{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:05:04Z","timestamp":1745035504281,"version":"3.40.4"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,27]]},"DOI":"10.1109\/icvisp64524.2024.10959704","type":"proceedings-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:37:52Z","timestamp":1744911472000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Mining and Applying Alarm Rules Based on LLM"],"prefix":"10.1109","author":[{"given":"Guoqing","family":"Li","sequence":"first","affiliation":[{"name":"Development Center, China Information Technology Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Haijun","family":"Su","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Mengyuan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Mengqi","family":"Liu","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Haokai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2023.1211739"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5672-8_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CASE56687.2023.10260540"},{"key":"ref4","first-page":"1","article-title":"Application of Network Alarm Association Analysis Processing Based on Artificial Intelligence[J]","volume":"12","author":"Bin","year":"2018","journal-title":"Designing Techniques of Posts and Telecommunications"},{"key":"ref5","first-page":"77","article-title":"Research and Application of Intelligent Alarm Analysis Technology in Bearer Network[J]","volume":"7","author":"Liang","year":"2022","journal-title":"Designing Te) chniques of Posts and Telecommunications"},{"key":"ref6","first-page":"35","article-title":"Research on the Application of Artificial Intelligence in Roots-tracing of Network Alarm[J]","volume":"12","author":"Bingming","year":"2018","journal-title":"Designing Techniques of Posts and Telecommunications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-57489-4_59"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1996.492094"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2005.38"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007652502315"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.77"},{"key":"ref14","article-title":"Operation Data Processing and Analysis of Mobile Communication Network[D]","author":"Qiuqiu","year":"2019","journal-title":"XIDIAN UNIVERSITY"},{"issue":"4","key":"ref15","first-page":"1","article-title":"Efficient alarm analysis approach for communication networks[J]","volume":"46","author":"Xiaogang","year":"2019","journal-title":"JOURNAL OF XIDIAN UNIVERSITY"}],"event":{"name":"2024 IEEE 8th International Conference on Vision, Image and Signal Processing (ICVISP)","start":{"date-parts":[[2024,12,27]]},"location":"Kunming, China","end":{"date-parts":[[2024,12,29]]}},"container-title":["2024 IEEE 8th International Conference on Vision, Image and Signal Processing (ICVISP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10959324\/10959149\/10959704.pdf?arnumber=10959704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T04:51:43Z","timestamp":1744951903000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10959704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,27]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icvisp64524.2024.10959704","relation":{},"subject":[],"published":{"date-parts":[[2024,12,27]]}}}