{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T05:23:36Z","timestamp":1750915416906,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819723027"},{"type":"electronic","value":"9789819723034"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2303-4_33","type":"book-chapter","created":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T08:02:03Z","timestamp":1716883323000},"page":"498-512","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Log Anomaly Detection Based on\u00a0Dimension Reduction and\u00a0Attention Aware TCN"],"prefix":"10.1007","author":[{"given":"Zhihao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Su","sequence":"additional","affiliation":[]},{"given":"Li","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jianjun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Bodik, P., Goldszmidt, M., Fox, A., Woodard, D.B., Andersen, H.: Fingerprinting the datacenter: automated classification of performance crises. In: Proceedings of the 5th European Conference on Computer Systems, pp. 111\u2013124 (2010)","DOI":"10.1145\/1755913.1755926"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Chen, M., Zheng, A.X., Lloyd, J., Jordan, M.I., Brewer, E.: Failure diagnosis using decision trees. In: International Conference on Autonomic Computing 2004. Proceedings, pp. 36\u201343. IEEE (2004)","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"33_CR3","unstructured":"Lou, J.G., Fu, Q., Yang, S., Xu, Y., Li, J.: Mining invariants from console logs for system problem detection. In: USENIX Annual Technical Conference, pp. 1\u201314 (2010)"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Meng, W., et\u00a0al.: LogAnomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: IJCAI. vol.\u00a019, pp. 4739\u20134745 (2019)","DOI":"10.24963\/ijcai.2019\/658"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Le, V.H., Zhang, H.: Log-based anomaly detection without log parsing. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 492\u2013504. IEEE (2021)","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"33_CR6","unstructured":"Kenton, J.D.M.W.C., Toutanova, L.K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of NAACL-HLT, vol.\u00a01, p.\u00a02 (2019)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Guo, H., Yuan, S., Wu, X.: LogBERT: Log anomaly detection via BERT. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Yang, L., et al.: Semi-supervised log-based anomaly detection via probabilistic label estimation. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1448\u20131460. IEEE (2021)","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"33_CR10","first-page":"1","volume":"2020","author":"C Chen","year":"2020","unstructured":"Chen, C., et al.: Deep learning on computational-resource-limited platforms: a survey. Mob. Inf. Syst. 2020, 1\u201319 (2020)","journal-title":"Mob. Inf. Syst."},{"key":"33_CR11","unstructured":"Su, J., Cao, J., Liu, W., Ou, Y.: Whitening sentence representations for better semantics and faster retrieval. arXiv preprint arXiv:2103.15316 (2021)"},{"key":"33_CR12","unstructured":"Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271 (2018)"},{"key":"33_CR13","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: ALBERT: a lite BERT for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942 (2019)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 33\u201340. IEEE (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Fu, Q., Lou, J.G., Wang, Y., Li, J.: Execution anomaly detection in distributed systems through unstructured log analysis. In: 2009 Ninth IEEE International Conference on Data Mining, pp. 149\u2013158. IEEE (2009)","DOI":"10.1109\/ICDM.2009.60"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, B., Zhang, H., Moscato, P., Zhang, A.: Anomaly detection via mining numerical workflow relations from logs. In: 2020 International Symposium on Reliable Distributed Systems (SRDS), pp. 195\u2013204. IEEE (2020)","DOI":"10.1109\/SRDS51746.2020.00027"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Schuster, M., Nakajima, K.: Japanese and Korean voice search. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5149\u20135152. IEEE (2012)","DOI":"10.1109\/ICASSP.2012.6289079"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Perrucci, G.P., Fitzek, F.H., Widmer, J.: Survey on energy consumption entities on the smartphone platform. In: 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), pp.\u00a01\u20136. IEEE (2011)","DOI":"10.1109\/VETECS.2011.5956528"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117\u2013132 (2009)","DOI":"10.1145\/1629575.1629587"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Lin, Q., Zhang, H., Lou, J.G., Zhang, Y., Chen, X.: Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 102\u2013111 (2016)","DOI":"10.1145\/2889160.2889232"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Chen, J., Chong, W., Yu, S., Xu, Z., Tan, C., Chen, N.: TCN-based lightweight log anomaly detection in cloud-edge collaborative environment. In: 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD), pp. 13\u201318. IEEE (2022)","DOI":"10.1109\/CBD58033.2022.00012"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Ethayarajh, K.: How contextual are contextualized word representations? Comparing the geometry of BERT, ELMo, and GPT-2 embeddings. arXiv preprint arXiv:1909.00512 (2019)","DOI":"10.18653\/v1\/D19-1006"},{"key":"33_CR23","first-page":"134","volume":"2","author":"GH Golub","year":"1971","unstructured":"Golub, G.H., Reinsch, C.: Singular value decomposition and least squares solutions. Linear Algebra 2, 134\u2013151 (1971)","journal-title":"Linear Algebra"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 575\u2013584. IEEE (2007)","DOI":"10.1109\/DSN.2007.103"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Xie, Y., Zhang, H., Babar, M.A.: LogGD: detecting anomalies from system logs by graph neural networks. arXiv preprint arXiv:2209.07869 (2022)","DOI":"10.1109\/QRS57517.2022.00039"},{"issue":"8","key":"33_CR26","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., et al.: Language models are unsupervised multitask learners. OpenAI Blog 1(8), 9 (2019)","journal-title":"OpenAI Blog"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Ruder, S., S\u00f8gaard, A., Vuli\u0107, I.: Unsupervised cross-lingual representation learning. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics: Tutorial Abstracts, pp. 31\u201338 (2019)","DOI":"10.18653\/v1\/P19-4007"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2303-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T05:16:15Z","timestamp":1732079775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2303-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819723027","9789819723034"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2303-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.apweb-waim2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}