{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:28Z","timestamp":1750220668176,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1745894"],"award-info":[{"award-number":["CNS-1745894"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412165","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:03Z","timestamp":1603085463000},"page":"2229-2232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["LogBug"],"prefix":"10.1145","author":[{"given":"Jingyu","family":"Sun","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Bingyu","family":"Liu","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Yuan","family":"Hong","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/271337.271347"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367516"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23138"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23202"},{"key":"e_1_3_2_2_8_1","volume-title":"USENIX ATC","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou , Qiang Fu , Shengqi Yang , Ye Xu , and Jiang Li . Mining invariants from console logs for system problem detection . In USENIX ATC , 2010 . Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. Mining invariants from console logs for system problem detection. In USENIX ATC, 2010."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196340"},{"key":"e_1_3_2_2_11_1","volume-title":"ICLR","author":"Miyato Takeru","year":"2017","unstructured":"Takeru Miyato , Andrew M. Dai , and Ian J. Goodfellow . Adversarial training methods for semi-supervised text classification . In ICLR , 2017 . Takeru Miyato, Andrew M. Dai, and Ian J. Goodfellow. Adversarial training methods for semi-supervised text classification. In ICLR, 2017."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.73"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463281"},{"key":"e_1_3_2_2_14_1","volume-title":"ICML","author":"Ramos Juan","year":"2003","unstructured":"Juan Ramos . Using tf-idf to determine word relevance in document queries . In ICML , 2003 . Juan Ramos. Using tf-idf to determine word relevance in document queries. In ICML, 2003."},{"key":"e_1_3_2_2_15_1","volume-title":"Towards crafting text adversarial samples. CoRR, abs\/1707.02812","author":"Samanta Suranjana","year":"2017","unstructured":"Suranjana Samanta and Sameep Mehta . Towards crafting text adversarial samples. CoRR, abs\/1707.02812 , 2017 . Suranjana Samanta and Sameep Mehta. Towards crafting text adversarial samples. CoRR, abs\/1707.02812, 2017."},{"key":"e_1_3_2_2_16_1","volume-title":"Length matters: Clustering system log messages using length of words. CoRR, abs\/1611.03213","author":"Shima Keiichi","year":"2016","unstructured":"Keiichi Shima . Length matters: Clustering system log messages using length of words. CoRR, abs\/1611.03213 , 2016 . Keiichi Shima. Length matters: Clustering system log messages using length of words. CoRR, abs\/1611.03213, 2016."},{"key":"e_1_3_2_2_17_1","volume-title":"CIKM","author":"Tang Liang","year":"2011","unstructured":"Liang Tang , Tao Li , and Chang-Shing Perng . Logsig : generating system events from raw textual logs . In CIKM , 2011 . Liang Tang, Tao Li, and Chang-Shing Perng. Logsig: generating system events from raw textual logs. In CIKM, 2011."},{"key":"e_1_3_2_2_18_1","volume-title":"Google AI Blog","author":"Yang Yinfei","year":"2018","unstructured":"Yinfei Yang and Chris Tar . Google AI Blog , 2018 . Yinfei Yang and Chris Tar. Google AI Blog, 2018."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Ireland","acronym":"CIKM '20"},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:54Z","timestamp":1750197774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412165"}},"subtitle":["Generating Adversarial System Logs in Real Time"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":19,"alternative-id":["10.1145\/3340531.3412165","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412165","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}