{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T18:59:45Z","timestamp":1770145185914,"version":"3.49.0"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T00:00:00Z","timestamp":1764892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T00:00:00Z","timestamp":1764892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research Grants Council of the Hong Kong Special Administrative Region","award":["No. CUHK 14206921"],"award-info":[{"award-number":["No. CUHK 14206921"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No. 76250-31610005"],"award-info":[{"award-number":["No. 76250-31610005"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s10664-025-10769-0","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T06:52:18Z","timestamp":1764917538000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["KPIRoot+: An efficient integrated framework for anomaly detection and root cause analysis in large-scale cloud systems"],"prefix":"10.1007","volume":"31","author":[{"given":"Wenwei","family":"Gu","sequence":"first","affiliation":[]},{"given":"Renyi","family":"Zhong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6195-9088","authenticated-orcid":false,"given":"Guangba","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xinying","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jinyang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yintong","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Zhuangbin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiazhen","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yongqiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"key":"10769_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal S, Chakraborty S, Garg S, et\u00a0al (2023) Outage-watch: Early prediction of outages using extreme event regularizer. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp 682\u2013694","DOI":"10.1145\/3611643.3616316"},{"key":"10769_CR2","doi-asserted-by":"crossref","unstructured":"Arnold A, Liu Y, Abe N (2007) Temporal causal modeling with graphical granger methods. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 66\u201375","DOI":"10.1145\/1281192.1281203"},{"issue":"13","key":"10769_CR3","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1002\/cpe.1867","volume":"24","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov A, Buyya R (2012) Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurrency and Computation Practice and Experience 24(13):1397\u20131420","journal-title":"Concurrency and Computation Practice and Experience"},{"key":"10769_CR4","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, et\u00a0al (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pp 93\u2013104","DOI":"10.1145\/342009.335388"},{"key":"10769_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107083","volume":"153","author":"Y Chen","year":"2023","unstructured":"Chen Y, Xu D, Chen N et al (2023) Frl-mfpg: Propagation-aware fault root cause location for microservice intelligent operation and maintenance. Inf Softw Technol 153:107083","journal-title":"Inf Softw Technol"},{"key":"10769_CR6","unstructured":"Cheng Q, Sahoo D, Saha A, et\u00a0al (2023) Ai for it operations (aiops) on cloud platforms: Reviews, opportunities and challenges. arXiv preprint arXiv:2304.04661"},{"key":"10769_CR7","doi-asserted-by":"crossref","unstructured":"Cortez E, Bonde A, Muzio A, et\u00a0al (2017) Resource central: Understanding and predicting workloads for improved resource management in large cloud platforms. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp 153\u2013167","DOI":"10.1145\/3132747.3132772"},{"key":"10769_CR8","doi-asserted-by":"crossref","unstructured":"Deng A, Hooi B (2021) Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI conference on artificial intelligence, pp 4027\u20134035","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"10769_CR9","doi-asserted-by":"crossref","unstructured":"Gu J, Luo C, Qin S, et\u00a0al (2020) Efficient incident identification from multi-dimensional issue reports via meta-heuristic search. