{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T01:28:18Z","timestamp":1776907698039,"version":"3.51.2"},"reference-count":57,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:00:00Z","timestamp":1767830400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["6000796"],"award-info":[{"award-number":["6000796"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["9220103"],"award-info":[{"award-number":["9220103"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["9229098"],"award-info":[{"award-number":["9229098"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["9229109"],"award-info":[{"award-number":["9229109"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["9229029"],"award-info":[{"award-number":["9229029"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.jss.2026.112781","type":"journal-article","created":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:11:22Z","timestamp":1767917482000},"page":"112781","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["LogMeta: A few-shot model-agnostic meta-learning framework for robust and adaptive log anomaly detection"],"prefix":"10.1016","volume":"235","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6555-0571","authenticated-orcid":false,"given":"Yicheng","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3803-9600","authenticated-orcid":false,"given":"Jacky","family":"Wai Keung","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8451-188X","authenticated-orcid":false,"given":"Hi","family":"Kuen Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4171-2025","authenticated-orcid":false,"given":"Wenqiang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.jss.2026.112781_bib0001","first-page":"879","article-title":"Logram: efficient log parsing using n n-gram dictionaries","volume":"48","author":"Dai","year":"2020","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.jss.2026.112781_bib0002","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K., 2018. BERT: pre-training of deep bidirectional transformers for language understanding. arXiv: 1810.04805."},{"issue":"11","key":"10.1016\/j.jss.2026.112781_bib0003","doi-asserted-by":"crossref","first-page":"2213","DOI":"10.1109\/TKDE.2018.2875442","article-title":"Spell: online streaming parsing of large unstructured system logs","volume":"31","author":"Du","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jss.2026.112781_bib0004","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1285","article-title":"DeepLog: anomaly detection and diagnosis from system logs through deep learning","author":"Du","year":"2017"},{"key":"10.1016\/j.jss.2026.112781_bib0005","series-title":"International Conference on Machine Learning","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","author":"Finn","year":"2017"},{"key":"10.1016\/j.jss.2026.112781_bib0006","series-title":"2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"761","article-title":"What makes good in-context demonstrations for code intelligence tasks with LLMs?","author":"Gao","year":"2023"},{"key":"10.1016\/j.jss.2026.112781_bib0007","series-title":"2021 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"LogBERT: log anomaly detection via bert","author":"Guo","year":"2021"},{"key":"10.1016\/j.jss.2026.112781_bib0008","series-title":"2017 IEEE International Conference on Web Services (ICWS)","first-page":"33","article-title":"Drain: an online log parsing approach with fixed depth tree","author":"He","year":"2017"},{"key":"10.1016\/j.jss.2026.112781_bib0009","series-title":"2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"207","article-title":"Experience report: system log analysis for anomaly detection","author":"He","year":"2016"},{"issue":"FSE","key":"10.1016\/j.jss.2026.112781_bib0010","doi-asserted-by":"crossref","first-page":"2406","DOI":"10.1145\/3729377","article-title":"No more labelled examples? An unsupervised log parser with LLMs","volume":"2","author":"Huang","year":"2025","journal-title":"Proc. ACM Software Eng."},{"issue":"4","key":"10.1016\/j.jss.2026.112781_bib0011","doi-asserted-by":"crossref","first-page":"2064","DOI":"10.1109\/TNSM.2020.3034647","article-title":"HitAnomaly: hierarchical transformers for anomaly detection in system log","volume":"17","author":"Huang","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.jss.2026.112781_bib0012","unstructured":"Huang, Z., Xu, W., Yu, K., 2015. Bidirectional LSTM-CRF models for sequence tagging. arXiv: 1508.01991."},{"issue":"FSE","key":"10.1016\/j.jss.2026.112781_bib0013","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/3643733","article-title":"LILAC: log parsing using LLMs with adaptive parsing cache","volume":"1","author":"Jiang","year":"2024","journal-title":"Proc. ACM on Software Eng."},{"key":"10.1016\/j.jss.2026.112781_bib0014","series-title":"Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"223","article-title":"A large-scale evaluation for log parsing techniques: how far are we?","author":"Jiang","year":"2024"},{"key":"10.1016\/j.jss.2026.112781_bib0015","series-title":"2008 The Eighth International Conference on Quality Software","first-page":"181","article-title":"Abstracting execution logs to execution events for enterprise applications (short paper)","author":"Jiang","year":"2008"},{"key":"10.1016\/j.jss.2026.112781_bib0016","series-title":"Proceedings of the 44th International Conference on Software Engineering","first-page":"1095","article-title":"Guidelines for assessing the accuracy of log message template identification techniques","author":"Khan","year":"2022"},{"issue":"2\u20133","key":"10.1016\/j.jss.2026.112781_bib0017","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1561\/2200000044","article-title":"Determinantal point processes for machine learning","volume":"5","author":"Kulesza","year":"2012","journal-title":"Found. Trends\u00ae in Mach. Learn."