{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T17:54:34Z","timestamp":1776362074972,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338931","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"807-817","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":582,"title":["Robust log-based anomaly detection on unstable log data"],"prefix":"10.1145","author":[{"given":"Xu","family":"Zhang","sequence":"first","affiliation":[{"name":"Microsoft Research, China \/ Nanjing University, China"}]},{"given":"Yong","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Bo","family":"Qiao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Chunyu","family":"Xie","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Xinsheng","family":"Yang","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Qian","family":"Cheng","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Ze","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Xiaoting","family":"He","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Randolph","family":"Yao","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Jian-Guang","family":"Lou","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Murali","family":"Chintalapati","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Furao","family":"Shen","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.43"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755926"},{"key":"e_1_3_2_1_3_1","volume-title":"Information Science and Applications","author":"Breier Jakub","unstructured":"Jakub Breier and Jana Brani\u0161ov\u00e1 . 2015. Anomaly detection from log files using data mining techniques . In Information Science and Applications . Springer , 449\u2013 457. Jakub Breier and Jana Brani\u0161ov\u00e1. 2015. Anomaly detection from log files using data mining techniques. In Information Science and Applications. Springer, 449\u2013 457."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3128-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217871.3217872"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.27"},{"key":"e_1_3_2_1_7_1","volume-title":"Failure diagnosis using decision trees. In null","author":"Chen Mike","unstructured":"Mike Chen , Alice X Zheng , Jim Lloyd , Michael I Jordan , and Eric Brewer . 2004. Failure diagnosis using decision trees. In null . IEEE , 36\u201343. Mike Chen, Alice X Zheng, Jim Lloyd, Michael I Jordan, and Eric Brewer. 2004. Failure diagnosis using decision trees. In null. IEEE, 36\u201343."},{"key":"e_1_3_2_1_8_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io.  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.47"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381796"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9603-z"},{"key":"e_1_3_2_1_16_1","unstructured":"Pinjia He Zhuangbin Chen Shilin He and Michael R Lyu. 2018. Characterizing the Natural Language Descriptions in Software Logging Statements. (2018).  Pinjia He Zhuangbin Chen Shilin He and Michael R Lyu. 2018. Characterizing the Natural Language Descriptions in Software Logging Statements. (2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"An Evaluation Study on Log Parsing and Its Use in Log Mining. In 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 654\u2013661","author":"He P.","unstructured":"P. He , J. Zhu , S. He , J. Li , and M. R. Lyu . 2016 . An Evaluation Study on Log Parsing and Its Use in Log Mining. In 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 654\u2013661 . P. He, J. Zhu, S. He, J. Li, and M. R. Lyu. 2016. An Evaluation Study on Log Parsing and Its Use in Log Mining. In 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 654\u2013661."},{"key":"e_1_3_2_1_18_1","volume-title":"Towards Automated Log Parsing for Large-Scale Log Data Analysis","author":"He Pinjia","year":"2017","unstructured":"Pinjia He , Jieming Zhu , Shilin He , Jian Li , and Michael R Lyu . 2017. Towards Automated Log Parsing for Large-Scale Log Data Analysis . IEEE Transactions on Dependable and Secure Computing ( 2017 ). Pinjia He, Jieming Zhu, Shilin He, Jian Li, and Michael R Lyu. 2017. Towards Automated Log Parsing for Large-Scale Log Data Analysis. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_1_21_1","volume-title":"Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang , Wei Xu , and Kai Yu. 2015. Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991 ( 2015 ). Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF models for sequence tagging. arXiv preprint arXiv:1508.01991 (2015)."},{"key":"e_1_3_2_1_22_1","unstructured":"Jez Humble and David Farley. 2010. Continuous delivery: reliable software releases through build test and deployment automation. Pearson Education.   Jez Humble and David Farley. 2010. Continuous delivery: reliable software releases through build test and deployment automation. Pearson Education."