{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:20:46Z","timestamp":1771024846033,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639186","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1707-8149","authenticated-orcid":false,"given":"Dinghua","family":"Wang","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Sydney, New South Wales, Australia"},{"name":"Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6323-1402","authenticated-orcid":false,"given":"Shuqing","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9419-4058","authenticated-orcid":false,"given":"Guanping","family":"Xiao","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8147-8126","authenticated-orcid":false,"given":"Yepang","family":"Liu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9510-6574","authenticated-orcid":false,"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[{"name":"UNSW, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3377-8129","authenticated-orcid":false,"given":"Pinjia","family":"He","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong(Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3666-5798","authenticated-orcid":false,"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0596-4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71011-2_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71011-2_8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1609942.1609946"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22166286"},{"key":"e_1_3_2_1_6_1","unstructured":"James Allan Jaime G Carbonell George Doddington Jonathan Yamron and Yiming Yang. 1998. Topic detection and tracking pilot study final report. (1998)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1960.10489888"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","year":"2023","unstructured":"Ardupilot. 2023. Ardupilot Doc. Retrieved March 25, 2023 from https:\/\/ardupilot.org\/ardupilot\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","year":"2023","unstructured":"Ardupilot. 2023. Ardupilot Log. Retrieved March 25, 2023 from https:\/\/ardupilot.org\/copter\/docs\/common-logs.html"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","year":"2023","unstructured":"Ardupilot. 2023. UAV Log Viewer. Retrieved March 25, 2023 from https:\/\/plot.ardupilot.org\/#\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Cyber-physical systems. The impact of control technology 12, 1","author":"Baheti Radhakisan","year":"2011","unstructured":"Radhakisan Baheti and Helen Gill. 2011. Cyber-physical systems. The impact of control technology 12, 1 (2011), 161--166."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2006.252287"},{"key":"e_1_3_2_1_13_1","first-page":"119","article-title":"Outlier .......... s","volume":"25","author":"Beckman Richard J","year":"1983","unstructured":"Richard J Beckman and R Dennis Cook. 1983. Outlier .......... s. Technometrics 25, 2 (1983), 119--149.","journal-title":"Technometrics"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2009\/v2i4.4"},{"key":"e_1_3_2_1_15_1","unstructured":"Richard J Bolton David J Hand et al. 2001. Unsupervised profiling methods for fraud detection. Credit scoring and credit control VII (2001) 235--255."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEREC.2015.7337041"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1998.10473711"},{"key":"e_1_3_2_1_18_1","volume-title":"Detection and classification of intrusions and faults using sequences of system calls. Acm sigmod record 30, 4","author":"Cabrera Joao BD","year":"2001","unstructured":"Joao BD Cabrera, Lundy Lewis, and Raman K Mehra. 2001. Detection and classification of intrusions and faults using sequences of system calls. Acm sigmod record 30, 4 (2001), 25--34."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.151"},{"key":"e_1_3_2_1_21_1","volume-title":"Urjoshi Sinha, Lilly Spirkovska, Yihong Ma, Sulil Purandare, and Muhammed Tawfiq Chowdhury.","author":"Cleland-Huang Jane","year":"2022","unstructured":"Jane Cleland-Huang, Nitesh Chawla, Myra Cohen, Md Nafee Al Islam, Urjoshi Sinha, Lilly Spirkovska, Yihong Ma, Sulil Purandare, and Muhammed Tawfiq Chowdhury. 2022. Towards Real-Time Safety Analysis of Small Unmanned Aerial Systems in the National Airspace. In AIAA AVIATION 2022 Forum. 3540."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564821"},{"key":"e_1_3_2_1_24_1","volume-title":"Introduction to UAV systems","author":"Fahlstrom Paul G","unstructured":"Paul G Fahlstrom, Thomas J Gleason, and Mohammad H Sadraey. 