},{"key":"10.1016\/j.jss.2026.112781_bib0018","series-title":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"492","article-title":"Log-based anomaly detection without log parsing","author":"Le","year":"2021"},{"key":"10.1016\/j.jss.2026.112781_bib0019","series-title":"Proceedings of the 44th International Conference on Software Engineering","first-page":"1356","article-title":"Log-based anomaly detection with deep learning: how far are we?","author":"Le","year":"2022"},{"key":"10.1016\/j.jss.2026.112781_bib0020","doi-asserted-by":"crossref","unstructured":"Le, V.-H., Zhang, H., 2023. Log parsing with prompt-based few-shot learning. arXiv: 2302.07435.","DOI":"10.1109\/ICSE48619.2023.00204"},{"key":"10.1016\/j.jss.2026.112781_bib0021","series-title":"2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE)","first-page":"92","article-title":"SwissLog: robust and unified deep learning based log anomaly detection for diverse faults","author":"Li","year":"2020"},{"key":"10.1016\/j.jss.2026.112781_bib0022","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","first-page":"830","article-title":"Did we miss something important? Studying and exploring variable-aware log abstraction","author":"Li","year":"2023"},{"key":"10.1016\/j.jss.2026.112781_bib0023","series-title":"Seventh IEEE International Conference on Data Mining (ICDM 2007)","first-page":"583","article-title":"Failure prediction in ibm bluegene\/l event logs","author":"Liang","year":"2007"},{"key":"10.1016\/j.jss.2026.112781_bib0024","series-title":"2022 IEEE International Conference on Big Data (Big Data)","first-page":"1024","article-title":"A semi-supervised learning approach for abnormal event prediction on large network operation time-series data","author":"Lin","year":"2022"},{"key":"10.1016\/j.jss.2026.112781_bib0025","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., Stoyanov, V., 2019. RoBERTa: a robustly optimized bert pretraining approach. arXiv: 1907.11692."},{"key":"10.1016\/j.jss.2026.112781_bib0026","series-title":"2010 Usenix Annual Technical Conference (USENIX ATC 10)","article-title":"Mining invariants from console logs for system problem detection","author":"Lou","year":"2010"},{"issue":"2","key":"10.1016\/j.jss.2026.112781_bib0027","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1109\/TII.2023.3280246","article-title":"A semisupervised approach for industrial anomaly detection via self-adaptive clustering","volume":"20","author":"Ma","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.jss.2026.112781_bib0028","doi-asserted-by":"crossref","unstructured":"Ma, Z., Chen, A. R., Kim, D. J., Chen, T.-H. P., Wang, S., 2024b. LLMParser: an exploratory study on using large language models for log parsing. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201313.","DOI":"10.1145\/3597503.3639150"},{"key":"10.1016\/j.jss.2026.112781_bib0029","series-title":"2017 IEEE International Conference on Data Mining Workshops (ICDMW)","first-page":"33","article-title":"Accelerated hierarchical density based clustering","author":"McInnes","year":"2017"},{"issue":"11","key":"10.1016\/j.jss.2026.112781_bib0030","doi-asserted-by":"crossref","first-page":"205","DOI":"10.21105\/joss.00205","article-title":"HDBSCAN: hierarchical density based clustering","volume":"2","author":"McInnes","year":"2017","journal-title":"J. Open Source Softw."},{"key":"10.1016\/j.jss.2026.112781_bib0031","series-title":"2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)","first-page":"114","article-title":"Abstracting log lines to log event types for mining software system logs","author":"Nagappan","year":"2010"},{"key":"10.1016\/j.jss.2026.112781_bib0032","series-title":"37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907)","first-page":"575","article-title":"What supercomputers say: a study of five system logs","author":"Oliner","year":"2007"},{"key":"10.1016\/j.jss.2026.112781_bib0033","series-title":"Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training","first-page":"286","article-title":"Scalable teaching of software engineering theory and practice: an experience report","author":"Pirelli","year":"2024"},{"key":"10.1016\/j.jss.2026.112781_bib0034","series-title":"2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys)","first-page":"273","article-title":"LogGPT: exploring chatgpt for log-based anomaly detection","author":"Qi","year":"2023"},{"issue":"6","key":"10.1016\/j.jss.2026.112781_bib0035","doi-asserted-by":"crossref","first-page":"192","DOI":"10.3390\/fi15060192","article-title":"ChatGPT and open-AI models: a preliminary review","volume":"15","author":"Roumeliotis","year":"2023","journal-title":"Future Internet"},{"key":"10.1016\/j.jss.2026.112781_bib0036","unstructured":"Shima, K., 2016. Length matters: clustering system log messages using length of words. arXiv: 1611.03213."},{"issue":"1","key":"10.1016\/j.jss.2026.112781_bib0037","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10515-025-00548-y","article-title":"Improving anomaly detection in software logs through hybrid language modeling and reduced reliance on parser","volume":"33","author":"Sun","year":"2026","journal-title":"Autom. Software Eng."