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp 292\u2013303","DOI":"10.1145\/3368089.3409741"},{"key":"10769_CR10","doi-asserted-by":"crossref","unstructured":"Gu W, Liu J, Chen Z, et\u00a0al (2024a) Identifying performance issues in cloud service systems based on relational-temporal features. ACM Transactions on Software Engineering and Methodology","DOI":"10.1145\/3702978"},{"key":"10769_CR11","doi-asserted-by":"crossref","unstructured":"Gu W, Sun X, Liu J, et\u00a0al (2024b) Kpiroot: Efficient monitoring metric-based root cause localization in large-scale cloud systems. In: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE), IEEE, pp 403\u2013414","DOI":"10.1109\/ISSRE62328.2024.00046"},{"key":"10769_CR12","doi-asserted-by":"crossref","unstructured":"Guo C, Li H, Pan D (2010) An improved piecewise aggregate approximation based on statistical features for time series mining. In: Knowledge Science, Engineering and Management: 4th International Conference, KSEM 2010, Belfast, Northern Ireland, UK, September 1-3, 2010. Proceedings 4, Springer, pp 234\u2013244","DOI":"10.1007\/978-3-642-15280-1_23"},{"key":"10769_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10044-014-0395-5","volume":"19","author":"X He","year":"2016","unstructured":"He X, Shao C, Xiong Y (2016) A non-parametric symbolic approximate representation for long time series. Pattern Anal Appl 19:111\u2013127","journal-title":"Pattern Anal Appl"},{"key":"10769_CR14","doi-asserted-by":"crossref","unstructured":"Huang T, Chen P, Zhang J, et\u00a0al (2022) A transferable time series forecasting service using deep transformer model for online systems. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pp 1\u201312","DOI":"10.1145\/3551349.3560414"},{"key":"10769_CR15","first-page":"31158","volume":"35","author":"A Ikram","year":"2022","unstructured":"Ikram A, Chakraborty S, Mitra S et al (2022) Root cause analysis of failures in microservices through causal discovery. Adv Neural Inf Process Syst 35:31158\u201331170","journal-title":"Adv Neural Inf Process Syst"},{"key":"10769_CR16","doi-asserted-by":"crossref","unstructured":"Kaushik P, Rao AM, Singh DP, et\u00a0al (2021) Cloud computing and comparison based on service and performance between amazon aws, microsoft azure, and google cloud. In: 2021 International Conference on Technological Advancements and Innovations (ICTAI), IEEE, pp 268\u2013273","DOI":"10.1109\/ICTAI53825.2021.9673425"},{"key":"10769_CR17","doi-asserted-by":"crossref","unstructured":"Kuang J, Liu J, Huang J, et\u00a0al (2024) Knowledge-aware alert aggregation in large-scale cloud systems: a hybrid approach. In: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice, pp 369\u2013380","DOI":"10.1145\/3639477.3639745"},{"issue":"2","key":"10769_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1049\/iet-net.2018.5082","volume":"8","author":"M Latah","year":"2019","unstructured":"Latah M, Toker L (2019) Artificial intelligence enabled software-defined networking: a comprehensive overview. IET networks 8(2):79\u201399","journal-title":"IET networks"},{"key":"10769_CR19","doi-asserted-by":"crossref","unstructured":"Li M, Li Z, Yin K, et\u00a0al (2022) Causal inference-based root cause analysis for online service systems with intervention recognition. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 3230\u20133240","DOI":"10.1145\/3534678.3539041"},{"key":"10769_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110176","volume":"138","author":"P Li","year":"2023","unstructured":"Li P, Pei Y, Li J (2023) A comprehensive survey on design and application of autoencoder in deep learning. Appl Soft Comput 138:110176","journal-title":"Appl Soft Comput"},{"key":"10769_CR21","doi-asserted-by":"crossref","unstructured":"Lin J, Keogh E, Lonardi S, et\u00a0al (2003) A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, pp 2\u201311","DOI":"10.1145\/882082.882086"},{"key":"10769_CR22","doi-asserted-by":"crossref","unstructured":"Lin Q, Lou JG, Zhang H, et\u00a0al (2016a) idice: problem identification for emerging issues. In: Proceedings of the 38th International Conference on Software Engineering, pp 214\u2013224","DOI":"10.1145\/2884781.2884795"},{"key":"10769_CR23","doi-asserted-by":"crossref","unstructured":"Lin Q, Zhang H, Lou JG, et\u00a0al (2016b) Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp 102\u2013111","DOI":"10.1145\/2889160.2889232"},{"key":"10769_CR24","doi-asserted-by":"crossref","unstructured":"Lin Q, Hsieh K, Dang Y, et\u00a0al (2018) Predicting node failure in cloud service systems. In: Proceedings of the 2018 26th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 480\u2013490","DOI":"10.1145\/3236024.3236060"},{"key":"10769_CR25","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining (ICDM), IEEE, pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"issue":"4","key":"10769_CR26","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/TCC.2016.2567392","volume":"6","author":"J Liu","year":"2016","unstructured":"Liu J, Wang S, Zhou A et al (2016) Using proactive fault-tolerance approach to enhance cloud service reliability. IEEE Transactions on Cloud Computing 