2022. Introduction to UAV systems. John Wiley & Sons."},{"key":"e_1_3_2_1_25_1","unstructured":"Maria Lucia Ferramosca. 2021. Safety Assessment of UAV Systems: Field Data Analysis. Ph. D. Dissertation. Politecnico di Torino."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TePRA.2012.6215657"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01356-4"},{"key":"e_1_3_2_1_28_1","volume-title":"Statistical methods for groundwater monitoring","author":"Gibbons Robert D","unstructured":"Robert D Gibbons, Dulal K Bhaumik, and Subhash Aryal. 2009. Statistical methods for groundwater monitoring. John Wiley & Sons."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"e_1_3_2_1_30_1","volume-title":"Survey of important issues in UAV communication networks","author":"Gupta Lav","year":"2015","unstructured":"Lav Gupta, Raj Jain, and Gabor Vaszkun. 2015. Survey of important issues in UAV communication networks. IEEE communications surveys & tutorials 18, 2 (2015), 1123--1152."},{"key":"e_1_3_2_1_31_1","volume-title":"Identification of outliers","author":"Hawkins Douglas M","unstructured":"Douglas M Hawkins. 1980. Identification of outliers. Vol. 11. Springer."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00029"},{"key":"e_1_3_2_1_33_1","volume-title":"A survey of outlier detection methodologies. Artificial intelligence review 22, 2","author":"Hodge Victoria","year":"2004","unstructured":"Victoria Hodge and Jim Austin. 2004. A survey of outlier detection methodologies. Artificial intelligence review 22, 2 (2004), 85--126."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2016.7838739"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.02.005"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12571-8_16"},{"key":"e_1_3_2_1_37_1","volume-title":"Fifth international workshop on intelligent data analysis in medicine and pharmacology","volume":"1","author":"Laurikkala Jorma","year":"2000","unstructured":"Jorma Laurikkala, Martti Juhola, Erna Kentala, N Lavrac, S Miksch, and B Kavsek. 2000. Informal identification of outliers in medical data. In Fifth international workshop on intelligent data analysis in medicine and pharmacology, Vol. 1. 20--24."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_40_1","volume-title":"Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice 16, 4","author":"Lewis Sarah","year":"2015","unstructured":"Sarah Lewis. 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice 16, 4 (2015), 473--475."},{"key":"e_1_3_2_1_41_1","volume-title":"Anomaly detection in airline routine operations using flight data recorder data. Ph. D. Dissertation","author":"Lishuai Li.","unstructured":"Lishuai Li. 2013. Anomaly detection in airline routine operations using flight data recorder data. Ph. D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_42_1","volume-title":"Anomaly detection in airline routine operations using flight data recorder data. Ph. D. Dissertation","author":"Lishuai Li.","unstructured":"Lishuai Li. 2013. Anomaly detection in airline routine operations using flight data recorder data. Ph. D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00025"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27535-8_19"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2023.3252810"},{"key":"e_1_3_2_1_46_1","volume-title":"Novelty detection: a review---part 2:: neural network based approaches. Signal processing 83, 12","author":"Markou Markos","year":"2003","unstructured":"Markos Markou and Sameer Singh. 2003. Novelty detection: a review---part 2:: neural network based approaches. Signal processing 83, 12 (2003), 2499--2521."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884797"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7140074"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Julio Alberto Mendoza-Mendoza Victor Javier Gonzalez-Villela Gabriel Sepulveda-Cervantes Mauricio Mendez-Martinez Humberto Sossa-Azuela Julio Alberto Mendoza-Mendoza Victor Gonzalez-Villela Gabriel Sepulveda-Cervantes Mauricio Mendez-Martinez and Humberto Sossa-Azuela. 