{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T03:12:30Z","timestamp":1772680350458,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1800405"],"award-info":[{"award-number":["2018YFB1800405"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFE0105500"],"award-info":[{"award-number":["2019YFE0105500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902200"],"award-info":[{"award-number":["61902200"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772307"],"award-info":[{"award-number":["61772307"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072264"],"award-info":[{"award-number":["62072264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"Beijing National Research Center for Information Science and Technology (BNRist), The China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M651015"],"award-info":[{"award-number":["2019M651015"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2021.3055425","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:01:46Z","timestamp":1611867706000},"page":"1870-1884","source":"Crossref","is-referenced-by-count":50,"title":["LogClass: Anomalous Log Identification and Classification With Partial Labels"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9384-9016","authenticated-orcid":false,"given":"Weibin","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4919-1130","authenticated-orcid":false,"given":"Ying","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0330-0028","authenticated-orcid":false,"given":"Shenglin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Zaiter","sequence":"additional","affiliation":[]},{"given":"Yuzhe","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6729-925X","authenticated-orcid":false,"given":"Yuzhi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Song","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5113-838X","authenticated-orcid":false,"given":"Dan","family":"Pei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7641-3_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348511"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367332"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.66"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815679"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401920"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1541-0420.2008.01116.x"},{"key":"ref34","first-page":"1","article-title":"A semantic-aware representation framework for online log analysis","author":"weibin","year":"2020","journal-title":"Proc 29th Int Conf Comput Commun Netw (ICCCN)"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007554"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209681"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123304"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556662"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33016505"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9595-8"},{"key":"ref29","first-page":"2998","article-title":"Semi-supervised classification based on classification from positive and unlabeled data","author":"sakai","year":"2017","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624141"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737430"},{"key":"ref1","first-page":"1063","article-title":"Cross-dataset time series anomaly detection for cloud systems","author":"zhang","year":"2019","journal-title":"Proc USENIX Annu Tech Conf (USENIXATC)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9518-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-020-05877-5"},{"key":"ref23","first-page":"231","article-title":"Mining invariants from console logs for system problem detection","author":"lou","year":"2010","journal-title":"Proc USENIX ATC"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05836-9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.021"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4108\/eai.19-8-2019.163134"},{"key":"ref51","first-page":"2479","article-title":"ZeroWall: Detecting zero-day Web attacks through encoder&#x2013;decoder recurrent neural networks","author":"tang","year":"2020","journal-title":"Proc INFOCOM"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972691"},{"key":"ref58","first-page":"1","article-title":"Syslog processing for switch failure diagnosis and prediction in datacenter networks","author":"zhang","year":"2017","journal-title":"Proc IEEE\/ACM 25th Int Symp Qual Service (IWQoS)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00105"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227031"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.5204\/thesis.eprints.132077","article-title":"Rare sequential pattern mining of critical infrastructure control logs for anomaly detection","author":"rahman","year":"2019"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/PMAPS.2018.8440525"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219643"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref40","author":"murphy","year":"2006","journal-title":"Naive Bayes Classifier"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486257"},{"key":"ref13","first-page":"102","article-title":"Log Clustering Based Problem Identification for Online Service Systems","author":"lin","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3132011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2539945"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1361684.1361686"},{"key":"ref17","first-page":"1130","article-title":"Beyond TFIDF weighting for text categorization in the vector space model","author":"soucy","year":"2005","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref18","first-page":"1","article-title":"An unsupervised framework for detecting anomalous messages from syslog log files","author":"vaarandi","year":"2011","journal-title":"Proc IEEE\/IFIP Netw Oper Manag Symp (NOMS)"},{"key":"ref19","first-page":"1199","article-title":"Theoretical comparisons of positive-unlabeled learning against positive-negative learning","author":"niu","year":"2016","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737429"},{"key":"ref6","author":"meng","year":"2020","journal-title":"Summarizing unstructured logs in online services"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref49","author":"deyoung","year":"2017","journal-title":"Network Security Data Analytics Architecture for Logged Events"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACVMOT.2005.107"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3115\/1699510.1699543"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953981"},{"key":"ref47","first-page":"4","article-title":"Mining console logs for large-scale system problem detection","volume":"8","author":"xu","year":"2008","journal-title":"Proc SysML"},{"key":"ref42","first-page":"361","article-title":"RCV1: A new benchmark collection for text categorization research","volume":"5","author":"lewis","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref41","author":"wright","year":"1995","journal-title":"Logistic Regression"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09339940.pdf?arnumber=9339940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:41Z","timestamp":1652194361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9339940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":67,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3055425","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}