6(4):1191\u20131202","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"10769_CR27","doi-asserted-by":"crossref","unstructured":"Liu J, He S, Chen Z, et\u00a0al (2023) Incident-aware duplicate ticket aggregation for cloud systems. arXiv preprint arXiv:2302.09520","DOI":"10.1109\/ICSE48619.2023.00193"},{"issue":"5","key":"10769_CR28","doi-asserted-by":"publisher","first-page":"3087","DOI":"10.1109\/TDSC.2021.3083671","volume":"19","author":"M Ma","year":"2021","unstructured":"Ma M, Lin W, Pan D et al (2021) Servicerank: Root cause identification of anomaly in large-scale microservice architectures. IEEE Trans Dependable Secure Comput 19(5):3087\u20133100","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10769_CR29","first-page":"262","volume-title":"2018 IEEE 11th International Conference on Software Testing","author":"L Mariani","year":"2018","unstructured":"Mariani L, Monni C, Pezz\u00e9 M et al (2018) Localizing faults in cloud systems. 2018 IEEE 11th International Conference on Software Testing. Verification and Validation (ICST), IEEE, pp 262\u2013273"},{"key":"10769_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110464","volume":"161","author":"L Mariani","year":"2020","unstructured":"Mariani L, Pezz\u00e8 M, Riganelli O et al (2020) Predicting failures in multi-tier distributed systems. J Syst Softw 161:110464","journal-title":"J Syst Softw"},{"key":"10769_CR31","doi-asserted-by":"crossref","unstructured":"Minnen D, Isbell C, Essa I, et\u00a0al (2007) Detecting subdimensional motifs: An efficient algorithm for generalized multivariate pattern discovery. In: Seventh IEEE International Conference on Data Mining (ICDM 2007), IEEE, pp 601\u2013606","DOI":"10.1109\/ICDM.2007.52"},{"key":"10769_CR32","doi-asserted-by":"crossref","unstructured":"Pham L, Ha H, Zhang H (2024) Baro: Robust root cause analysis for microservices via multivariate bayesian online change point detection. Proceedings of the ACM on Software Engineering 1(FSE):2214\u20132237","DOI":"10.1145\/3660805"},{"issue":"6","key":"10769_CR33","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.3390\/app10062166","volume":"10","author":"J Qiu","year":"2020","unstructured":"Qiu J, Du Q, Yin K et al (2020) A causality mining and knowledge graph-based method of root cause diagnosis for performance anomaly in cloud applications. Appl Sci 10(6):2166","journal-title":"Appl Sci"},{"key":"10769_CR34","unstructured":"RB C (1990) Stl: A seasonal-trend decomposition procedure based on loess. J Off Stat 6:3\u201373"},{"key":"10769_CR35","doi-asserted-by":"crossref","unstructured":"Ren H, Xu B, Wang Y, et\u00a0al (2019) Time-series anomaly detection service at microsoft. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp 3009\u20133017","DOI":"10.1145\/3292500.3330680"},{"key":"10769_CR36","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: Convolutional networks for biomedical image segmentation. In: Medical image computing and computer-assisted intervention\u2013MICCAI 2015: 18th international conference, Munich, Germany, October 5-9, 2015, proceedings, part III 18, Springer, pp 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"10769_CR37","doi-asserted-by":"crossref","unstructured":"Senin P, Malinchik S (2013) Sax-vsm: Interpretable time series classification using sax and vector space model. In: 2013 IEEE 13th international conference on data mining, IEEE, pp 1175\u20131180","DOI":"10.1109\/ICDM.2013.52"},{"key":"10769_CR38","doi-asserted-by":"crossref","unstructured":"Shan H, Chen Y, Liu H, et\u00a0al (2019) $$\\epsilon$$-diagnosis: Unsupervised and real-time diagnosis of small-window long-tail latency in large-scale microservice platforms. In: The World Wide Web Conference, pp 3215\u20133222","DOI":"10.1145\/3308558.3313653"},{"key":"10769_CR39","doi-asserted-by":"crossref","unstructured":"Sharma Y, Bhamare D, Sastry N, et\u00a0al (2023) Sla management in intent-driven service management systems: A taxonomy and future directions. ACM Computing Surveys","DOI":"10.1145\/3589339"},{"key":"10769_CR40","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1146\/annurev-statistics-040120-010930","volume":"9","author":"A Shojaie","year":"2022","unstructured":"Shojaie A, Fox EB (2022) Granger causality: A review and recent advances. Annual Review of Statistics and Its Application 9:289\u2013319","journal-title":"Annual Review of Statistics and Its Application"},{"key":"10769_CR41","doi-asserted-by":"crossref","unstructured":"Siffer A, Fouque PA, Termier A, et\u00a0al (2017) Anomaly detection in streams with extreme value theory. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining, pp 1067\u20131075","DOI":"10.1145\/3097983.3098144"},{"key":"10769_CR42","doi-asserted-by":"crossref","unstructured":"Singh S, Batheri R, Dias J (2023) Predictive analytics: How to improve availability of manufacturing equipment in automotive firms. IEEE Engineering Management Review","DOI":"10.1109\/EMR.2023.3288669"},{"issue":"3","key":"10769_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501297","volume":"55","author":"J Soldani","year":"2022","unstructured":"Soldani J, Brogi A (2022) Anomaly detection and failure root cause analysis in (micro) service-based cloud applications: A survey. ACM Computing Surveys (CSUR) 55(3):1\u201339","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10769_CR44","doi-asserted-by":"crossref","unstructured":"Su Y, Zhao Y, Niu C, et\u00a0al (2019a) Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2828\u20132837","DOI":"10.1145\/3292500.3330672"},{"key":"10769_CR45","doi-asserted-by":"crossref","unstructured":"Su Y, Zhao Y, Xia W, et\u00a0al (2019b) Coflux: robustly correlating kpis by fluctuations for service troubleshooting. In: Proceedings of the International Symposium on Quality of Service, pp 1\u201310","DOI":"10.1145\/3326285.3329048"},{"key":"10769_CR46","doi-asserted-by":"crossref","unstructured":"Tuli S, Gill SS, Garraghan P, et\u00a0al (2021) Start: Straggler prediction and mitigation for cloud computing environments using encoder lstm networks. IEEE Transactions on Services Computing","DOI":"10.1109\/TSC.2021.3129897"},{"issue":"6","key":"10769_CR47","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.14778\/3514061.3514067","volume":"15","author":"S Tuli","year":"2022","unstructured":"Tuli S, Casale G, Jennings NR (2022) Tranad: deep transformer networks for anomaly detection in multivariate time series data. Proceedings of the VLDB Endowment 15(6):1201\u20131214","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"12","key":"10769_CR48","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.14778\/3352063.3352105","volume":"12","author":"H Wang","year":"2019","unstructured":"Wang H, Nguyen P, Li J et al (2019) Grano: Interactive graph-based root cause analysis for cloud-native distributed data platform. Proceedings of the VLDB Endowment 12(12):1942\u20131945","journal-title":"Proceedings of the VLDB Endowment"},{"key":"10769_CR49","unstructured":"Wang D, Chen Z, Ni J, et\u00a0al (2023a) Hierarchical graph neural networks for causal discovery and root cause localization. arXiv preprint arXiv:2302.01987"},{"key":"10769_CR50","doi-asserted-by":"crossref","unstructured":"Wang L, Zhang C, Ding R, et\u00a0al (2023b) Root cause analysis for microservice systems via hierarchical reinforcement learning from human feedback. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 5116\u20135125","DOI":"10.1145\/3580305.3599934"},{"key":"10769_CR51","doi-asserted-by":"crossref","unstructured":"Wickremasinghe B, Calheiros RN, Buyya R (2010) Cloudanalyst: A cloudsim-based visual modeller for analysing cloud computing environments and applications. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, IEEE, pp 446\u2013452","DOI":"10.1109\/AINA.2010.32"},{"key":"10769_CR52","doi-asserted-by":"crossref","unstructured":"Wu L, Tordsson J, Bogatinovski J, et\u00a0al (2021) Microdiag: Fine-grained performance diagnosis for microservice systems. In: 2021 IEEE\/ACM International Workshop on Cloud Intelligence (CloudIntelligence), IEEE, pp 31\u201336","DOI":"10.1109\/CloudIntelligence52565.2021.00015"},{"key":"10769_CR53","doi-asserted-by":"crossref","unstructured":"Xu H, Chen W, Zhao N, et\u00a0al (2018) Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. In: Proceedings of the 2018 World Wide Web Conference, pp 187\u2013196","DOI":"10.1145\/3178876.3185996"},{"key":"10769_CR54","doi-asserted-by":"crossref","unstructured":"Yan S, Shan C, Yang W, et\u00a0al (2022) Cmmd: Cross-metric multi-dimensional root cause analysis. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 4310\u20134320","DOI":"10.1145\/3534678.3539109"},{"key":"10769_CR55","doi-asserted-by":"crossref","unstructured":"Yang T, Shen J, Su Y, et\u00a0al (2021) Aid: efficient prediction of aggregated intensity of dependency in large-scale cloud systems. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), IEEE, pp 653\u2013665","DOI":"10.1109\/ASE51524.2021.9678534"},{"issue":"5","key":"10769_CR56","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TPDS.2016.2619715","volume":"28","author":"J Yin","year":"2016","unstructured":"Yin J, Zhao X, Tang Y et al (2016) Cloudscout: A non-intrusive approach to service dependency discovery. IEEE Trans Parallel Distrib Syst 28(5):1271\u20131284","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10769_CR57","doi-asserted-by":"crossref","unstructured":"Yu B, Yao J, Fu Q, et\u00a0al (2024) Deep learning or classical machine learning? an empirical study on log-based anomaly detection. