926fc0da824d61a9d922","sha256:e1c6a8eda88629806691fc99143248f9ce490c321f3ec8e32278a85cdf8721aa","sha256:e6815480fae26998eef19c06a81f43e418060a70aa1ec61fe2db1ebd43f586af","sha256:ea2a0f4f7b5762f2f800ae1169ac17696209026467069fd3fc0d3a326f6ab2e8","sha256:eef3308c0b729e6e07095f621e9519fe79870c7e36ee8ca5e339093afefdf6ee"]}],"invalid_events":[],"applied_event_ids":["sha256:305cdb0d3800831d2acb535245ab8a96a96724c686bfcd3b824c92faa6b47931","sha256:eecc53e423b6ce9f7a178536eba4bf686211aa704973767ec6f575ad2abcc957"],"state_sha256":"ff466204aae06874262eabfaef14ddd098d2700367d352cbf4a6f35550f8a423"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BTJ+42udyV000OHDwhX+k94YO3MEvtAQgF/d5BieaAw8E5hZgssb8Li9DZjbLk5pvbw/4R15MEnjzT4iNb3PBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T22:42:35.712272Z","bundle_sha256":"3e794122168171aa81ff64e1ffb8ad3b6b68bda37ea0a32d4b05faa0cf03274b"}}