pith. sign in

Integrity report for Detecting Data Exfiltration through I2P Anonymity Networks: A Two-Phase Machine Learning Approach

A machine-verified record of the checks Pith has run against this paper: detector runs, findings, signed bundle events, and canonical identifiers.

arXiv:2605.20546 · pith:2026:URHD75H4QM53PJT6U3LGXYRQVY

0Critical
0Advisory
6Detectors run
2026-05-24Last checked

Paper page arXiv integrity.json bundle.json

Detector runs

doi_compliance completed v1.0.0 · findings 0 · 2026-05-24 06:56:12.047440+00:00
doi_title_agreement completed v1.0.0 · findings 0 · 2026-05-24 06:32:27.830247+00:00
claim_evidence completed v1.0.0 · findings 0 · 2026-05-24 05:03:19.234599+00:00
citation_quote_validity completed v0.1.0 · findings 0 · 2026-05-21 23:50:43.625739+00:00
cited_work_retraction completed v1.0.0 · findings 0 · 2026-05-21 16:52:50.075709+00:00
ai_meta_artifact skipped v1.0.0 · findings 0 · 2026-05-21 02:33:38.710888+00:00

Findings

No public integrity findings for this paper.

Signed record

The machine-readable record for this paper lives at /pith/URHD75H4/integrity.json. Pith Number bundles also include signed pith.integrity.v1 events where a Pith Number exists.