{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:29:50Z","timestamp":1767338990071,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9533294","type":"proceedings-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T21:27:41Z","timestamp":1632173261000},"page":"1-8","source":"Crossref","is-referenced-by-count":31,"title":["Anomaly Detection using Distributed Log Data: A Lightweight Federated Learning Approach"],"prefix":"10.1109","author":[{"given":"Yalan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yulei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yanchao","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Bingqiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chunjing","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2711039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536397"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"ref16","article-title":"Mining invariants from console logs for system problem detection","author":"lou","year":"0","journal-title":"InATC'10 Proc of the USENIX Annual Technical Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref18","first-page":"102","article-title":"Log Clustering Based Problem Identification for Online Service Systems","author":"lin","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref28","article-title":"Squeezenet: Alexnet-level accuracy with 50x fewer parameters and <1mb model size","volume":"abs 1602 7360","author":"iandola","year":"2016","journal-title":"CoRR"},{"key":"ref4","first-page":"17","author":"zhu","year":"2020","journal-title":"Deep Leakage from Gradients"},{"key":"ref27","article-title":"Pruning filters for efficient convnets","author":"li","year":"0","journal-title":"ICLR 2017 conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66808-6_24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2966615"},{"key":"ref2","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume":"54","author":"mcmahan","year":"0","journal-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/96602.96604"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207508"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.061"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3368926.3369705"},{"key":"ref23","article-title":"A federated learning approach for mobile packet classification","volume":"abs 1907 13113","author":"bakopoulou","year":"2019","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.155"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2018.8483963"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09533294.pdf?arnumber=9533294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:49Z","timestamp":1652197549000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9533294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9533294","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}