{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T15:42:21Z","timestamp":1771602141026,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,11,6]],"date-time":"2021-11-06T00:00:00Z","timestamp":1636156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,6]],"date-time":"2021-11-06T00:00:00Z","timestamp":1636156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0804103"],"award-info":[{"award-number":["2018YFB0804103"]}]},{"name":"CCF-NSFOCUS KunPeng Research Fund","award":["2020007"],"award-info":[{"award-number":["2020007"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902262"],"award-info":[{"award-number":["61902262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Defense Innovation Special Zone Program of Science and Technology","award":["JG2019055"],"award-info":[{"award-number":["JG2019055"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10489-021-02863-9","type":"journal-article","created":{"date-parts":[[2021,11,6]],"date-time":"2021-11-06T04:21:18Z","timestamp":1636172478000},"page":"8810-8819","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network"],"prefix":"10.1007","volume":"52","author":[{"given":"Zhenfei","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Weina","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Runzi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenqi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,6]]},"reference":[{"key":"2863_CR1","unstructured":"Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: International conference on machine learning. PMLR, pp 214\u2013223"},{"key":"2863_CR2","unstructured":"Beltagy I, Peters ME, Cohan A (2020) Longformer: The long-document transformer. arXiv:2004.05150. [cs]"},{"key":"2863_CR3","doi-asserted-by":"publisher","unstructured":"Brown A, Tuor A, Hutchinson B, Nichols N (2018) Recurrent neural network attention mechanisms for interpretable system log anomaly detection. In: Proceedings of the First Workshop on Machine Learning for Computing Systems - MLCS\u201918. https:\/\/doi.org\/10.1145\/3217871.3217872. ACM Press, USA, pp 1\u20138","DOI":"10.1145\/3217871.3217872"},{"key":"2863_CR4","doi-asserted-by":"crossref","unstructured":"Chalapathy R, Chawla S (2019) Deep Learning for Anomaly Detection: A Survey. arXiv:...... [cs, stat]","DOI":"10.1145\/3394486.3406704"},{"issue":"3","key":"2863_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: A survey. ACM Comput Surv 41(3):1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput Surv"},{"key":"2863_CR6","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K (2019) BERT: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805. [cs]"},{"key":"2863_CR7","doi-asserted-by":"publisher","unstructured":"Du M, Li F, Zheng G, Srikumar V (2017) Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. https:\/\/doi.org\/10.1145\/3133956.3134015. ACM, Dallas, pp 1285\u20131298","DOI":"10.1145\/3133956.3134015"},{"key":"2863_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1613\/jair.3623","volume":"46","author":"N Goernitz","year":"2013","unstructured":"Goernitz N, Kloft M, Rieck K, Brefeld U (2013) Toward supervised anomaly detection. J Artif Intell Res 46:235\u2013262. https:\/\/doi.org\/10.1613\/jair.3623","journal-title":"J Artif Intell Res"},{"key":"2863_CR9","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks. arXiv:1406.2661. [cs, stat]"},{"key":"2863_CR10","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.1109\/TIFS.2021.3053371","volume":"16","author":"S Han","year":"2021","unstructured":"Han S, Wu Q, Zhang H, Qin B, Hu J, Shi X, Liu L, Yin X (2021) Log-Based Anomaly detection with robust feature extraction and online learning. IEEE Trans Inform Forens Secur 16:2300\u20132311. https:\/\/doi.org\/10.1109\/TIFS.2021.3053371","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"2863_CR11","unstructured":"He S, Zhu J, He P, Lyu MR (2020) Loghub: A Large Collection of System Log Datasets towards Automated Log Analytics. arXiv:2008.06448. [cs]"},{"issue":"8","key":"2863_CR12","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long Short-Term memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"2863_CR13","doi-asserted-by":"publisher","unstructured":"Li D, Chen D, Jin B, Shi L, Goh J, Ng SK (2019) MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks. In: Tetko IV, K\u016frkov\u00e1 V, Karpov P, Theis F (eds) Artificial Neural Networks and Machine Learning \u2013 ICANN 2019: Text and Time Series, Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/978-3-030-30490-4_56. Springer International Publishing, Cham, pp 703\u2013716","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"2863_CR14","doi-asserted-by":"publisher","unstructured":"Lin Q, Zhang H, Lou JG, Zhang Y, Chen X (2016) Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion - ICSE \u201916. https:\/\/doi.org\/10.1145\/2889160.2889232. ACM Press, Texas, pp 102\u2013111","DOI":"10.1145\/2889160.2889232"},{"key":"2863_CR15","doi-asserted-by":"publisher","unstructured":"Lu S, Wei X, Li Y, Wang L (2018) Detecting anomaly in big data system logs using convolutional neural network. In: 2018 IEEE 16Th intl conf on dependable, autonomic and secure computing, 16th intl conf on pervasive intelligence and computing, 4th intl conf on big data intelligence and computing and cyber science and technology congress(DASC\/picom\/datacom\/ cyberscitech). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037. IEEE, Athens, pp 151\u2013158","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"2863_CR16","doi-asserted-by":"publisher","unstructured":"Meng W, Liu Y, Zhu Y, Zhang S, Pei D, Liu Y, Chen Y, Zhang R, Tao S, Sun P, Zhou R (2019) Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: Proceedings of the twenty-eighth international joint conference on artificial intelligence. https:\/\/doi.org\/10.24963\/ijcai.2019\/658. International Joint Conferences on Artificial Intelligence Organization, China, pp 4739\u20134745","DOI":"10.24963\/ijcai.2019\/658"},{"issue":"6","key":"2863_CR17","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TPDS.2013.21","volume":"24","author":"H Mi","year":"2013","unstructured":"Mi H, Wang H, Zhou Y, Lyu MRT, Cai H (2013) Toward Fine-Grained, unsupervised, scalable performance diagnosis for Production Cloud Computing Systems. IEEE Transactions on Parallel and Distributed Systems 24(6):1245\u20131255. https:\/\/doi.org\/10.1109\/TPDS.2013.21","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2863_CR18","unstructured":"Mirza M, Osindero S (2014) Conditional Generative Adversarial Nets. arXiv:1411.1784. [cs, stat]"},{"key":"2863_CR19","doi-asserted-by":"publisher","unstructured":"Nanduri A, Sherry L (2016) Anomaly detection in aircraft data using Recurrent Neural Networks (RNN). In: 2016 Integrated communications navigation and surveillance (ICNS). https:\/\/doi.org\/10.1109\/ICNSURV.2016.7486356. IEEE , Herndon, pp 5c2\u20131\u20135c2\u20138","DOI":"10.1109\/ICNSURV.2016.7486356"},{"key":"2863_CR20","doi-asserted-by":"publisher","unstructured":"Ngo PC, Winarto AA, Kou CKL, Park S, Akram F, Lee HK (2019) Fence GAN: Towards better anomaly detection. In: 2019 IEEE 31St International Conference on tools with artificial intelligence (ICTAI), pp 141\u2013148. https:\/\/doi.org\/10.1109\/ICTAI.2019.00028","DOI":"10.1109\/ICTAI.2019.00028"},{"issue":"11","key":"2863_CR21","doi-asserted-by":"publisher","first-page":"5450","DOI":"10.1109\/TIP.2019.2917862","volume":"28","author":"P Perera","year":"2019","unstructured":"Perera P, Patel VM (2019) Learning deep features for One-Class classification. IEEE Trans Image Process 28(11):5450\u20135463. https:\/\/doi.org\/10.1109\/TIP.2019.2917862","journal-title":"IEEE Trans Image Process"},{"key":"2863_CR22","doi-asserted-by":"publisher","unstructured":"Ren R, Cheng J, Yin Y, Zhan J, Wang L, Li J, Luo C (2018) Deep convolutional neural networks for log event classification on distributed cluster systems. In: 2018 IEEE International conference on big data (big data). https:\/\/doi.org\/10.1109\/BigData.2018.8622611. IEEE, Seattle, WA, USA, pp 1639\u20131646","DOI":"10.1109\/BigData.2018.8622611"},{"key":"2863_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Langs G, Schmidt-Erfurth U (2019) F-anoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Med Image Anal 54:30\u201344. https:\/\/doi.org\/10.1016\/j.media.2019.01.010","journal-title":"Med Image Anal"},{"key":"2863_CR24","doi-asserted-by":"publisher","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery. In: Niethammer M, Styner M, Aylward S, Zhu H, Oguz I, Yap PT, Shen D (eds) Information Processing in Medical Imaging, Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12. Springer International Publishing, Cham, pp 146\u2013157","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"2863_CR25","unstructured":"Tuor A, Kaplan S, Hutchinson B, Nichols N, Robinson S (2017) Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams. arXiv:1710.00811. [cs, stat]"},{"key":"2863_CR26","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention Is All You Need. arXiv:1706.03762. [cs]"},{"key":"2863_CR27","unstructured":"Wang S, Li BZ, Khabsa M, Fang H, Ma H (2020) Linformer: Self-Attention with Linear Complexity. arXiv:2006.04768. [cs, stat]"},{"key":"2863_CR28","doi-asserted-by":"publisher","unstructured":"Xia B, Bai Y, Yin J, Li Y, Xu J (2020) LogGAN: A log-level generative adversarial network for anomaly detection using permutation event modeling information systems frontiers. https:\/\/doi.org\/10.1007\/s10796-020-10026-3","DOI":"10.1007\/s10796-020-10026-3"},{"key":"2863_CR29","doi-asserted-by":"crossref","unstructured":"Yu L, Zhang W, Wang J, Yu Y (2017) SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient Proceedings of the AAAI Conference on Artificial Intelligence 31(1)","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"2863_CR30","doi-asserted-by":"publisher","unstructured":"Zenati H, Romain M, Foo C, Lecouat B, Chandrasekhar V (2018) Adversarially learned anomaly detection. In: 2018 IEEE International conference on data mining (ICDM), pp 727\u2013736. https:\/\/doi.org\/10.1109\/ICDM.2018.00088","DOI":"10.1109\/ICDM.2018.00088"},{"key":"2863_CR31","doi-asserted-by":"publisher","unstructured":"Zhang D, Zheng Y, Wen Y, Xu Y, Wang J, Yu Y, Meng D (2018) Role-based log analysis applying deep learning for insider threat detection. In: Proceedings of the 1st workshop on security-oriented designs of computer architectures and processors - SecArch\u201918. https:\/\/doi.org\/10.1145\/3267494.3267495. ACM Press, Canada, pp 18\u201320","DOI":"10.1145\/3267494.3267495"},{"key":"2863_CR32","doi-asserted-by":"crossref","unstructured":"Zhou H, Zhang S, Peng J, Zhang S, Li J, Xiong H, Zhang W (2021) Informer: Beyond efficient transformer for long sequence time-series forecasting. arXiv:2012.07436. [cs]","DOI":"10.1609\/aaai.v35i12.17325"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02863-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02863-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02863-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T15:45:31Z","timestamp":1673711131000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02863-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,6]]},"references-count":32,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["2863"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02863-9","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,6]]},"assertion":[{"value":"17 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}