{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:03:38Z","timestamp":1773119018567,"version":"3.50.1"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032182678","type":"print"},{"value":"9783032182685","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-18268-5_16","type":"book-chapter","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:52:16Z","timestamp":1773075136000},"page":"348-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient System Log Analysis via\u00a0Quantized On-Device Anomaly Detection and\u00a0Response"],"prefix":"10.1007","author":[{"given":"Qinxuan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Zhanglong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sicong","family":"Shao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,10]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abadade, Y., Temouden, A., Bamoumen, H., Benamar, N., Chtouki, Y., Hafid, A.S.: A comprehensive survey on TinyML. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3294111"},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1109\/TNSM.2024.3358730","volume":"21","author":"C Almodovar","year":"2024","unstructured":"Almodovar, C., Sabrina, F., Karimi, S., Azad, S.: LogFit: log anomaly detection using fine-tuned language models. IEEE Trans. Netw. Serv. Manage. 21(2), 1715\u20131723 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"16_CR3","unstructured":"Apple: an apple framework to integrate machine learning models into your app (2024). https:\/\/developer.apple.com\/documentation\/coreml. Accessed 19 Sep 2024"},{"key":"16_CR4","unstructured":"Aures, G., L\u00fcbben, C.: DDS vs. MQTT vs. VSL for IoT. Network 1, 1\u20135 (2019)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Berger, E.D., Zorn, B.G., McKinley, K.S.: Reconsidering custom memory allocation. In: Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 1\u201312 (2002)","DOI":"10.1145\/582419.582421"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Bondarenko, Y., Nagel, M., Blankevoort, T.: Understanding and overcoming the challenges of efficient transformer quantization. arXiv preprint arXiv:2109.12948 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.627"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Chen, J., Chong, W., Yu, S., Xu, Z., Tan, C., Chen, N.: TCN-based lightweight log anomaly detection in cloud-edge collaborative environment. In: 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD), pp. 13\u201318. IEEE (2022)","DOI":"10.1109\/CBD58033.2022.00012"},{"issue":"3","key":"16_CR8","first-page":"879","volume":"48","author":"H Dai","year":"2020","unstructured":"Dai, H., Li, H., Chen, C.S., Shang, W., Chen, T.H.: LogRam: Efficient log parsing using $$ n $$ n-gram dictionaries. IEEE Trans. Software Eng. 48(3), 879\u2013892 (2020)","journal-title":"IEEE Trans. Software Eng."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Dollinger, J.F., Bouhouch, K., Bouzarkouna, I.: Benchmarking OpenStack for edge computing applications. In: 2023 IEEE\/ACIS 8th International Conference on Big Data, Cloud Computing, and Data Science (BCD), pp. 295\u2013302. IEEE (2023)","DOI":"10.1109\/BCD57833.2023.10466323"},{"issue":"11","key":"16_CR10","doi-asserted-by":"publisher","first-page":"3949","DOI":"10.1109\/TCAD.2024.3443692","volume":"43","author":"P Dong","year":"2024","unstructured":"Dong, P., et al.: EQ-Vit: algorithm-hardware co-design for end-to-end acceleration of real-time vision transformer inference on versal acap architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11), 3949\u20133960 (2024)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"issue":"11","key":"16_CR11","doi-asserted-by":"publisher","first-page":"2213","DOI":"10.1109\/TKDE.2018.2875442","volume":"31","author":"M Du","year":"2018","unstructured":"Du, M., Li, F.: Spell: online streaming parsing of large unstructured system logs. IEEE Trans. Knowl. Data Eng. 31(11), 2213\u20132227 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Elmrabit, N., Zhou, F., Li, F., Zhou, H.: Evaluation of machine learning algorithms for anomaly detection. In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp.\u00a01\u20138. IEEE (2020)","DOI":"10.1109\/CyberSecurity49315.2020.9138871"},{"key":"16_CR14","unstructured":"Gao, Y., et al.: Retrieval-augmented generation for large language models: a survey. arXiv preprint arXiv:2312.10997 (2023)"},{"key":"16_CR15","unstructured":"Google: Google\u2019s high-performance runtime for on-device ai (2024). https:\/\/ai.google.dev\/edge\/litert. Accessed 19 Sep 2024"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Guo, H., Yuan, S., Wu, X.: LogBert: log anomaly detection via BERT. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"16_CR17","unstructured":"Hansen, S.E., Atkins, E.T.: Automated system monitoring and notification with swatch. In: LISA, vol.\u00a093, pp. 145\u2013152. Monterey, CA (1993)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"He, M., Jia, T., Duan, C., Cai, H., Li, Y., Huang, G.: LlmeLog: an approach for anomaly detection based on LLM-enriched log events. In: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), pp. 132\u2013143. IEEE (2024)","DOI":"10.1109\/ISSRE62328.2024.00023"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 33\u201340. IEEE (2017)","DOI":"10.1109\/ICWS.2017.13"},{"issue":"6","key":"16_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3460345","volume":"54","author":"S He","year":"2021","unstructured":"He, S., He, P., Chen, Z., Yang, T., Su, Y., Lyu, M.R.: A survey on automated log analysis for reliability engineering. ACM Comput. Surv. (CSUR) 54(6), 1\u201337 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR21","volume":"16","author":"P Himler","year":"2024","unstructured":"Himler, P., Landauer, M., Skopik, F., Wurzenberger, M.: Anomaly detection in log-event sequences: a federated deep learning approach and open challenges. Mach. Learn. Appl. 16, 100554 (2024)","journal-title":"Mach. Learn. Appl."},{"issue":"4","key":"16_CR22","doi-asserted-by":"publisher","first-page":"2064","DOI":"10.1109\/TNSM.2020.3034647","volume":"17","author":"S Huang","year":"2020","unstructured":"Huang, S., et al.: Hitanomaly: hierarchical transformers for anomaly detection in system log. IEEE Trans. Netw. Serv. Manage. 17(4), 2064\u20132076 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"16_CR23","unstructured":"Jiang, W., Hu, C., Pasupathy, S., Kanevsky, A., Li, Z., Zhou, Y.: Understanding customer problem troubleshooting from storage system logs. In: Proceedings of the 7th Conference on File and Storage Technologies, pp. 43\u201356 (2009)"},{"issue":"24","key":"16_CR24","doi-asserted-by":"publisher","first-page":"22611","DOI":"10.1109\/JIOT.2023.3304373","volume":"10","author":"C Kim","year":"2023","unstructured":"Kim, C., Kim, S.: Optimizing logging and monitoring in heterogeneous cloud environments for IoT and edge applications. IEEE Internet Things J. 10(24), 22611\u201322622 (2023)","journal-title":"IEEE Internet Things J."},{"key":"16_CR25","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Lebre, A., Pastor, J., Simonet, A., Desprez, F.: Revising Openstack to operate fog\/edge computing infrastructures. In: 2017 IEEE International Conference on Cloud Engineering (IC2E), pp. 138\u2013148. IEEE (2017)","DOI":"10.1109\/IC2E.2017.35"},{"issue":"4","key":"16_CR27","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.3390\/app13042237","volume":"13","author":"M Li","year":"2023","unstructured":"Li, M., Sun, M., Li, G., Han, D., Zhou, M.: MDFULOG: multi-feature deep fusion of unstable log anomaly detection model. Appl. Sci. 13(4), 2237 (2023)","journal-title":"Appl. Sci."