{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:57:41Z","timestamp":1771613861473,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,17]]},"DOI":"10.1109\/ic-nidc54101.2021.9660476","type":"proceedings-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T20:36:16Z","timestamp":1641328576000},"page":"403-407","source":"Crossref","is-referenced-by-count":9,"title":["Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network"],"prefix":"10.1109","author":[{"given":"Dongqing","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xiaowei","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Ce","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiujian","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref11","first-page":"94","article-title":"Log analytics for dependable enterprise telephony","author":"chen","year":"0","journal-title":"Proc of the 9th European Dependable Computing Conf IEEE"},{"key":"ref12","article-title":"Behavioral anomaly detection approach based on log monitoring","author":"du","year":"0","journal-title":"Proc of the Int'l Conf on Behavioral Economic and Socio-cultural Computing IEEE"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958206"},{"key":"ref14","first-page":"595","article-title":"Problem determination in large, dynamic Internet services","author":"davidsen","year":"0","journal-title":"Proc of the Int'l Conf on Dependable Systems and Networks IEEE"},{"key":"ref15","article-title":"FasfPext.zip: Compressing text classification models","author":"joulin","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624054"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3217871.3217872"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"ref19","article-title":"Sub-sequence feature vector-based massive system log anomaly detection in cloud computing systems","author":"rao","year":"0","journal-title":"Proc of the National Conf of Information Storage"},{"key":"ref4","first-page":"1","article-title":"Mining Invariants from Console Logs for System Problem Detection","author":"lou","year":"2010","journal-title":"USENFX Annual Technical Conference"},{"key":"ref3","first-page":"588","article-title":"Mining console logs for large-scale system problem detection","author":"xu","year":"0","journal-title":"Proc of the 9th Int'l Conf on Data Mining Miami IEEE"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2980024.2872407"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref2","article-title":"Largescale system problem detection by mining console log","author":"xu","year":"0","journal-title":"Proceedings of SOSP'09"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref9","article-title":"Bidirectional LSTM-CRF models for sequence tagging","author":"huang","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"ref22","article-title":"Adam: a method for stochastic optimization","author":"kingma","year":"0","journal-title":"Computer Science"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00519"}],"event":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","location":"Beijing, China","start":{"date-parts":[[2021,11,17]]},"end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660393\/9660398\/09660476.pdf?arnumber=9660476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:38Z","timestamp":1652201798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,17]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ic-nidc54101.2021.9660476","relation":{},"subject":[],"published":{"date-parts":[[2021,11,17]]}}}