{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T20:04:43Z","timestamp":1758398683056,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Foundation of PDL","award":["No. WDZC20205250104"],"award-info":[{"award-number":["No. WDZC20205250104"]}]},{"name":"Foundation of National University of Defense Technology","award":["No. ZK21-17"],"award-info":[{"award-number":["No. ZK21-17"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62172431, No.62002371"],"award-info":[{"award-number":["No.62172431, No.62002371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,16]]},"DOI":"10.1145\/3605801.3605824","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:58:51Z","timestamp":1691621931000},"page":"116-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8071-7314","authenticated-orcid":false,"given":"Xiaoda","family":"Xie","sequence":"first","affiliation":[{"name":"National University of Defence Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1435-0410","authenticated-orcid":false,"given":"Songlei","family":"Jian","sequence":"additional","affiliation":[{"name":"National University of Defence Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6792-1651","authenticated-orcid":false,"given":"Chenlin","family":"Huang","sequence":"additional","affiliation":[{"name":"National University of Defence Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Log Parser. https:\/\/github.com\/logpai\/logparser."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. S-VAE. https:\/\/github.com\/muhanzhang\/D-VAE."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. SVDD. https:\/\/github.com\/lukasruff\/Deep-SVDD."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115560"},{"key":"e_1_3_2_1_5_1","volume-title":"Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349","author":"Bowman R","year":"2015","unstructured":"Samuel\u00a0R Bowman, Luke Vilnis, Oriol Vinyals, Andrew\u00a0M Dai, Rafal Jozefowicz, and Samy Bengio. 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349 (2015)."},{"key":"e_1_3_2_1_6_1","volume-title":"Contemporary software monitoring: A systematic literature review. arXiv e-prints","author":"Candido Jeanderson","year":"2019","unstructured":"Jeanderson Candido, Maur\u00edcio Aniche, and Arie van Deursen. 2019. Contemporary software monitoring: A systematic literature review. arXiv e-prints (2019), arXiv\u20131912."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100568"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"volume-title":"Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining","author":"Fu Qiang","key":"e_1_3_2_1_9_1","unstructured":"Qiang Fu, Jian-Guang Lou, Yi Wang, and Jiang Li. 2009. Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining. IEEE, 149\u2013158."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"e_1_3_2_1_11_1","volume-title":"Anomaly detection in blockchain networks: A comprehensive survey","author":"Hassan Muneeb\u00a0Ul","year":"2022","unstructured":"Muneeb\u00a0Ul Hassan, Mubashir\u00a0Husain Rehmani, and Jinjun Chen. 2022. Anomaly detection in blockchain networks: A comprehensive survey. IEEE Communications Surveys & Tutorials (2022)."},{"volume-title":"An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"He Pinjia","key":"e_1_3_2_1_12_1","unstructured":"Pinjia He, Jieming Zhu, Shilin He, Jian Li, and Michael\u00a0R Lyu. 2016. An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, 654\u2013661."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_15_1","volume-title":"Na\u00efve Bayes and TF-IDF for Sentiment Analysis of the Covid-19 Booster Vaccine. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, 1","author":"Imelda Imelda","year":"2023","unstructured":"Imelda Imelda, Arief\u00a0Ramdhan Kurnianto, 2023. Na\u00efve Bayes and TF-IDF for Sentiment Analysis of the Covid-19 Booster Vaccine. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, 1 (2023), 1\u20136."},{"key":"e_1_3_2_1_16_1","volume-title":"Gated graph sequence neural networks. arXiv preprint arXiv:1511.05493","author":"Li Yujia","year":"2015","unstructured":"Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. 2015. Gated graph sequence neural networks. arXiv preprint arXiv:1511.05493 (2015)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00014"},{"key":"e_1_3_2_1_19_1","unstructured":"Jian-Guang Lou Qiang Fu Shengqi Yang Ye Xu and Jiang Li. 2010. Mining Invariants from Console Logs for System Problem Detection.. In USENIX annual technical conference. 1\u201314."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209707"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00038"},{"key":"e_1_3_2_1_24_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Li Qizheng Hu Weilin and Dai Hao. 2023. Research on automatic classification of Chinese papers based on LDA model and TF-IDF algorithm. (2023).","DOI":"10.21203\/rs.3.rs-2582396\/v1"},{"key":"e_1_3_2_1_27_1","volume-title":"International conference on machine learning. PMLR, 4393\u20134402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib\u00a0Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In International conference on machine learning. PMLR, 4393\u20134402."},{"key":"e_1_3_2_1_28_1","volume-title":"Term-weighting approaches in automatic text retrieval. Information processing & management 24, 5","author":"Salton Gerard","year":"1988","unstructured":"Gerard Salton and Christopher Buckley. 1988. Term-weighting approaches in automatic text retrieval. Information processing & management 24, 5 (1988), 513\u2013523."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00106"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510180"},{"key":"e_1_3_2_1_32_1","volume-title":"D-vae: A variational autoencoder for directed acyclic graphs. Advances in Neural Information Processing Systems 32","author":"Zhang Muhan","year":"2019","unstructured":"Muhan Zhang, Shali Jiang, Zhicheng Cui, Roman Garnett, and Yixin Chen. 2019. D-vae: A variational autoencoder for directed acyclic graphs. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"CNCIT 2023: 2023 2nd International Conference on Networks, Communications and Information Technology","acronym":"CNCIT 2023","location":"Qinghai China"},"container-title":["Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605801.3605824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605801.3605824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:19Z","timestamp":1750178179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605801.3605824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,16]]},"references-count":33,"alternative-id":["10.1145\/3605801.3605824","10.1145\/3605801"],"URL":"https:\/\/doi.org\/10.1145\/3605801.3605824","relation":{},"subject":[],"published":{"date-parts":[[2023,6,16]]},"assertion":[{"value":"2023-08-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}