{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T18:50:36Z","timestamp":1769971836879,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"High-level Innovative Talents in Guizhou Province","award":["No. GCC[2023]033"],"award-info":[{"award-number":["No. GCC[2023]033"]}]},{"name":"Guizhou Provincial Basic Research Program","award":["Qiankehejichu-JC[2024]Zhongdian013"],"award-info":[{"award-number":["Qiankehejichu-JC[2024]Zhongdian013"]}]},{"name":"Guizhou Provincial Basic Research Program","award":["Qiankehejichu-ZK[2023]Yiban252"],"award-info":[{"award-number":["Qiankehejichu-ZK[2023]Yiban252"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["No. QJJ[2024]009"],"award-info":[{"award-number":["No. QJJ[2024]009"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["Qiankehe Platform Talents-BQW [2024] 015"],"award-info":[{"award-number":["Qiankehe Platform Talents-BQW [2024] 015"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["U22A2026"],"award-info":[{"award-number":["U22A2026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s10922-025-09995-0","type":"journal-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:54:44Z","timestamp":1761720884000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["KANAD: Topologically Adaptive Graph Feature Learning for Multimodal Anomaly Detection in Microservice Systems"],"prefix":"10.1007","volume":"34","author":[{"given":"Yang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Weihua","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Weian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongbing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,29]]},"reference":[{"key":"9995_CR1","unstructured":"Cheng, Q., Sahoo, D., Saha, A., Yang, W., Liu, C., Woo, G., Singh, M., Saverese, S., Hoi, S.C.: Ai for it operations (aiops) on cloud platforms: reviews, opportunities and challenges. (2023). arXiv preprint arXiv:2304.04661"},{"key":"9995_CR2","doi-asserted-by":"crossref","unstructured":"Fu, M., Pasuksmit, J., Tantithamthavorn, C.: Ai for devsecops: a landscape and future opportunities. ACM Trans. Softw. Eng. Methodol. (2024)","DOI":"10.1145\/3712190"},{"key":"9995_CR3","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"9995_CR4","doi-asserted-by":"crossref","unstructured":"Yang, L., Chen, J., Wang, Z., Wang, W., Jiang, J., Dong, X., Zhang, W.: Semi-supervised log-based anomaly detection via probabilistic label estimation. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1448\u20131460 (2021)","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"9995_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y., Xie, C., Yang, X., Cheng, Q., Li, Z., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 807\u2013817 (2019)","DOI":"10.1145\/3338906.3338931"},{"key":"9995_CR6","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhao, Y., Niu, C., Liu, R., Sun, W., Pei, D.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2828\u20132837 (2019)","DOI":"10.1145\/3292500.3330672"},{"key":"9995_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Z., Liu, J., Su, Y., Zhang, H., Ling, X., Yang, Y., Lyu, M.R.: Adaptive performance anomaly detection for online service systems via pattern sketching. In: Proceedings of the 44th International Conference on Software Engineering, pp. 61\u201372 (2022)","DOI":"10.1145\/3510003.3510085"},{"key":"9995_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, C., Peng, X., Sha, C., Zhang, K., Fu, Z., Wu, X., Lin, Q., Zhang, D.: Deeptralog: Trace-log combined microservice anomaly detection through graph-based deep learning. In: Proceedings of the 44th International Conference on Software Engineering, pp. 623\u2013634 (2022)","DOI":"10.1145\/3510003.3510180"},{"key":"9995_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, N., Chen, J., Yu, Z., Wang, H., Li, J., Qiu, B., Xu, H., Zhang, W., Sui, K., Pei, D.: Identifying bad software changes via multimodal anomaly detection for online service systems. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 527\u2013539 (2021)","DOI":"10.1145\/3468264.3468543"},{"key":"9995_CR10","doi-asserted-by":"crossref","unstructured":"Lee, C., Yang, T., Chen, Z., Su, Y., Yang, Y., Lyu, M.R.: Heterogeneous anomaly detection for software systems via semi-supervised cross-modal attention. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 1724\u20131736 (2023)","DOI":"10.1109\/ICSE48619.2023.00148"},{"key":"9995_CR11","doi-asserted-by":"crossref","unstructured":"Liu, H., Huang, X., Jia, M., Jia, T., Han, J., Li, Y., Wu, Z.: Uac-ad: Unsupervised adversarial contrastive learning for anomaly detection on multi-modal data in microservice systems. IEEE Trans. Serv. Comput. (2024)","DOI":"10.1109\/TSC.2024.3411481"},{"key":"9995_CR12","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"9995_CR13","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: An online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 33\u201340 (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"9995_CR14","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"9995_CR15","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F.: Spell: Streaming parsing of system event logs. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 859\u2013864 (2016)","DOI":"10.1109\/ICDM.2016.0103"},{"key":"9995_CR16","doi-asserted-by":"crossref","unstructured":"Guo, H., Yuan, S., Wu, X.: Logbert: Log anomaly detection via bert. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2021)","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"9995_CR17","doi-asserted-by":"crossref","unstructured":"Guo, H., Yang, J., Liu, J., Bai, J., Wang, B., Li, Z., Zheng, T., Zhang, B., Peng, J., Tian, Q.: Logformer: A pre-train and tuning pipeline for log anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 38, pp. 135\u2013143 (2024)","DOI":"10.1609\/aaai.v38i1.27764"},{"key":"9995_CR18","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"9995_CR19","unstructured":"Radford, A., Kim, J.W., Hallacy, C., Ramesh, A., Goh, G., Agarwal, S., Sastry, G., Askell, A., Mishkin, P., Clark, J., et al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763 (2021)"},{"key":"9995_CR20","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607 (2020)"},{"key":"9995_CR21","unstructured":"Liu, Z., Wang, Y., Vaidya, S., Ruehle, F., Halverson, J., Solja\u010di\u0107, M., Hou, T.Y., Tegmark, M.: Kan: Kolmogorov-arnold networks. arXiv preprint arXiv:2404.19756 (2024)"},{"key":"9995_CR22","unstructured":"Zhang, F., Zhang, X.: Graphkan: Enhancing feature extraction with graph kolmogorov arnold networks. arXiv preprint arXiv:2406.13597 (2024)"},{"key":"9995_CR23","doi-asserted-by":"crossref","unstructured":"Vaca-Rubio, C.J., Blanco, L., Pereira, R., Caus, M.: Kolmogorov-Arnold networks (kans) for time series analysis. arXiv preprint arXiv:2405.08790 (2024)","DOI":"10.1109\/GCWkshp64532.2024.11100692"},{"key":"9995_CR24","doi-asserted-by":"crossref","unstructured":"Liu, M., Bian, S., Zhou, B., Lukowicz, P.: ikan: Global incremental learning with kan for human activity recognition across heterogeneous datasets. In: Proceedings of the 2024 ACM International Symposium on Wearable Computers, pp. 89\u201395 (2024)","DOI":"10.1145\/3675095.3676618"},{"key":"9995_CR25","doi-asserted-by":"crossref","unstructured":"Yao, L., Mao, C., Luo, Y.: Graph convolutional networks for text classification. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 7370\u20137377 (2019)","DOI":"10.1609\/aaai.v33i01.33017370"},{"key":"9995_CR26","first-page":"9936","volume":"34","author":"W Cong","year":"2021","unstructured":"Cong, W., Ramezani, M., Mahdavi, M.: On provable benefits of depth in training graph convolutional networks. Adv. Neural. Inf. Process. Syst. 34, 9936\u20139949 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"9995_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, H., Yu, L., Xiao, X., Li, Q., Mercaldo, F., Luo, X., Liu, Q.: Tfe-gnn: A temporal fusion encoder using graph neural networks for fine-grained encrypted traffic classification. In: Proceedings of the ACM Web Conference 2023, pp. 2066\u20132075 (2023)","DOI":"10.1145\/3543507.3583227"},{"key":"9995_CR28","unstructured":"Xu, K., Li, C., Tian, Y., Sonobe, T., Kawarabayashi, K.-i., Jegelka, S.: Representation learning on graphs with jumping knowledge networks. In: International Conference on Machine Learning, pp. 5453\u20135462 (2018)"},{"key":"9995_CR29","doi-asserted-by":"crossref","unstructured":"Nedelkoski, S., Bogatinovski, J., Mandapati, A.K., Becker, S., Cardoso, J., Kao, O.: Multi-source distributed system data for ai-powered analytics. In: Service-Oriented and Cloud Computing: 8th IFIP WG 2.14 European Conference, ESOCC 2020, Heraklion, Crete, Greece, September 28\u201330, 2020, Proceedings 8, pp. 161\u2013176 (2020)","DOI":"10.1007\/978-3-030-44769-4_13"},{"key":"9995_CR30","doi-asserted-by":"crossref","unstructured":"Audibert, J., Michiardi, P., Guyard, F., Marti, S., Zuluaga, M.A.: Usad: Unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 3395\u20133404 (2020)","DOI":"10.1145\/3394486.3403392"},{"issue":"5","key":"9995_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3326362","volume":"38","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Sun, Y., Liu, Z., Sarma, S.E., Bronstein, M.M., Solomon, J.M.: Dynamic graph cnn for learning on point clouds. ACM Trans. Graph. (tog) 38(5), 1\u201312 (2019)","journal-title":"ACM Trans. Graph. (tog)"},{"key":"9995_CR32","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)"},{"key":"9995_CR33","doi-asserted-by":"crossref","unstructured":"Li, G., Muller, M., Thabet, A., Ghanem, B.: Deepgcns: Can gcns go as deep as cnns? In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 9267\u20139276 (2019)","DOI":"10.1109\/ICCV.2019.00936"},{"key":"9995_CR34","doi-asserted-by":"crossref","unstructured":"Tao, L., Zhang, S., Jia, Z., Sun, J., Ma, M., Li, Z., Sun, Y., Yang, C., Zhang, Y., Pei, D.: Giving every modality a voice in microservice failure diagnosis via multimodal adaptive optimization. In: Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1107\u20131119 (2024)","DOI":"10.1145\/3691620.3695489"},{"key":"9995_CR35","doi-asserted-by":"crossref","unstructured":"Lee, C., Yang, T., Chen, Z., Su, Y., Lyu, M.R.: Eadro: An end-to-end troubleshooting framework for microservices on multi-source data. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 1750\u20131762 (2023)","DOI":"10.1109\/ICSE48619.2023.00150"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09995-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09995-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09995-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:13:24Z","timestamp":1769915604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09995-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["9995"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09995-0","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"4 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"19"}}