2020. ArduPilot Working Environment. Advanced Robotic Vehicles Programming: An Ardupilot and Pixhawk Approach (2020) 19--46.","DOI":"10.1007\/978-1-4842-5531-5_2"},{"key":"e_1_3_2_1_50_1","volume-title":"UAV-CPSs as a test bed for new technologies and a primer to Industry 5.0. Imaging and sensing for unmanned aircraft systems 2","author":"Monteiro Ana Carolina B","year":"2020","unstructured":"Ana Carolina B Monteiro, Reinaldo P Franca, Vania V Estrela, Sandro R Fernandes, Abdeldjalil Khelassi, R Jenice Aroma, Kumudha Raimond, Yuzo Iano, and Ali Arshaghi. 2020. UAV-CPSs as a test bed for new technologies and a primer to Industry 5.0. Imaging and sensing for unmanned aircraft systems 2 (2020), 1."},{"key":"e_1_3_2_1_51_1","first-page":"49","article-title":"Feature-based classification of time-series data","volume":"10","author":"Nanopoulos Alex","year":"2001","unstructured":"Alex Nanopoulos, Rob Alcock, and Yannis Manolopoulos. 2001. Feature-based classification of time-series data. International Journal of Computer Research 10, 3 (2001), 49--61.","journal-title":"International Journal of Computer Research"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 20th VLDB Conference","author":"Ng Raymond T","year":"1994","unstructured":"Raymond T Ng and Jiawei Han. 1994. Efficient and Effective Clustering Data Mining Methods for Spatial. In Proceedings of the 20th VLDB Conference, Santiago, Chile. 12--15."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.18-5-2020.164586"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95930-6_9"},{"key":"e_1_3_2_1_55_1","first-page":"149","article-title":"Mathematical modeling and vertical flight control of a tilt-wing UAV","volume":"20","author":"\u00d6ner Kaan Taha","year":"2012","unstructured":"Kaan Taha \u00d6ner, Ertu\u011frul \u00c7etinsoy, EFE Sirimo\u011flu, Cevdet Han\u00e7er, Mustafa \u00dcnel, Mahmut Faruk Ak\u015fit, Kayhan G\u00fclez, and Ilyas Kandemir. 2012. Mathematical modeling and vertical flight control of a tilt-wing UAV. Turkish Journal of Electrical Engineering and Computer Sciences 20, 1 (2012), 149--157.","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"key":"e_1_3_2_1_56_1","volume-title":"An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks 51, 12","author":"Patcha Animesh","year":"2007","unstructured":"Animesh Patcha and Jung-Min Park. 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks 51, 12 (2007), 3448--3470."},{"key":"e_1_3_2_1_57_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Flight Log. Retrieved March 25, 2023 from https:\/\/docs.px4.io\/main\/en\/log\/flight_log_analysis"},{"key":"e_1_3_2_1_58_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Flight Review Tool. Retrieved March 25, 2023 from https:\/\/review.px4.io"},{"key":"e_1_3_2_1_59_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/12071"},{"key":"e_1_3_2_1_60_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/11420"},{"key":"e_1_3_2_1_61_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/9150"},{"key":"e_1_3_2_1_62_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/15810"},{"key":"e_1_3_2_1_63_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/12146"},{"key":"e_1_3_2_1_64_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/6772"},{"key":"e_1_3_2_1_65_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/12517"},{"key":"e_1_3_2_1_66_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/18595"},{"key":"e_1_3_2_1_67_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/7737"},{"key":"e_1_3_2_1_68_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/12910"},{"key":"e_1_3_2_1_69_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/15037"},{"key":"e_1_3_2_1_70_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/7202"},{"key":"e_1_3_2_1_71_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/10757"},{"key":"e_1_3_2_1_72_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/14735"},{"key":"e_1_3_2_1_73_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/5110"},{"key":"e_1_3_2_1_74_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. Issue Report. Retrieved March 25, 2023 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/13956"},{"key":"e_1_3_2_1_75_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. User Guide. Retrieved March 25, 2023 from https:\/\/docs.px4.io\/main\/en\/"},{"key":"e_1_3_2_1_76_1","volume-title":"Retrieved","year":"2023","unstructured":"PX4. 2023. User Guide-ROS. Retrieved March 25, 2023 from https:\/\/docs.px4.io\/main\/en\/ros\/"},{"key":"e_1_3_2_1_77_1","first-page":"119","article-title":"High-precision positioning and real-time data processing of UAV-systems. The International Archives of the Photogrammetry","volume":"38","author":"Rieke Matthes","year":"2012","unstructured":"Matthes Rieke, Theodor Foerster, Jakob Geipel, and Torsten Prinz. 