{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T04:04:30Z","timestamp":1750737870141,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819665815","type":"print"},{"value":"9789819665822","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-6582-2_6","type":"book-chapter","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:40:42Z","timestamp":1750689642000},"page":"81-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LogMoE: Optimizing Mixture of\u00a0Experts for\u00a0Log Anomaly Detection via\u00a0Knowledge Distillation"],"prefix":"10.1007","author":[{"given":"Dehua","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Mei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Lupton, S., Washizaki, H., Yoshioka, N., Fukazawa, Y.: Landscape and taxonomy of online parser-supported log anomaly detection methods. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3387287"},{"issue":"6","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TPDS.2013.21","volume":"24","author":"H Mi","year":"2013","unstructured":"Mi, H., Wang, H., Zhou, Y., Lyu, M., Cai, H.: Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems. IEEE Trans. Parallel Distrib. Syst. 24(6), 1245\u20131255 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"6_CR3","unstructured":"Wang, Y., Wong, J., Miner, A.: Anomaly intrusion detection using one class svm. In: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, pp. 358\u2013364. IEEE (2004)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"8","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"6_CR6","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inform. Process. Syst. 30 (2017)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Guo, H., Yuan, S., Wu, X.: Logbert: log anomaly detection via bert. In: 2021 international joint conference on neural networks (IJCNN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Han, X., Yuan, S., Trabelsi, M.: Loggpt: log anomaly detection via gpt. In: 2023 IEEE International Conference on Big Data (BigData), pp. 1117\u20131122. IEEE (2023)","DOI":"10.1109\/BigData59044.2023.10386543"},{"key":"6_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110689","volume":"146","author":"Y Lee","year":"2023","unstructured":"Lee, Y., Kim, J., Kang, P.: Lanobert: system log anomaly detection based on bert masked language model. Appl. Soft Comput. 146, 110689 (2023)","journal-title":"Appl. Soft Comput."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Makanju, A.A., Zincir-Heywood, A.N., Milios, E.E.: Clustering event logs using iterative partitioning. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1255\u20131264 (2009)","DOI":"10.1145\/1557019.1557154"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Lin, Q., Zhang, H., Lou, J.G., Zhang, Y., Chen, X.: Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 102\u2013111 (2016)","DOI":"10.1145\/2889160.2889232"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: 2017 IEEE international conference on web services (ICWS), pp. 33\u201340. IEEE (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Ma, Z., Chen, A.R., Kim, D.J., Chen, T.H., Wang, S.: Llmparser: an exploratory study on using large language models for log parsing. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, pp. 1\u201313 (2024)","DOI":"10.1145\/3597503.3639150"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Chen, X., Shi, J., Chen, J., Wang, P., Wang, W.: High-precision online log parsing with large language models. In: Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, pp. 354\u2013355 (2024)","DOI":"10.1145\/3639478.3643112"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: Deeplog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Meng, W., et\u00a0al.: Loganomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: IJCAI, vol.\u00a019, pp. 4739\u20134745 (2019)","DOI":"10.24963\/ijcai.2019\/658"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Chen, R., et al.: Logtransfer: cross-system log anomaly detection for software systems with transfer learning. In: 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), pp. 37\u201347. IEEE (2020)","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Li, Z., Shi, J., Van\u00a0Leeuwen, M.: Graph neural networks based log anomaly detection and explanation. In: Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, pp. 306\u2013307 (2024)","DOI":"10.1145\/3639478.3643084"},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124082","volume":"251","author":"P Wang","year":"2024","unstructured":"Wang, P., Zhang, X., Cao, Z., Xu, W., Li, W.: Loggt: cross-system log anomaly detection via heterogeneous graph feature and transfer learning. Expert Syst. Appl. 251, 124082 (2024)","journal-title":"Expert Syst. Appl."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, C., et al.: Deeptralog: trace-log combined microservice anomaly detection through graph-based deep learning. In: Proceedings of the 44th International Conference on Software Engineering, pp. 623\u2013634 (2022)","DOI":"10.1145\/3510003.3510180"},{"issue":"120","key":"6_CR21","first-page":"1","volume":"23","author":"W Fedus","year":"2022","unstructured":"Fedus, W., Zoph, B., Shazeer, N.: Switch transformers: scaling to trillion parameter models with simple and efficient sparsity. J. Mach. Learn. Res. 23(120), 1\u201339 (2022)","journal-title":"J. Mach. Learn. Res."},{"key":"6_CR22","first-page":"7103","volume":"35","author":"Y Zhou","year":"2022","unstructured":"Zhou, Y., et al.: Mixture-of-experts with expert choice routing. Adv. Neural. Inf. Process. Syst. 35, 7103\u20137114 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"6_CR23","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., Klimov, O.: Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, S., He, P., Liu, J., Lyu, M.R.: Loghub: a large collection of system log datasets for ai-driven log analytics. In: 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 355\u2013366. IEEE (2023)","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pp. 117\u2013132 (2009)","DOI":"10.1145\/1629575.1629587"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 575\u2013584. IEEE (2007)","DOI":"10.1109\/DSN.2007.103"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Yang, L., et al.: Semi-supervised log-based anomaly detection via probabilistic label estimation. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1448\u20131460. IEEE (2021)","DOI":"10.1109\/ICSE43902.2021.00130"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-6582-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:40:50Z","timestamp":1750689650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-6582-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819665815","9789819665822"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-6582-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}