},{"key":"10.1016\/j.jss.2026.112781_bib0038","series-title":"2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC)","first-page":"1382","article-title":"Beyond log parsers: a scalable AI-driven framework for efficient log anomaly detection in software engineering","author":"Sun","year":"2025"},{"key":"10.1016\/j.jss.2026.112781_bib0039","series-title":"2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)","first-page":"1178","article-title":"Unveiling hidden anomalies: leveraging SMAC-LSTM for enhanced software log analysis","author":"Sun","year":"2024"},{"key":"10.1016\/j.jss.2026.112781_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2025.107869","article-title":"SemiSMAC: a semi-supervised framework for log anomaly detection with automated hyperparameter tuning","author":"Sun","year":"2025","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2026.112781_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2025.107743","article-title":"SemiRALD: a semi-supervised hybrid language model for robust anomalous log detection","author":"Sun","year":"2025","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2026.112781_bib0042","series-title":"Proceedings of the 20th ACM International Conference on Information and Knowledge Management","first-page":"785","article-title":"LogSig: generating system events from raw textual logs","author":"Tang","year":"2011"},{"key":"10.1016\/j.jss.2026.112781_bib0043","series-title":"2015 11th International Conference on Network and Service Management (CNSM)","first-page":"1","article-title":"Logcluster-a data clustering and pattern mining algorithm for event logs","author":"Vaarandi","year":"2015"},{"key":"10.1016\/j.jss.2026.112781_bib0044","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-030-05318-5_2","article-title":"Meta-learning","author":"Vanschoren","year":"2019","journal-title":"Autom. Mach. Learn. Methods Syst. Challenges"},{"key":"10.1016\/j.jss.2026.112781_bib0045","series-title":"Generative AI for Effective Software Development","first-page":"71","article-title":"Chatgpt prompt patterns for improving code quality, refactoring, requirements elicitation, and software design","author":"White","year":"2024"},{"issue":"6","key":"10.1016\/j.jss.2026.112781_bib0046","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10664-023-10364-1","article-title":"On the effectiveness of log representation for log-based anomaly detection","volume":"28","author":"Wu","year":"2023","journal-title":"Empirical Software Eng."},{"key":"10.1016\/j.jss.2026.112781_bib0047","series-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering","first-page":"1","article-title":"DivLog: log parsing with prompt enhanced in-context learning","author":"Xu","year":"2024"},{"key":"10.1016\/j.jss.2026.112781_bib0048","series-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles","first-page":"117","article-title":"Detecting large-scale system problems by mining console logs","author":"Xu","year":"2009"},{"key":"10.1016\/j.jss.2026.112781_bib0049","series-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","first-page":"1448","article-title":"Semi-supervised log-based anomaly detection via probabilistic label estimation","author":"Yang","year":"2021"},{"key":"10.1016\/j.jss.2026.112781_bib0050","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.compbiomed.2018.03.016","article-title":"A novel wavelet sequence based on deep bidirectional LSTM network model for ECG signal classification","volume":"96","author":"Yildirim","year":"2018","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/j.jss.2026.112781_bib0051","series-title":"Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering","first-page":"1","article-title":"Deep learning or classical machine learning? an empirical study on log-based anomaly detection","author":"Yu","year":"2024"},{"issue":"2","key":"10.1016\/j.jss.2026.112781_bib0052","article-title":"An unsupervised anomaly detection framework for detecting anomalies in real time through network system\u2019s log files analysis","volume":"1","author":"Zeufack","year":"2021","journal-title":"High-Confid. Comput."},{"key":"10.1016\/j.jss.2026.112781_bib0053","series-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering","first-page":"1","article-title":"MetaLog: generalizable cross-system anomaly detection from logs with meta-learning","author":"Zhang","year":"2024"},{"key":"10.1016\/j.jss.2026.112781_bib0054","series-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","first-page":"807","article-title":"Robust log-based anomaly detection on unstable log data","author":"Zhang","year":"2019"},{"key":"10.1016\/j.jss.2026.112781_bib0055","series-title":"Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering","first-page":"661","article-title":"From few-label to zero-label: an approach for cross-system log-based anomaly detection with meta-learning","author":"Zhao","year":"2025"},{"key":"10.1016\/j.jss.2026.112781_bib0056","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"355","article-title":"Loghub: a large collection of system log datasets for ai-driven log analytics","author":"Zhu","year":"2023"},{"key":"10.1016\/j.jss.2026.112781_bib0057","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)","first-page":"121","article-title":"Tools and benchmarks for automated log parsing","author":"Zhu","year":"2019"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000154?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000154?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T01:42:01Z","timestamp":1773970921000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121226000154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":57,"alternative-id":["S0164121226000154"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2026.112781","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"LogMeta: A few-shot model-agnostic meta-learning framework for robust and adaptive log anomaly detection","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2026.112781","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"112781"}}