{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","short_pith_number":"pith:OFZ6NBOI","schema_version":"1.0","canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","source":{"kind":"arxiv","id":"2605.13069","version":2},"attestation_state":"computed","paper":{"title":"Not All Anquan Is the Same: A Terminological Proposal for Chinese Computer Science and Engineering","license":"http://creativecommons.org/licenses/by/4.0/","headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","cross_cats":[],"primary_cat":"cs.CY","authors_text":"Xingyu Zhao","submitted_at":"2026-05-13T06:42:17Z","abstract_excerpt":"In Chinese computer science and engineering, safety and security have long been translated by the same word, \"anquan\". This convention is concise in ordinary communication, but it creates persistent conceptual compression in standards interpretation, interdisciplinary collaboration, risk analysis and academic writing. When researchers need to discuss both whether a system is free from intolerable non-adversarial harm and whether it can resist adversarial threats, the single word \"anquan\" often cannot carry the distinction. This article argues that, while established legal and standards titles "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":true,"formal_links_present":false},"canonical_record":{"source":{"id":"2605.13069","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2026-05-13T06:42:17Z","cross_cats_sorted":[],"title_canon_sha256":"00d55295d9a16d69a4fa73354a4c432a72f03e7682a85b257488916230852b88","abstract_canon_sha256":"21f644210044fab1c55c0ffeb2b63f564abc9ec7d40c7424b88159d5188f65de"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:08:58.914538Z","signature_b64":"p+A+4c+kGH8UtXqDnfPh4ZTL9/DuTLpZr2UqRjT+Pnz+z6sxp1YoopewVsuauEu8Pmf1Snt/8adTyuBSNSJICQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","last_reissued_at":"2026-05-18T03:08:58.913687Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:08:58.913687Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Not All Anquan Is the Same: A Terminological Proposal for Chinese Computer Science and Engineering","license":"http://creativecommons.org/licenses/by/4.0/","headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","cross_cats":[],"primary_cat":"cs.CY","authors_text":"Xingyu Zhao","submitted_at":"2026-05-13T06:42:17Z","abstract_excerpt":"In Chinese computer science and engineering, safety and security have long been translated by the same word, \"anquan\". This convention is concise in ordinary communication, but it creates persistent conceptual compression in standards interpretation, interdisciplinary collaboration, risk analysis and academic writing. When researchers need to discuss both whether a system is free from intolerable non-adversarial harm and whether it can resist adversarial threats, the single word \"anquan\" often cannot carry the distinction. This article argues that, while established legal and standards titles "},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"This is not a cosmetic translation preference, but a proposal for terminological governance in scientific cognition, engineering risk communication and assurance argumentation.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That the current single-term usage creates persistent conceptual compression that materially affects standards interpretation, risk analysis, and the examinability of scientific arguments in Chinese technical discourse.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"Proposes using 'anbao' for security and reserving 'anquan' for safety in Chinese technical writing to reduce conceptual overload in safety-security discussions.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"b6d37ab7cff975acde78c1ccd0e6f0fa32e311e68c891dbd0c0c7faeae8d1053"},"source":{"id":"2605.13069","kind":"arxiv","version":2},"verdict":{"id":"d644eb05-d2f8-4498-8c54-dd7da13e01a5","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-15T06:04:01.689909Z","strongest_claim":"This is not a cosmetic translation preference, but a proposal for terminological governance in scientific cognition, engineering risk communication and assurance argumentation.","one_line_summary":"Proposes using 'anbao' for security and reserving 'anquan' for safety in Chinese technical writing to reduce conceptual overload in safety-security discussions.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That the current single-term usage creates persistent conceptual compression that materially affects standards interpretation, risk analysis, and the examinability of scientific arguments in Chinese technical discourse.","pith_extraction_headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression."},"references":{"count":64,"sample":[{"doi":"","year":null,"title":"൮Ցԛགྷ safetyࠇsecurity ൈЌ਽ႇ໓ওᇿb২ೂoνಆྟč safetyĎ p oνЌྟ čsecurityĎ p b 2.଀b২ೂಯཿoGB/T 22239uྐ༏ν ॖඪૼoЧ໓ӫః෮උਵთູྐ༏ν Ќ/ຩ઎νЌp b 3.൐Ⴈ oνಆp ᆷսsecurityb ೏ં໓ఃൌษં੐ ଆđႪ༵ཿoνЌྟp b","work_id":"2dd6399b-bb43-44c9-a962-43154997bde4","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2023,"title":"China-Peru bilateral security liaison mechanism","work_id":"5773d096-3aea-4f83-b5fc-50b06d8852a1","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"For example, νಆྟčsafetyĎ and νЌྟčsecurityĎ","work_id":"a67175d4-ae32-4e06-ba61-7f2e1713229f","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"For example, still cite GB/T 22239 asЧေ౰ , and then explain that this article treats its field as ྐ༏νЌ/ຩ઎νЌ","work_id":"5ff77788-29f1-4d64-a080-782cfb6bdb99","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"If the paper is about vulnerabilities, attacks, authentication, access control or threat modeling, prefer νЌྟ","work_id":"83a2f1ff-9a6b-411a-9e60-2224ade4f8a1","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":64,"snapshot_sha256":"8c8eae12af41934486a09e5a5466d391252a5c70e157f2749ab9ee7f176ec6cf","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2605.13069","created_at":"2026-05-18T03:08:58.913804+00:00"},{"alias_kind":"arxiv_version","alias_value":"2605.13069v2","created_at":"2026-05-18T03:08:58.913804+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.13069","created_at":"2026-05-18T03:08:58.913804+00:00"},{"alias_kind":"pith_short_12","alias_value":"OFZ6NBOIVNLU","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_16","alias_value":"OFZ6NBOIVNLUGGP2","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_8","alias_value":"OFZ6NBOI","created_at":"2026-05-18T12:33:37.589309+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH","json":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH.json","graph_json":"https://pith.science/api/pith-number/OFZ6NBOIVNLUGGP2IKJIF372XH/graph.json","events_json":"https://pith.science/api/pith-number/OFZ6NBOIVNLUGGP2IKJIF372XH/events.json","paper":"https://pith.science/paper/OFZ6NBOI"},"agent_actions":{"view_html":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH","download_json":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH.json","view_paper":"https://pith.science/paper/OFZ6NBOI","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2605.13069&json=true","fetch_graph":"https://pith.science/api/pith-number/OFZ6NBOIVNLUGGP2IKJIF372XH/graph.json","fetch_events":"https://pith.science/api/pith-number/OFZ6NBOIVNLUGGP2IKJIF372XH/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/action/timestamp_anchor","attest_storage":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/action/storage_attestation","attest_author":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/action/author_attestation","sign_citation":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/action/citation_signature","submit_replication":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/action/replication_record"}},"created_at":"2026-05-18T03:08:58.913804+00:00","updated_at":"2026-05-18T03:08:58.913804+00:00"}