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp 1\u201313","DOI":"10.1145\/3597503.3623308"},{"key":"10769_CR58","doi-asserted-by":"crossref","unstructured":"Yu G, Chen P, Li Y, et\u00a0al (2023) Nezha: Interpretable fine-grained root causes analysis for microservices on multi-modal observability data. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp 553\u2013565","DOI":"10.1145\/3611643.3616249"},{"key":"10769_CR59","doi-asserted-by":"crossref","unstructured":"Zhang J, Wu W, Huang Jt, et\u00a0al (2022) Improving adversarial transferability via neuron attribution-based attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 14993\u201315002","DOI":"10.1109\/CVPR52688.2022.01457"},{"key":"10769_CR60","doi-asserted-by":"crossref","unstructured":"Zhang J, Gu W, Huang Y, et\u00a0al (2024) Curvature-invariant adversarial attacks for 3d point clouds. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 7142\u20137150","DOI":"10.1609\/aaai.v38i7.28542"},{"issue":"2","key":"10769_CR61","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/235968.233324","volume":"25","author":"T Zhang","year":"1996","unstructured":"Zhang T, Ramakrishnan R, Livny M (1996) Birch: an efficient data clustering method for very large databases. ACM SIGMOD Rec 25(2):103\u2013114","journal-title":"ACM SIGMOD Rec"},{"key":"10769_CR62","doi-asserted-by":"crossref","unstructured":"Zhang X, Du C, Li Y, et\u00a0al (2021) Halo: Hierarchy-aware fault localization for cloud systems. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp 3948\u20133958","DOI":"10.1145\/3447548.3467190"},{"key":"10769_CR63","doi-asserted-by":"crossref","unstructured":"Zhao N, Zhu J, Liu R, et\u00a0al (2019) Label-less: A semi-automatic labelling tool for kpi anomalies. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, IEEE, pp 1882\u20131890","DOI":"10.1109\/INFOCOM.2019.8737429"},{"key":"10769_CR64","doi-asserted-by":"crossref","unstructured":"Zhao N, Chen J, Peng X, et\u00a0al (2020a) Understanding and handling alert storm for online service systems. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice, pp 162\u2013171","DOI":"10.1145\/3377813.3381363"},{"key":"10769_CR65","doi-asserted-by":"crossref","unstructured":"Zhao N, Chen J, Wang Z, et\u00a0al (2020b) Real-time incident prediction for online service systems. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp 315\u2013326","DOI":"10.1145\/3368089.3409672"},{"issue":"4","key":"10769_CR66","doi-asserted-by":"publisher","first-page":"533","DOI":"10.3233\/JCS-130474","volume":"21","author":"F Zhou","year":"2013","unstructured":"Zhou F, Goel M, Desnoyers P et al (2013) Scheduler vulnerabilities and coordinated attacks in cloud computing. J Comput Secur 21(4):533\u2013559","journal-title":"J Comput Secur"},{"key":"10769_CR67","unstructured":"Zong B, Song Q, Min MR, et\u00a0al (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International conference on learning representations"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10769-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10769-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10769-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T04:33:43Z","timestamp":1768365223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10769-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,5]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["10769"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10769-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,5]]},"assertion":[{"value":"17 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"This manuscript extends our previous ISSRE paper titled \u2019KPIRoot: Efficient Monitoring Metric-based Root Cause Localization in Large-scale Cloud Systems,\u2019 which further improves the KPIRoot. The authors also declare that this manuscript follows the best scientific standards, in particular with regard to acknowledgment of prior works, honesty of the presentation of results, and focus on the demonstrability of the statements. This manuscript and the work that led to it do not carry any specific ethical issue.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"All the authors give their consent to submit this work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"28"}}