},{"key":"e_1_3_2_1_23_1","volume-title":"Compressing text classification models. arXiv preprint arXiv:1612.03651","author":"Joulin Armand","year":"2016","unstructured":"Armand Joulin , Edouard Grave , Piotr Bojanowski , Matthijs Douze , H\u00e9rve J\u00e9gou , and Tomas Mikolov . 2016. FastText.zip : Compressing text classification models. arXiv preprint arXiv:1612.03651 ( 2016 ). Armand Joulin, Edouard Grave, Piotr Bojanowski, Matthijs Douze, H\u00e9rve J\u00e9gou, and Tomas Mikolov. 2016. FastText.zip: Compressing text classification models. arXiv preprint arXiv:1612.03651 (2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9518-0"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729392"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_1_27_1","volume-title":"Deep learning. Nature 521, 7553","author":"Lecun Yann","year":"2015","unstructured":"Yann Lecun , Yoshua Bengio , and Geoffrey E Hinton . 2015. Deep learning. Nature 521, 7553 ( 2015 ), 436\u2013444. Yann Lecun, Yoshua Bengio, and Geoffrey E Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436\u2013444."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098022"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Annual Technical Conference. 23\u201325","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou , Qiang Fu , Shengqi Yang , Ye Xu , and Jiang Li . 2010 . Mining Invariants from Console Logs for System Problem Detection .. In USENIX Annual Technical Conference. 23\u201325 . Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. 2010. Mining Invariants from Console Logs for System Problem Detection.. In USENIX Annual Technical Conference. 23\u201325."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.138"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.48"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228334"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.14"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_3_2_1_37_1","volume-title":"Artificial neural networks","author":"Schalkoff Robert J","unstructured":"Robert J Schalkoff . 1997. Artificial neural networks . Vol. 1 . McGraw-Hill New York . Robert J Schalkoff. 1997. Artificial neural networks. Vol. 1. McGraw-Hill New York."},{"key":"e_1_3_2_1_38_1","first-page":"6","article-title":"SALSA: Analyzing Logs as StAte Machines","volume":"8","author":"Tan Jiaqi","year":"2008","unstructured":"Jiaqi Tan , Xinghao Pan , Soila Kavulya , Rajeev Gandhi , and Priya Narasimhan . 2008 . SALSA: Analyzing Logs as StAte Machines . WASL 8 (2008), 6 \u2013 6 . Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gandhi, and Priya Narasimhan. 2008. SALSA: Analyzing Logs as StAte Machines. WASL 8 (2008), 6\u20136.","journal-title":"WASL"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"e_1_3_2_1_40_1","volume-title":"3rd IEEE Workshop on. IEEE, 119\u2013126","author":"Vaarandi Risto","year":"2003","unstructured":"Risto Vaarandi . 2003 . A data clustering algorithm for mining patterns from event logs. In IP Operations &amp; Management, 2003.(IPOM 2003) . 3rd IEEE Workshop on. IEEE, 119\u2013126 . Risto Vaarandi. 2003. A data clustering algorithm for mining patterns from event logs. In IP Operations &amp; Management, 2003.(IPOM 2003). 3rd IEEE Workshop on. IEEE, 119\u2013126."},{"key":"e_1_3_2_1_41_1","volume-title":"Communications and Informatics (ICACCI), 2017 International Conference on. IEEE, 236\u2013242","author":"Vinayakumar R","year":"2017","unstructured":"R Vinayakumar , KP Soman , and Prabaharan Poornachandran . 2017 . Long shortterm memory based operation log anomaly detection. In Advances in Computing , Communications and Informatics (ICACCI), 2017 International Conference on. IEEE, 236\u2013242 . R Vinayakumar, KP Soman, and Prabaharan Poornachandran. 2017. Long shortterm memory based operation log anomaly detection. In Advances in Computing, Communications and Informatics (ICACCI), 2017 International Conference on. IEEE, 236\u2013242."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337236"},{"key":"e_1_3_2_1_46_1","volume-title":"Guofei Jiang, Konstantinos Pelechrinis, and Hui Zhang.","author":"Zhang Ke","year":"2016","unstructured":"Ke Zhang , Jianwu Xu , Martin Renqiang Min , Guofei Jiang, Konstantinos Pelechrinis, and Hui Zhang. 2016 . Automated IT system failure prediction: A deep learning approach.. In BigData . 1291\u20131300. Ke Zhang, Jianwu Xu, Martin Renqiang Min, Guofei Jiang, Konstantinos Pelechrinis, and Hui Zhang. 2016. Automated IT system failure prediction: A deep learning approach.. In BigData. 1291\u20131300."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818807"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:20Z","timestamp":1750206380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":47,"alternative-id":["10.1145\/3338906.3338931","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338931","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}