{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","short_pith_number":"pith:ZXLPK6IZ","canonical_record":{"source":{"id":"2605.15874","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-15T11:44:31Z","cross_cats_sorted":[],"title_canon_sha256":"2ee645d04c5792d39ff99cf01885b544ca37894894e29b5b85aad90f96da98c3","abstract_canon_sha256":"8b16eee866e0737c94e28205ba6b4f3dc3de601802f0690ac9ff75a2410fdfa8"},"schema_version":"1.0"},"canonical_sha256":"cdd6f579197f50b965288da739b9d81b9ee32cc60124c34dba3c41af17185a0d","source":{"kind":"arxiv","id":"2605.15874","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15874","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15874v1","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.15874","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"pith_short_12","alias_value":"ZXLPK6IZP5IL","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"pith_short_16","alias_value":"ZXLPK6IZP5ILSZJI","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"pith_short_8","alias_value":"ZXLPK6IZ","created_at":"2026-05-20T00:01:23Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","target":"record","payload":{"canonical_record":{"source":{"id":"2605.15874","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-15T11:44:31Z","cross_cats_sorted":[],"title_canon_sha256":"2ee645d04c5792d39ff99cf01885b544ca37894894e29b5b85aad90f96da98c3","abstract_canon_sha256":"8b16eee866e0737c94e28205ba6b4f3dc3de601802f0690ac9ff75a2410fdfa8"},"schema_version":"1.0"},"canonical_sha256":"cdd6f579197f50b965288da739b9d81b9ee32cc60124c34dba3c41af17185a0d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:01:23.133088Z","signature_b64":"Azxms9arDuvrssCcWqoFJv0zNgvZe8s8USro/2rUYFg1PX4rtP2m810GBxChZKlaklls9DUGLSAmIN18lM9DDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"cdd6f579197f50b965288da739b9d81b9ee32cc60124c34dba3c41af17185a0d","last_reissued_at":"2026-05-20T00:01:23.132213Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:01:23.132213Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.15874","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"cte1xvjkcMaQSVpuBn7Mk2CMtgf2nKGeNxx6swQ6VdGkMnQH5zTGF61IDdWZ+eilmm5QXz4d04DxxSZQBVOUDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T03:23:24.779601Z"},"content_sha256":"0736d05fe4876ff04090c2af8f54992dd4a10272495857d45b03598918fd52e7","schema_version":"1.0","event_id":"sha256:0736d05fe4876ff04090c2af8f54992dd4a10272495857d45b03598918fd52e7"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Ti-iLSTM: A TinyDL Approach for Logic-Level Anomaly Detection in Industrial Water Treatment Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.LG","authors_text":"Emil Karlsson, Farzana Zahid, Judy Bowen, Mandar Joshi, Matthew M.Y. Kuo, Valeriy Vyatkin","submitted_at":"2026-05-15T11:44:31Z","abstract_excerpt":"Industrial Water Treatment Systems (IWTS) are safety critical cyber-physical infrastructures and due to increased connectivity, these systems are exposed to cyber threats that can manipulate process behaviour without creating obvious devices outliers. In particular, logic-layer deception anomalies can preserve numerically plausible measurements while breaking expected cause-and-effect relationships in the control process. These attacks are difficult to detect using threshold-based monitoring or require heavy server-oriented anomaly detection models. This paper explores the potential of Tiny De"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.15874","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.15874/integrity.json","findings":[],"available":true,"detectors_run":[{"name":"ai_meta_artifact","ran_at":"2026-05-19T17:33:47.532504Z","status":"skipped","version":"1.0.0","findings_count":0},{"name":"claim_evidence","ran_at":"2026-05-19T17:01:55.802521Z","status":"completed","version":"1.0.0","findings_count":0}],"snapshot_sha256":"c8642cd8e95a015f80ad37d13694892d740be0c79863cf3c6c7c07e744947491"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2N6X+9S2ekkalg+nPID0hiqseTXMWUanlcJ059FC3sARWbXYXF2RnZlL5h3iCC8AwXgCYFwaQyTDTqCnrzoJDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T03:23:24.780002Z"},"content_sha256":"fdf0e27aa80ef6933226abfeea338315616ef70884c06546a319a284db18e4e8","schema_version":"1.0","event_id":"sha256:fdf0e27aa80ef6933226abfeea338315616ef70884c06546a319a284db18e4e8"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Taormina, R., Galelli, S., Tippenhauer, N.O., Salomons, E., Ostfeld, A.,2017. Characterizingcyber-physicalattacksonwaterdistribution