{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:09:51Z","timestamp":1751947791768,"version":"3.41.2"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:00:00Z","timestamp":1748563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:00:00Z","timestamp":1748563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s44443-025-00064-9","type":"journal-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T15:42:55Z","timestamp":1748619775000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning the fine-grained code representation for log-level prediction"],"prefix":"10.1007","volume":"37","author":[{"given":"Zhiyong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Guodong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Haotian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,30]]},"reference":[{"key":"64_CR1","doi-asserted-by":"crossref","unstructured":"Alon U, Zilberstein M, Levy O et\u00a0al (2019) code2vec: learning distributed representations of code. Proc ACM Program Lang 3(POPL):1\u201329","DOI":"10.1145\/3290353"},{"key":"64_CR2","unstructured":"Apache (2023) Zookeeper. https:\/\/github.com\/apache\/zookeeper"},{"key":"64_CR3","unstructured":"Apache (2024a) Cassandra. https:\/\/github.com\/apache\/cassandra"},{"key":"64_CR4","unstructured":"Apache (2024b) Flink. https:\/\/github.com\/apache\/flink"},{"key":"64_CR5","unstructured":"Apache (2024c) Hbase. https:\/\/github.com\/apache\/hbase"},{"key":"64_CR6","unstructured":"Apache (2024d) Jmeter. https:\/\/github.com\/apache\/jmeter"},{"key":"64_CR7","unstructured":"Apache (2024e) Kafka. https:\/\/github.com\/apache\/kafka"},{"key":"64_CR8","unstructured":"Apache (2024f) Karaf. https:\/\/github.com\/apache\/karaf"},{"key":"64_CR9","unstructured":"Apache (2024g) Wicket. https:\/\/github.com\/apache\/wicket"},{"key":"64_CR10","unstructured":"Ben-Nun T, Jakobovits AS, Hoefler T (2018) Neural code comprehension: a learnable representation of code semantics. Advances in neural information processing systems, vol 31"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Chen TH, Syer MD, Shang W et\u00a0al (2017) Analytics-driven load testing: an industrial experience report on load testing of large-scale systems. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP). IEEE, pp 243\u2013252","DOI":"10.1109\/ICSE-SEIP.2017.26"},{"key":"64_CR12","doi-asserted-by":"crossref","unstructured":"Chen J, Hou H, Gao J et\u00a0al (2019) Rgcn: recurrent graph convolutional networks for target-dependent sentiment analysis. In: International conference on knowledge science, engineering and management. Springer, pp 667\u2013675","DOI":"10.1007\/978-3-030-29551-6_59"},{"key":"64_CR13","unstructured":"Chen M, Tworek J, Jun H et\u00a0al (2021) Evaluating large language models trained on code. arXiv:2107.03374"},{"issue":"2","key":"64_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3624740","volume":"33","author":"Z Ding","year":"2023","unstructured":"Ding Z, Tang Y, Cheng X et al (2023) Logentext-plus: improving neural machine translation based logging texts generation with syntactic templates. ACM Trans Softw Eng Methodol 33(2):1\u201345","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"64_CR15","doi-asserted-by":"crossref","unstructured":"Ding Z, Tang Y, Li Y et\u00a0al (2023b) On the temporal relations between logging and code. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, pp 843\u2013854","DOI":"10.1109\/ICSE48619.2023.00079"},{"key":"64_CR16","unstructured":"Elastic (2024) Elasticsearch. https:\/\/github.com\/elastic\/elasticsearch"},{"key":"64_CR17","first-page":"1536","volume":"2020","author":"Z Feng","year":"2020","unstructured":"Feng Z, Guo D, Tang D et al (2020) Codebert: A pre-trained model for programming and natural languages. Findings of the association for computational linguistics: EMNLP 2020:1536\u20131547","journal-title":"Findings of the association for computational linguistics: EMNLP"},{"key":"64_CR18","doi-asserted-by":"crossref","unstructured":"Fu Q, Zhu J, Hu W et\u00a0al (2014) Where do developers log? An empirical study on logging practices in industry. In: Companion proceedings of the 36th international