},{"issue":"8","key":"16_CR28","doi-asserted-by":"publisher","first-page":"3697","DOI":"10.1109\/TKDE.2024.3365548","volume":"36","author":"X Li","year":"2024","unstructured":"Li, X., Miller, D.J., Xiang, Z., Kesidis, G.: Bic-based mixture model defense against data poisoning attacks on classifiers: a comprehensive study. IEEE Trans. Knowl. Data Eng. 36(8), 3697\u20133711 (2024)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Liang, Y., Zhang, Y., Xiong, H., Sahoo, R.: Failure prediction in IBM BLUEGENE\/l event logs. In: Seventh IEEE International Conference on Data Mining (ICDM 2007), pp. 583\u2013588. IEEE (2007)","DOI":"10.1109\/ICDM.2007.46"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tao, S., Meng, W., Yao, F., Zhao, X., Yang, H.: LogPrompt: prompt engineering towards zero-shot and interpretable log analysis. In: Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, pp. 364\u2013365 (2024)","DOI":"10.1145\/3639478.3643108"},{"key":"16_CR31","unstructured":"Lou, J.G., Fu, Q., Yang, S., Xu, Y., Li, J.: Mining invariants from console logs for system problem detection. In: 2010 USENIX Annual Technical Conference (USENIX ATC 10) (2010)"},{"issue":"4","key":"16_CR32","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/COMST.2021.3106401","volume":"23","author":"Q Luo","year":"2021","unstructured":"Luo, Q., Hu, S., Li, C., Li, G., Shi, W.: Resource scheduling in edge computing: a survey. IEEE Commun. Surv. Tutorials 23(4), 2131\u20132165 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR33","unstructured":"torchao maintainers, contributors: Torchao: PyTorch native quantization and sparsity for training and inference (2024). https:\/\/github.com\/pytorch\/ao"},{"key":"16_CR34","doi-asserted-by":"publisher","unstructured":"Manokaran, J., Vairavel, G.: Smart anomaly detection using data-driven techniques in IoT edge: a survey. In: Proceedings of Third International Conference on Communication, Computing and Electronics Systems: ICCCES 2021, pp. 685\u2013702. Springer (2022). https:\/\/doi.org\/10.1007\/978-981-16-8862-1_45","DOI":"10.1007\/978-981-16-8862-1_45"},{"key":"16_CR35","unstructured":"Meta: Executorch docs: memory planning (2024). https:\/\/pytorch.org\/executorch\/stable\/compiler-memory-planning.html#memory-planning. Accessed 20 Sep 2024"},{"key":"16_CR36","unstructured":"Meta: Executorch docs: overview of executorch\u2019s kernel libraries (2024). https:\/\/pytorch.org\/executorch\/stable\/kernel-library-overview.html#portable-kernel-library. Accessed 20 Sep 2024"},{"key":"16_CR37","unstructured":"Meta: on-device ai across mobile, embedded and edge for PyTorch (2024). https:\/\/github.com\/pytorch\/executorch. Accessed 19 Sep 2024"},{"key":"16_CR38","unstructured":"MITRE: Common attack pattern enumerations and classifications (2025). https:\/\/capec.mitre.org\/index.html. Accessed 21 Aug 2025"},{"key":"16_CR39","unstructured":"MITRE: Mitre ATT&CK (2025). https:\/\/attack.mitre.org\/. Accessed 21 Aug 2025"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Nguyen, L.V., Le, V.H., Zhang, H., Le, M.T.: Efficient log-based anomaly detection with knowledge distillation. In: 2024 IEEE International Conference on Web Services (ICWS), pp. 578\u2013589. IEEE (2024)","DOI":"10.1109\/ICWS62655.2024.00078"},{"key":"16_CR41","unstructured":"NVIDIA: An SDK for high-performance deep learning inference on NVIDIA GPUS (2024). https:\/\/github.com\/NVIDIA\/TensorRT. Accessed 19 Sep 2024"},{"key":"16_CR42","unstructured":"Paszke, A.: PyTorch: an imperative style, high-performance deep learning library. arXiv preprint arXiv:1912.01703 (2019)"},{"issue":"2","key":"16_CR43","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1109\/TNSM.2023.3239522","volume":"20","author":"J Qi","year":"2023","unstructured":"Qi, J., et al.: LogenCoder: log-based contrastive representation learning for anomaly detection. IEEE Trans. Netw. Serv. Manage. 20(2), 1378\u20131391 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Qi, J., et al.: Adanomaly: adaptive anomaly detection for system logs with adversarial learning. In: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, pp.\u00a01\u20135. IEEE (2022)","DOI":"10.1109\/NOMS54207.2022.9789917"},{"key":"16_CR45","unstructured":"Robert, R., Eric, E., Team, T.C.: Introducing CloudLab: scientific infrastructure for advancing cloud architectures and applications (2014). https:\/\/www.usenix.org\/publications\/login\/dec14\/ricci"},{"key":"16_CR46","unstructured":"Rodola, G.: Cross-platform lib for process and system monitoring in python (2024). https:\/\/github.com\/giampaolo\/psutil. Accessed Oct 3 2024"},{"key":"16_CR47","unstructured":"Rouillard, J.P.: Real-time log file analysis using the simple event correlator (sec). In: LISA, vol.