systems. Journal of Water Resources Planning and Management 143, 04017009. doi:10.1061/(ASCE)WR.1943-5452.0","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"ref_index":43,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Taormina, R., Galelli, S., Tippenhauer, N.O., Salomons, E., Ostfeld, A.,2017. Characterizingcyber-physicalattacksonwaterdistribution systems. Journal of Water Resources Planning and Management 143, 04017009. doi:10.1061/(ASCE)WR.1943-5452.0","reconstructed_doi":"10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf"},"severity":"advisory","ref_index":43,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.1061/(asce)wr.1943-5452.0000749.http://www.eladsalomons.com/wp-content/uploads/Taormina_et_al_2017.pdf","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4a65d7dbd98089e16cb8e10b1c3a0074dee6edf11bb4a972af4f470ab4d128cd","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5447,"payload_sha256":"61b9c4e796ffe585ace40bfae63c8051a075298630c245395b30d835986971eb","signature_b64":"uxUMbULx1NgSis2lChaW7p5zg2XwGrzN9Qw2+eQRhDN7Ux35GK+pxuByFAe23yVOOL4TY7i3x4hUcGyzuZGtCg==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T20:48:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"PkEe8Wav9E+QRk1w0DLJeHY9eNkVYydJZaZZ3hOpB/iSDKyWdMiJhwLuHjs0Gh+1FFymZIfzJ9XvYKjgvudzCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T03:23:24.780950Z"},"content_sha256":"d990c99c6e1c20a2b4cca9cbf9371bc1023f50034dc12e627ba79cc6ef1c0e86","schema_version":"1.0","event_id":"sha256:d990c99c6e1c20a2b4cca9cbf9371bc1023f50034dc12e627ba79cc6ef1c0e86"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","target":"integrity","payload":{"note":"Identifier '10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Liu, J., Sha, Y., Zhang, W., Yan, Y., Liu, X., 2024. Anomaly detection method for industrial control system operation data based on time–frequency fusion feature attention encoding. Sensors 24. doi:10.3390/s24186131.https://www.mdpi.com/142","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"doi":"10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","arxiv_id":null,"ref_index":34,"raw_excerpt":"Liu, J., Sha, Y., Zhang, W., Yan, Y., Liu, X., 2024. Anomaly detection method for industrial control system operation data based on time–frequency fusion feature attention encoding. Sensors 24. doi:10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":34,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.3390/s24186131.https://www.mdpi.com/1424-8220/24/18/6131","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"e30cac1af1f584f8ab38a9dd5942f03b63223583436a9685f37e80bb0ef8d89a","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5446,"payload_sha256":"3c0923d421b3fec4dc51a18688838572901cb20490c6db44c7e0bd3f383c5972","signature_b64":"eDYXPzOA+4fCIcV7Zku0IkIqTvOhdeq4jrrPCgY0wu/JQ+4S0T8BClTaEN0enJE7AyYW3Tz2WyYqpCNrPEDuBA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T20:48:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LeTey5Wm5DBaN/gb0XDeu9tjOo+gJtcQVbrHigka5DUOuH9Rp3GZgCYgSUDpVY9FHQn91cBk4E1WYyr5QYqkDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T03:23:24.781266Z"},"content_sha256":"6acf927b9d797cd9b7ab272ccf646b9571a28b28fda67de25f752f087562f9ce","schema_version":"1.0","event_id":"sha256:6acf927b9d797cd9b7ab272ccf646b9571a28b28fda67de25f752f087562f9ce"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Amin,S.,Litrico,X.,Sastry,S.,Bayen,A.M.,2013. Cybersecurityof waterscadasystems—parti:Analysisandexperimentationofstealthy deception attacks. IEEE Transactions on Control Systems Technol- ogy 21, 1963–1970. doi:10.1109/TCST.2012.2211873.htt","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"ref_index":5,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Amin,S.,Litrico,X.,Sastry,S.,Bayen,A.M.,2013. Cybersecurityof