conference on software engineering, pp 24\u201333","DOI":"10.1145\/2591062.2591175"},{"key":"64_CR19","doi-asserted-by":"crossref","unstructured":"Guo D, Lu S, Duan N et\u00a0al (2022) Unixcoder: unified cross-modal pre-training for code representation. In: Proceedings of the 60th annual meeting of the association for computational linguistics (Volume 1: Long Papers), pp 7212\u20137225","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"64_CR20","unstructured":"Guo D, Ren S, Lu S et\u00a0al (2020) Graphcodebert: pre-training code representations with data flow. In: International conference on learning representations"},{"key":"64_CR21","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Advances in neural information processing systems, vol 30"},{"key":"64_CR22","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1023\/A:1010920819831","volume":"45","author":"DJ Hand","year":"2001","unstructured":"Hand DJ, Till RJ (2001) A simple generalisation of the area under the roc curve for multiple class classification problems. Mach Learn 45:171\u2013186","journal-title":"Mach Learn"},{"issue":"6","key":"64_CR23","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/TDSC.2017.2762673","volume":"15","author":"P He","year":"2017","unstructured":"He P, Zhu J, He S et al (2017) Towards automated log parsing for large-scale log data analysis. IEEE Trans Depend Sec Comput 15(6):931\u2013944","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"64_CR24","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. 3rd International Conference on Learning Representations (ICLR)"},{"key":"64_CR25","unstructured":"Koroteev MV (2021) Bert: a review of applications in natural language processing and understanding. arXiv:2103.11943"},{"key":"64_CR26","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1007\/s10664-016-9456-2","volume":"22","author":"H Li","year":"2017","unstructured":"Li H, Shang W, Hassan AE (2017) Which log level should developers choose for a new logging statement? Empir Softw Eng 22:1684\u20131716","journal-title":"Empir Softw Eng"},{"key":"64_CR27","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s10664-018-9595-8","volume":"23","author":"H Li","year":"2018","unstructured":"Li H, Chen TH, Shang W et al (2018) Studying software logging using topic models. Empir Softw Eng 23:2655\u20132694","journal-title":"Empir Softw Eng"},{"issue":"7","key":"64_CR28","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1109\/TSE.2021.3060918","volume":"48","author":"Z Li","year":"2021","unstructured":"Li Z, Chen TH, Yang J et al (2021) Studying duplicate logging statements and their relationships with code clones. IEEE Trans Softw Eng 48(7):2476\u20132494","journal-title":"IEEE Trans Softw Eng"},{"key":"64_CR29","doi-asserted-by":"crossref","unstructured":"Li Z, Li H, Chen TH et\u00a0al (2021b) Deeplv: Suggesting log levels using ordinal based neural networks. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, pp 1461\u20131472","DOI":"10.1109\/ICSE43902.2021.00131"},{"key":"64_CR30","doi-asserted-by":"crossref","unstructured":"Li Z, Lu S, Guo D et\u00a0al (2022) Automating code review activities by large-scale pre-training. In: Proceedings of the 30th ACM joint European software engineering conference and symposium on the foundations of software engineering, pp 1035\u20131047","DOI":"10.1145\/3540250.3549081"},{"key":"64_CR31","doi-asserted-by":"crossref","unstructured":"Li M, Chen S, Fan G et\u00a0al (2023) Robustness-enhanced assertion generation method based on code mutation and attack defense. In: International conference on collaborative computing: networking, applications and worksharing. Springer, pp 281\u2013300","DOI":"10.1007\/978-3-031-54528-3_16"},{"key":"64_CR32","doi-asserted-by":"crossref","unstructured":"Li Y, Huo Y, Zhong R et\u00a0al (2024a) Go static: contextualized logging statement generation. Proc ACM Softw Eng 1(FSE):609\u2013630","DOI":"10.1145\/3643754"},{"key":"64_CR33","doi-asserted-by":"crossref","unstructured":"Li Y, Huo Y, Jiang Z et\u00a0al (2024b) Exploring the effectiveness of llms in automated logging statement generation: an empirical study. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2024.3475375"},{"key":"64_CR34","doi-asserted-by":"crossref","unstructured":"Liu J, Zeng J, Wang X et\u00a0al (2022) Tell: log level suggestions via modeling multi-level code block information. In: Proceedings of the 31st ACM SIGSOFT international symposium on software testing and analysis, pp 27\u201338","DOI":"10.1145\/3533767.3534379"},{"key":"64_CR35","doi-asserted-by":"crossref","unstructured":"Liu J, Zeng J, Wang X et\u00a0al (2023) Learning graph-based code representations for source-level functional similarity detection. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, pp 345\u2013357","DOI":"10.1109\/ICSE48619.2023.00040"},{"key":"64_CR36","doi-asserted-by":"crossref","unstructured":"Mastropaolo A, Pascarella L, Bavota G (2022) Using deep learning to generate complete log statements. In: Proceedings of the 44th international conference on software engineering, pp 2279\u20132290","DOI":"10.1145\/3510003.3511561"},{"key":"64_CR37","unstructured":"Mikolov T, Sutskever I, Chen K et\u00a0al (2013) Distributed representations of words and phrases and their compositionality. Advances in neural information processing systems, vol 26"},{"key":"64_CR38","doi-asserted-by":"crossref","unstructured":"Nagappan M, Wu K, Vouk MA (2009) Efficiently extracting operational profiles from execution logs using suffix arrays. In: 2009 20th International symposium on software reliability engineering. IEEE, pp 41\u201350","DOI":"10.1109\/ISSRE.2009.23"},{"issue":"2","key":"64_CR39","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1109\/TSE.2022.3154672","volume":"49","author":"YE Ouatiti","year":"2022","unstructured":"Ouatiti YE, Sayagh M, Kerzazi N et al (2022) An empirical study on log level prediction for multi-component systems. IEEE Trans Softw Eng 49(2):473\u2013484","journal-title":"IEEE Trans Softw Eng"},{"key":"64_CR40","unstructured":"Paszke A, Gross S, Massa F et\u00a0al (2019) Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, vol 32"},{"issue":"1","key":"64_CR41","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1147\/JRD.2017.2648298","volume":"61","author":"J Wang","year":"2017","unstructured":"Wang J, Li C, Han S et al (2017) Predictive maintenance based on event-log analysis: a case study. IBM J Res Dev 61(1):11\u2013121","journal-title":"IBM J Res Dev"},{"key":"64_CR42","doi-asserted-by":"crossref","unstructured":"Xian Z, Huang R, Towey D et\u00a0al (2024) Transformcode: a contrastive learning framework for code embedding via subtree transformation. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2024.3393419"},{"key":"64_CR43","doi-asserted-by":"crossref","unstructured":"Xu J, Cui Z, Zhao Y et\u00a0al (2024) Unilog: Automatic logging via llm and in-context learning. In: Proceedings of the 46th IEEE\/ACM international conference on software engineering, pp 1\u201312","DOI":"10.1145\/3597503.3623326"},{"key":"64_CR44","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang X, Zhang H et\u00a0al (2019) A novel neural source code representation based on abstract syntax tree. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, pp 783\u2013794","DOI":"10.1109\/ICSE.2019.00086"},{"key":"64_CR45","doi-asserted-by":"crossref","unstructured":"Zhao X, Rodrigues K, Luo Y et\u00a0al (2017) Log20: Fully automated optimal placement of log printing statements under specified overhead threshold. In: Proceedings of the 26th symposium on operating systems principles, pp 565\u2013581","DOI":"10.1145\/3132747.3132778"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00064-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00064-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00064-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T13:03:58Z","timestamp":1751893438000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00064-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,30]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["64"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00064-9","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,5,30]]},"assertion":[{"value":"19 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"51"}}