{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:44Z","timestamp":1775815484000,"version":"3.50.1"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcs.2025.3607975","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:35:08Z","timestamp":1757439308000},"page":"1463-1474","source":"Crossref","is-referenced-by-count":6,"title":["Cross-Modal Attention Networks for Multi-Modal Anomaly Detection in System Software"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5213-4371","authenticated-orcid":false,"given":"Suchuan","family":"Xing","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1781-5233","authenticated-orcid":false,"given":"Yihan","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2023.100470"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892726"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103498"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-021-01644-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107751"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1213\/4\/042050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-73462-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s24020637"},{"key":"ref11","first-page":"24","article-title":"Mining invariants from console logs for system problem detection","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Lou","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref14","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2145642"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/e24010069"},{"key":"ref17","article-title":"LogLLM: Log-based anomaly detection using large language models","author":"Guan","year":"2024"},{"key":"ref18","first-page":"3","article-title":"STL: A seasonal-trend decomposition procedure based on loess","volume":"6","author":"RB","year":"1990","journal-title":"J. Off. Stat."},{"key":"ref19","article-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection","author":"Malhotra","year":"2016"},{"key":"ref20","article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","author":"Bai","year":"2018"},{"key":"ref21","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3034647"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476188"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00093"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782664\/10834807\/11153984.pdf?arnumber=11153984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:21:02Z","timestamp":1759238462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11153984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2025.3607975","relation":{},"ISSN":["2644-1268"],"issn-type":[{"value":"2644-1268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}