waterscadasystems—parti:Analysisandexperimentationofstealthy deception attacks. IEEE Transactions on Control Systems Technol- ogy 21, 1963–1970. doi:10.1109/TCST.2012.2211873.htt","reconstructed_doi":"10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf"},"severity":"advisory","ref_index":5,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/TCST.2012.2211873.https://bayen.berkeley.edu/sites/default/files/cyber_security_of_water_i.pdf","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"9c59ba38d948e508599c5e309372f68d7945d65211d122ba1f55ebe068da3902","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5445,"payload_sha256":"373f7e871cd632e3a2431050cde3b34baef93020f63d2f2b1081cfc0427f691e","signature_b64":"ouDK7zT9QJPlbJUBiTAt47H5EABuJnqz/oGSIURhA1tHOOsYJBj5594xUObNkcAF+epIth9UZj3j9v96x/QEDQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T20:48:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"e8Uwg4yz0uyv2Xw7dxVde3kXto+EbQkOkRXoW1zK50hkZ+EKStnGcC+VWBAIQF7SF/bK8EcccjA+EcIqwCKNDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T03:23:24.781570Z"},"content_sha256":"773cb85d7d39d8c5e2c0a95fdc67ab1f0730d3decd5edb2c437663eabcf5cf5d","schema_version":"1.0","event_id":"sha256:773cb85d7d39d8c5e2c0a95fdc67ab1f0730d3decd5edb2c437663eabcf5cf5d"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Aly, M., Behiry, M.H., 2025. Enhancing anomaly detection in iot-driven factories using logistic boosting, random forest, and svm: A comparative machine learning approach. Scientific Re- ports 15. doi:10.1038/s41598-025-08436-x.https://doi.o","arxiv_id":"2605.15874","detector":"doi_compliance","evidence":{"ref_index":4,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Aly, M., Behiry, M.H., 2025. Enhancing anomaly detection in iot-driven factories using logistic boosting, random forest, and svm: A comparative machine learning approach. Scientific Re- ports 15. doi:10.1038/s41598-025-08436-x.https://doi.o","reconstructed_doi":"10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x"},"severity":"advisory","ref_index":4,"audited_at":"2026-05-20T20:44:36.903554Z","event_type":"pith.integrity.v1","detected_doi":"10.1038/s41598-025-08436-x.https://doi.org/10.1038/s41598-025-08436-x","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"fd67852aa0950657a946ba2946e1c047690f62fea027c2766889dc415843aa27","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":5444,"payload_sha256":"207f31907cb64cf983cd7ccd6696cf2c78501da8c4aed04093ca6dedab6d9eac","signature_b64":"rd/taTImeE2HTJpRQ4k+sZ0v9J9D4Q5jHBNLzyQUSatmAua5PTxdti9mkhmQ/BtFER/XDp/EjHhfUssJZWDYDQ==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T20:48:31Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"C+ECd6i7gMuAN+d/NxUmMRz2IFHWLX1WukQPQXIXDoUpEwQ3hJmcUqRVlFCbLHURtPwf/FNNOlr0VuVwtYMWDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T03:23:24.781906Z"},"content_sha256":"482e7e2dce5a07ec4b998e0aa394144dda93b1f5343cbf62143fff874db43621","schema_version":"1.0","event_id":"sha256:482e7e2dce5a07ec4b998e0aa394144dda93b1f5343cbf62143fff874db43621"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO/bundle.json","state_url":"https://pith.science/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T03:23:24Z","links":{"resolver":"https://pith.science/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO","bundle":"https://pith.science/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO/bundle.json","state":"https://pith.science/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZXLPK6IZP5ILSZJIRWTTTOOYDO/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:ZXLPK6IZP5ILSZJIRWTTTOOYDO","merge_version":"pith-open-graph-merge-v1","event_count":6,"valid_event_count":6,"invalid_event_count":0,"equivocation_count":1,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8b16eee866e0737c94e28205ba6b4f3dc3de601802f0690ac9ff75a2410fdfa8","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-15T11:44:31Z","title_canon_sha256":"2ee645d04c5792d39ff99cf01885b544ca37894894e29b5b85aad90f96da98c3"},"schema_version":"1.0","source":{"id":"2605.15874","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