{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:19:25Z","timestamp":1774419565649,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10888663","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:52:43Z","timestamp":1741787563000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Chiming","family":"Duan","sequence":"first","affiliation":[{"name":"Peking University,School of Software and Microelectronics,Beijing,China"}]},{"given":"Tong","family":"Jia","sequence":"additional","affiliation":[{"name":"Peking University,Institute for Artificial Intelligence,Beijing,China"}]},{"given":"Yong","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering,Beijing,China"}]},{"given":"Guiyang","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Cloud Computing Company,Hangzhou,China"}]},{"given":"Jinbu","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Cloud Computing Company,Hangzhou,China"}]},{"given":"Huxing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Cloud Computing Company,Hangzhou,China"}]},{"given":"Qi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Alibaba Cloud Computing Company,Hangzhou,China"}]},{"given":"Ying","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University,National Engineering Research Center for Software Engineering,Beijing,China"}]},{"given":"Gang","family":"Huang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Data Space Technology and System,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys60770.2023.00045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3643916.3644408"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/wfpst58552.2024.00034"},{"key":"ref4","author":"Gao","year":"2024","journal-title":"Retrieval-augmented generation for large language models: A survey"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i16.29728"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3472291"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref10","first-page":"71","article-title":"Automatic abnormal log detection by analyzing log history for providing debugging insight","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice, ser. ICSE-SEIP \u201920","author":"Kim"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2980024.2872407"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.64"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2017.52"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00068"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482209"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"ref26","first-page":"938","article-title":"Metalog: Generalizable cross-system anomaly detection from logs with meta-learning","volume-title":"2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE)","author":"Zhang"},{"key":"ref27","first-page":"2523","article-title":"KILT: a benchmark for knowledge intensive language tasks","volume-title":"Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Petroni"},{"key":"ref28","first-page":"874","article-title":"Leveraging passage retrieval with generative models for open domain question answering","volume-title":"Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume","author":"Izacard"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.64"},{"key":"ref31","article-title":"Large language models are zero-shot reasoners","author":"Kojima","year":"2023"},{"key":"ref32","article-title":"Loghub: a large collection of system log datasets towards automated log analytics","author":"He","year":"2020"},{"key":"ref33","article-title":"Qwen technical report","author":"Bai","year":"2023"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10888663.pdf?arnumber=10888663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:23:33Z","timestamp":1774416213000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10888663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10888663","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}