{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:50:59Z","timestamp":1771231859364,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819962211","type":"print"},{"value":"9789819962228","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-6222-8_36","type":"book-chapter","created":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T12:16:27Z","timestamp":1694175387000},"page":"427-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["BertHTLG: Graph-Based Microservice Anomaly Detection Through Sentence-Bert Enhancement"],"prefix":"10.1007","author":[{"given":"Lu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qian","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Mu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Biying","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Chunhui","family":"Du","sequence":"additional","affiliation":[]},{"given":"Ziang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,9]]},"reference":[{"issue":"2","key":"36_CR1","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TSE.2018.2887384","volume":"47","author":"X Zhou","year":"2018","unstructured":"Zhou, X., et al.: Fault analysis and debugging of microservice systems: industrial survey, benchmark system, and empirical study. IEEE Trans. Softw. Eng. 47(2), 243\u2013260 (2018)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"36_CR2","unstructured":"Sigelman, B.H., et al.: Dapper, a large-scale distributed systems tracing infrastructure. Google Inc, Technical report (2010)"},{"key":"36_CR3","unstructured":"Apache skywalking. https:\/\/skywalking.apache.org\/. Accessed 16 May 2023"},{"key":"36_CR4","unstructured":"Zipkin. https:\/\/zipkin.io\/. Accessed 16 May 2023"},{"key":"36_CR5","unstructured":"Jaeger: open source, end-to-end distributed tracing. https:\/\/www.jaegertracing.io\/. Accessed 16 May 2023"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Liu, P., et al.: Unsupervised detection of microservice trace anomalies through service-level deep Bayesian networks. In: 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), pp. 48\u201358 (2020)","DOI":"10.1109\/ISSRE5003.2020.00014"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Nedelkoski, S., Cardoso, J., Kao, O.: Anomaly detection from system tracing data using multimodal deep learning. In: 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 179\u2013186. IEEE (2019)","DOI":"10.1109\/CLOUD.2019.00038"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, C., et al.: DeepTraLog: trace-log combined microservice anomaly detection through graph-based deep learning. In: Proceedings of the 44th International Conference on Software Engineering, pp. 623\u2013634 (2022)","DOI":"10.1145\/3510003.3510180"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhang, C., Peng, X., Sha, C.: PUTraceAD: trace anomaly detection with partial labels based on GNN and PU learning. In: IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE). vol. 2022, pp. 239\u2013250. IEEE (2022)","DOI":"10.1109\/ISSRE55969.2022.00032"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, C., et al.: TraceCRL: contrastive representation learning for microservice trace analysis. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1221\u20131232 (2022)","DOI":"10.1145\/3540250.3549146"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using Siamese BERT-networks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 11 (2019)","DOI":"10.18653\/v1\/D19-1410"},{"key":"36_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-031-20309-1_14","volume-title":"Web Information Systems and Applications","author":"Y Jiang","year":"2022","unstructured":"Jiang, Y., Wu, D.: An integrated Chinese malicious webpages detection method based on pre-trained language models and feature fusion. In: Zhao, X., Yang, S., Wang, X., Li, J. (eds.) WISA 2022. Lecture Notes in Computer Science, vol. 13579, pp. 155\u2013167. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20309-1_14"},{"key":"36_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/978-3-319-93417-4_38","volume-title":"The Semantic Web","author":"M Schlichtkrull","year":"2018","unstructured":"Schlichtkrull, M., Kipf, T.N., Bloem, P., van\u00a0den Berg, R., Titov, I., Welling, M.: Modeling relational data with graph convolutional networks. In: Gangemi, A., et al. (eds.) ESWC 2018. LNCS, vol. 10843, pp. 593\u2013607. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93417-4_38"},{"key":"36_CR14","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning. PMLR, pp. 4393\u20134402 (2018)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: IEEE International Conference on Web Services (ICWS), vol. 2017, pp. 33\u201340. IEEE (2017)","DOI":"10.1109\/ICWS.2017.13"},{"issue":"8","key":"36_CR16","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"issue":"7","key":"36_CR18","first-page":"4739","volume":"19","author":"W Meng","year":"2019","unstructured":"Meng, W., et al.: LogAnomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. IJCAI 19(7), 4739\u20134745 (2019)","journal-title":"IJCAI"},{"key":"36_CR19","doi-asserted-by":"publisher","first-page":"3051","DOI":"10.1109\/TIFS.2022.3201379","volume":"17","author":"J Zhou","year":"2022","unstructured":"Zhou, J., Qian, Y., Zou, Q., Liu, P., Xiang, J.: DeepsysLog: deep anomaly detection on syslog using sentence embedding and metadata. IEEE Trans. Inf. Forensics Secur. 17, 3051\u20133061 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, M., Chen, J., Liu, J., Wang, J., Shi, R., Sheng, H.: LogST: log semi-supervised anomaly detection based on sentence-BERT. In: 2022 7th International Conference on Signal and Image Processing (ICSIP), pp. 356\u2013361. IEEE (2022)","DOI":"10.1109\/ICSIP55141.2022.9886069"},{"key":"36_CR21","first-page":"2874","volume":"2023","author":"Z Xie","year":"2023","unstructured":"Xie, Z., et al.: Unsupervised anomaly detection on microservice traces through graph VAE. Proc. ACM Web Conf. 2023, 2874\u20132884 (2023)","journal-title":"Proc. ACM Web Conf."},{"key":"36_CR22","unstructured":"Li, Y., Tarlow, D., Brockschmidt, M., Zemel, R.: Gated graph sequence neural networks. arXiv preprint arXiv:1511.05493 (2015)"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C. D.: Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"issue":"5","key":"36_CR24","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Inf. Process. Manag. 24(5), 513\u2013523 (1988)","journal-title":"Inf. Process. Manag."},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Peng, X., Zhang, C., Zhao, Z., Isami, A., Guo, X., Cui, Y.: Trace analysis based microservice architecture measurement. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1589\u20131599 (2022)","DOI":"10.1145\/3540250.3558951"},{"key":"36_CR26","unstructured":"Min, B., et al.: Recent advances in natural language processing via large pre-trained language models: a survey. arXiv preprint arXiv:2111.01243 (2021)"},{"key":"36_CR27","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"36_CR28","unstructured":"all-minilm-l12-v2 language model. https:\/\/huggingface.co\/sentence-transformers\/all-MiniLM-L12-v2. Accessed 16 May 2023"},{"key":"36_CR29","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Chen, D., Lin, Y., Li, W., Li, P., Zhou, J., Sun, X.: Measuring and relieving the over-smoothing problem for graph neural networks from the topological view. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34(04), pp. 3438\u20133445 (2020)","DOI":"10.1609\/aaai.v34i04.5747"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-6222-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:38:06Z","timestamp":1710232686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-6222-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819962211","9789819962228"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-6222-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa22023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.ccf.org.cn\/wisa2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"196","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}