{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:21:23Z","timestamp":1773840083048,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research & Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1800705"],"award-info":[{"award-number":["2018YFB1800705"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672494"],"award-info":[{"award-number":["61672494"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/tnsm.2022.3224974","type":"journal-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:21:42Z","timestamp":1669854102000},"page":"2529-2543","source":"Crossref","is-referenced-by-count":17,"title":["AllInfoLog: Robust Diverse Anomalies Detection Based on All Log Features"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9937-5774","authenticated-orcid":false,"given":"Ruizhi","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7348-5649","authenticated-orcid":false,"given":"Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8795-0847","authenticated-orcid":false,"given":"Jintian","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"given":"Weilong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2087-2853","authenticated-orcid":false,"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00205"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2068"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref58","article-title":"Automatic differentiation in PyTorch","author":"paszke","year":"2017","journal-title":"Proc 31st Conf Neural Inf Process Syst Workshop"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref52","year":"2022","journal-title":"Log4j&#x2014;Apache Log4j 2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9429-5"},{"key":"ref55","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2017","journal-title":"arXiv 1412 6980"},{"key":"ref10","author":"lyu","year":"1996","journal-title":"Handbook of Software Reliability Engineering"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/0364-0213(90)90002-E"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3034647"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"ref19","first-page":"24","article-title":"Mining invariants from console logs for system problem detection","author":"lou","year":"2010","journal-title":"Proc USENIX Conf USENIX Annu Tech Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.03.012"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5573-2"},{"key":"ref45","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2019","journal-title":"arXiv 1810 04805"},{"key":"ref48","year":"2021","journal-title":"Roberta-base hugging face"},{"key":"ref47","first-page":"24","author":"radford","year":"2019","journal-title":"Language Models are Unsupervised Multitask Learners"},{"key":"ref42","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"mikolov","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2966615"},{"key":"ref49","author":"xiao","year":"2018","journal-title":"bert-as-service"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624141"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486257"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2539945"},{"key":"ref3","first-page":"130:1","article-title":"A survey on automated log analysis for reliability engineering","volume":"54","author":"he","year":"2021","journal-title":"ACM Comput Surveys"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3179405"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2930040"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2875442"},{"key":"ref35","year":"2021","journal-title":"OpenStack Mitaka"},{"key":"ref34","first-page":"603","article-title":"Non-intrusive performance profiling for entire software stacks based on the flow reconstruction principle","author":"zhao","year":"2016","journal-title":"Proc 12th USENIX Symp Oper Syst Design Implement"},{"key":"ref37","first-page":"102","article-title":"Log Clustering Based Problem Identification for Online Service Systems","author":"lin","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"key":"ref36","year":"2021","journal-title":"Openstack victoria"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541968"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3208040.3208051"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106276"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238193"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00106"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref25","article-title":"RoBERTa: A robustly optimized BERT pretraining approach","author":"liu","year":"2019","journal-title":"arXiv 1907 11692"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381796"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209707"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref27","article-title":"Bidirectional LSTM-CRF models for sequence tagging","author":"huang","year":"2015","journal-title":"arXiv 1508 01991"},{"key":"ref29","article-title":"Loghub: A large collection of system log datasets towards automated log analytics","author":"he","year":"2020","journal-title":"arXiv 2008 06448"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.14"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10274602\/09966923.pdf?arnumber=9966923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T19:08:15Z","timestamp":1698692895000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9966923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":62,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3224974","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}