2012. High-precision positioning and real-time data processing of UAV-systems. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences 38 (2012), 119--124.","journal-title":"Remote Sensing and Spatial Information Sciences"},{"key":"e_1_3_2_1_78_1","unstructured":"Peter J Rousseeuw and Annick M Leroy. 2005. Robust regression and outlier detection. John wiley & sons."},{"key":"e_1_3_2_1_79_1","volume-title":"SAFECOMP 2020, Lisbon, Portugal, September 16--18, 2020, Proceedings 39","author":"Schmidt Tabea","year":"2020","unstructured":"Tabea Schmidt, Florian Hauer, and Alexander Pretschner. 2020. Automated Anomaly Detection in CPS Log Files: A Time Series Clustering Approach. In Computer Safety, Reliability, and Security: 39th International Conference, SAFECOMP 2020, Lisbon, Portugal, September 16--18, 2020, Proceedings 39. Springer, 179--194."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC57359.2022.00024"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS58141.2023.10131749"},{"key":"e_1_3_2_1_83_1","volume-title":"Anomaly Detection on Drone Forensic Timeline with Sigma Rules. In 2023 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 1--5.","author":"Studiawan Hudan","year":"2023","unstructured":"Hudan Studiawan, Ahmad Firdaus, Baskoro A Pratomo, and Tohari Ahmad. 2023. Anomaly Detection on Drone Forensic Timeline with Sigma Rules. In 2023 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 1--5."},{"key":"e_1_3_2_1_84_1","volume-title":"Time-series classification methods: Review and applications to power systems data. Big data application in power systems","author":"Susto Gian Antonio","year":"2018","unstructured":"Gian Antonio Susto, Angelo Cenedese, and Matteo Terzi. 2018. Time-series classification methods: Review and applications to power systems data. Big data application in power systems (2018), 179--220."},{"key":"e_1_3_2_1_85_1","volume-title":"Support vector domain description. Pattern recognition letters 20, 11--13","author":"Tax David MJ","year":"1999","unstructured":"David MJ Tax and Robert PW Duin. 1999. Support vector domain description. Pattern recognition letters 20, 11--13 (1999), 1191--1199."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS51884.2021.9476844"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2009.932529"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs70201736"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2018.00022"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468559"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962207"},{"key":"e_1_3_2_1_92_1","volume-title":"An overview of dynamic parameter identification of robots. Robotics and computer-integrated manufacturing 26, 5","author":"Wu Jun","year":"2010","unstructured":"Jun Wu, Jinsong Wang, and Zheng You. 2010. An overview of dynamic parameter identification of robots. Robotics and computer-integrated manufacturing 26, 5 (2010), 414--419."},{"key":"e_1_3_2_1_93_1","volume-title":"Proceeding of the 11th World Congress on Intelligent Control and Automation. IEEE, 2376--2381","author":"Yang Liang","year":"2014","unstructured":"Liang Yang, Juntong Qi, Jizhong Xiao, and Xia Yong. 2014. A literature review of UAV 3D path planning. In Proceeding of the 11th World Congress on Intelligent Control and Automation. IEEE, 2376--2381."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111425"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1677"},{"key":"e_1_3_2_1_96_1","volume-title":"Chung Shue Chen, and Fabio Pianese","author":"Zhang Tianzhu","year":"2023","unstructured":"Tianzhu Zhang, Han Qiu, Gabriele Castellano, Myriana Rifai, Chung Shue Chen, and Fabio Pianese. 2023. System Log Parsing: A Survey. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01832-3"},{"key":"e_1_3_2_1_98_1","volume-title":"Retrieved","year":"2023","unstructured":"zhihu. 2023. news. Retrieved March 25, 2023 from https:\/\/zhuanlan.zhihu.com\/p\/423739596"}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:12Z","timestamp":1750286952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":98,"alternative-id":["10.1145\/3597503.3639186","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639186","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}