15874","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15874v1","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.15874","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"pith_short_12","alias_value":"ZXLPK6IZP5IL","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"pith_short_16","alias_value":"ZXLPK6IZP5ILSZJI","created_at":"2026-05-20T00:01:23Z"},{"alias_kind":"pith_short_8","alias_value":"ZXLPK6IZ","created_at":"2026-05-20T00:01:23Z"}],"graph_snapshots":[{"event_id":"sha256:fdf0e27aa80ef6933226abfeea338315616ef70884c06546a319a284db18e4e8","target":"graph","created_at":"2026-05-20T00:01:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T17:33:47.532504Z","status":"skipped","version":"1.0.0"},{"findings_count":0,"name":"claim_evidence","ran_at":"2026-05-19T17:01:55.802521Z","status":"completed","version":"1.0.0"}],"endpoint":"/pith/2605.15874/integrity.json","findings":[],"snapshot_sha256":"c8642cd8e95a015f80ad37d13694892d740be0c79863cf3c6c7c07e744947491","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Industrial Water Treatment Systems (IWTS) are safety critical cyber-physical infrastructures and due to increased connectivity, these systems are exposed to cyber threats that can manipulate process behaviour without creating obvious devices outliers. In particular, logic-layer deception anomalies can preserve numerically plausible measurements while breaking expected cause-and-effect relationships in the control process. These attacks are difficult to detect using threshold-based monitoring or require heavy server-oriented anomaly detection models. This paper explores the potential of Tiny De","authors_text":"Emil Karlsson, Farzana Zahid, Judy Bowen, Mandar Joshi, Matthew M.Y. Kuo, Valeriy Vyatkin","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-15T11:44:31Z","title":"Ti-iLSTM: A TinyDL Approach for Logic-Level Anomaly Detection in Industrial Water Treatment Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.15874","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0736d05fe4876ff04090c2af8f54992dd4a10272495857d45b03598918fd52e7","target":"record","created_at":"2026-05-20T00:01:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8b16eee866e0737c94e28205ba6b4f3dc3de601802f0690ac9ff75a2410fdfa8","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2026-05-15T11:44:31Z","title_canon_sha256":"2ee645d04c5792d39ff99cf01885b544ca37894894e29b5b85aad90f96da98c3"},"schema_version":"1.0","source":{"id":"2605.15874","kind":"arxiv","version":1}},"canonical_sha256":"cdd6f579197f50b965288da739b9d81b9ee32cc60124c34dba3c41af17185a0d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cdd6f579197f50b965288da739b9d81b9ee32cc60124c34dba3c41af17185a0d","first_computed_at":"2026-05-20T00:01:23.132213Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:01:23.132213Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Azxms9arDuvrssCcWqoFJv0zNgvZe8s8USro/2rUYFg1PX4rtP2m810GBxChZKlaklls9DUGLSAmIN18lM9DDg==","signature_status":"signed_v1","signed_at":"2026-05-20T00:01:23.133088Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.15874","source_kind":"arxiv","source_version":1}}},"equivocations":[{"signer_id":"pith.science","event_type":"integrity_finding","target":"integrity","event_ids":["sha256:482e7e2dce5a07ec4b998e0aa394144dda93b1f5343cbf62143fff874db43621","sha256:6acf927b9d797cd9b7ab272ccf646b9571a28b28fda67de25f752f087562f9ce","sha256:773cb85d7d39d8c5e2c0a95fdc67ab1f0730d3decd5edb2c437663eabcf5cf5d","sha256:d990c99c6e1c20a2b4cca9cbf9371bc1023f50034dc12e627ba79cc6ef1c0e86"]}],"invalid_events":[],"applied_event_ids":["sha256:0736d05fe4876ff04090c2af8f54992dd4a10272495857d45b03598918fd52e7","sha256:fdf0e27aa80ef6933226abfeea338315616ef70884c06546a319a284db18e4e8"],"state_sha256":"43bc667674166de4c01246e36e33c68d4d48f76c85a59dbd574de9b2f67afbe0"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bJ9UOFQpxOHs4CldsIGBlFNLSi9c8osEaJ58m/NK/1DVJSgnHw7yI5XOiOIJRGDjdh0n2lP25mt8MyOx9GooCA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T03:23:24.784554Z","bundle_sha256":"6380c08c0b2ffbaef537c42751e90172b3336d012e46019ec22e7b26733521f7"}}