\u00a04, pp. 133\u2013150 (2004)"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Shao, S., et al.: Multi-layer mapping of cyberspace for intrusion detection. In: 2021 IEEE 18th International Conference on Computer Systems and Applications, pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/AICCSA53542.2021.9686823"},{"key":"16_CR49","doi-asserted-by":"publisher","unstructured":"Shi, Q., et al.: Anomaly transformer-based system log anomaly detection. In: 2024 Cyber Awareness and Research Symposium (CARS), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/CARS61786.2024.10778676","DOI":"10.1109\/CARS61786.2024.10778676"},{"key":"16_CR50","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.iotcps.2023.02.004","volume":"3","author":"R Singh","year":"2023","unstructured":"Singh, R., Gill, S.S.: Edge ai: a survey. Internet Things Cyber-Phys. Syst. 3, 71\u201392 (2023)","journal-title":"Internet Things Cyber-Phys. Syst."},{"key":"16_CR51","unstructured":"Touvron, H., et al.: LLAMA: open and efficient foundation language models (2023). https:\/\/arxiv.org\/abs\/2302.13971"},{"key":"16_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108616","volume":"203","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Tian, J., Fang, H., Chen, L., Qin, J.: LightLog: a lightweight temporal convolutional network for log anomaly detection on the edge. Comput. Netw. 203, 108616 (2022)","journal-title":"Comput. Netw."},{"issue":"5","key":"16_CR53","doi-asserted-by":"publisher","first-page":"3479","DOI":"10.1109\/TSC.2023.3280575","volume":"16","author":"T Xiao","year":"2023","unstructured":"Xiao, T., et al.: Loader: a log anomaly detector based on transformer. IEEE Trans. Serv. Comput. 16(5), 3479\u20133492 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"16_CR54","unstructured":"Xu, J., Wu, H., Wang, J., Long, M.: Anomaly transformer: time series anomaly detection with association discrepancy. In: International Conference on Learning Representations (2022). https:\/\/openreview.net\/forum?id=LzQQ89U1qm_"},{"key":"16_CR55","doi-asserted-by":"crossref","unstructured":"Xu, J., Yang, R., Huo, Y., Zhang, C., He, P.: DivLog: log parsing with prompt enhanced in-context learning. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, pp. 1\u201312 (2024)","DOI":"10.1145\/3597503.3639155"},{"key":"16_CR56","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117\u2013132 (2009)","DOI":"10.1145\/1629575.1629587"},{"key":"16_CR57","doi-asserted-by":"crossref","unstructured":"Yao, L., Shi, Q., Yang, Z., Shao, S., Hariri, S.: Development of an edge resilient ml ensemble to tolerate ICS adversarial attacks. arXiv preprint arXiv:2409.18244 (2024)","DOI":"10.1007\/978-3-031-94895-4_24"},{"key":"16_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.114064","volume":"326","author":"Z Zhang","year":"2025","unstructured":"Zhang, Z., Li, S., Zhang, L., Ye, J., Hu, C., Yan, L.: LLM-lade: large language model-based log anomaly detection with explanation. Knowl. Based Syst. 326, 114064 (2025)","journal-title":"Knowl. Based Syst."},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Zhao, N., et\u00a0al.: An empirical investigation of practical log anomaly detection for online service systems. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1404\u20131415 (2021)","DOI":"10.1145\/3468264.3473933"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-18268-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:52:22Z","timestamp":1773075142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-18268-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032182678","9783032182685"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-18268-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 March 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2026.at","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}