{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:36:34Z","timestamp":1776886594489,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of China","award":["62162003,62102340"],"award-info":[{"award-number":["62162003,62102340"]}]},{"name":"Nanning Science and Technology project","award":["20221031"],"award-info":[{"award-number":["20221031"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616355","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"425-437","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Log Parsing with Generalization Ability under New Log Types"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3793-7684","authenticated-orcid":false,"given":"Siyu","family":"Yu","sequence":"first","affiliation":[{"name":"Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5847-3132","authenticated-orcid":false,"given":"Yifan","family":"Wu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2066-9874","authenticated-orcid":false,"given":"Zhijing","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3377-8129","authenticated-orcid":false,"given":"Pinjia","family":"He","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0187-6760","authenticated-orcid":false,"given":"Ningjiang","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8132-4384","authenticated-orcid":false,"given":"Changjian","family":"Liu","sequence":"additional","affiliation":[{"name":"Guangxi University, Nanning, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","unstructured":"Yuki M Asano Christian Rupprecht and Andrea Vedaldi. 2019. A critical analysis of self-supervision or what we can learn from a single image. arXiv preprint arXiv:1904.13132 https:\/\/doi.org\/10.48550\/arXiv.1904.13132 10.48550\/arXiv.1904.13132","DOI":"10.48550\/arXiv.1904.13132"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2986459.2986733"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00039"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.1078"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007554"},{"key":"e_1_3_2_2_6_1","volume-title":"PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). 818\u2013829","author":"Dai Hetong","year":"2023","unstructured":"Hetong Dai, Yiming Tang, Heng Li, and Weiyi Shang. 2023. PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). 818\u2013829."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.167"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1402_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.06.025"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","unstructured":"Qiang Fu. 2009. Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining. 149\u2013158. https:\/\/doi.org\/10.1109\/ICDM.2009.60 10.1109\/ICDM.2009.60","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558947"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","unstructured":"Spyros Gidaris Praveer Singh and Nikos Komodakis. 2018. Unsupervised representation learning by predicting image rotations. arXiv preprint arXiv:1803.07728 https:\/\/doi.org\/10.48550\/arXiv.1803.07728 10.48550\/arXiv.1803.07728","DOI":"10.48550\/arXiv.1803.07728"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","unstructured":"Pinjia He. 2016. An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). 654\u2013661. https:\/\/doi.org\/10.1109\/DSN.2016.66 10.1109\/DSN.2016.66","DOI":"10.1109\/DSN.2016.66"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00021"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.50"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510101"},{"key":"e_1_3_2_2_23_1","unstructured":"Zanis Ali Khan Donghwan Shin Domenico Bianculli and Lionel Briand. 2023. Impact of Log Parsing on Log-based Anomaly Detection. arXiv preprint arXiv:2305.15897."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","unstructured":"Van-Hoang Le and Hongyu Zhang. 2023. An Evaluation of Log Parsing with ChatGPT. arXiv preprint arXiv:2306.01590 https:\/\/doi.org\/10.48550\/arXiv.2306.01590 10.48550\/arXiv.2306.01590","DOI":"10.48550\/arXiv.2306.01590"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","unstructured":"Van-Hoang Le and Hongyu Zhang. 2023. Log Parsing with Prompt-based Few-shot Learning. arXiv preprint arXiv:2302.07435 https:\/\/doi.org\/10.48550\/arXiv.2302.07435 10.48550\/arXiv.2302.07435","DOI":"10.48550\/arXiv.2302.07435"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_38"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2301.10418"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.73"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463281"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67667-4_8"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00148"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","unstructured":"Benjamin Recht Rebecca Roelofs Ludwig Schmidt and Vaishaal Shankar. 2018. Do cifar-10 classifiers generalize to cifar-10? arXiv preprint arXiv:1806.00451 https:\/\/doi.org\/10.48550\/arXiv.1806.00451 10.48550\/arXiv.1806.00451","DOI":"10.48550\/arXiv.1806.00451"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","unstructured":"Shiv Shankar Vihari Piratla Soumen Chakrabarti Siddhartha Chaudhuri Preethi Jyothi and Sunita Sarawagi. 2018. Generalizing across domains via cross-gradient training. arXiv preprint arXiv:1804.10745 https:\/\/doi.org\/10.48550\/arXiv.1804.10745 10.48550\/arXiv.1804.10745","DOI":"10.48550\/arXiv.1804.10745"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","unstructured":"Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213 https:\/\/doi.org\/10.48550\/arXiv.1611.03213 10.48550\/arXiv.1611.03213","DOI":"10.48550\/arXiv.1611.03213"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1909.13231"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00706"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549176"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","unstructured":"Yonghui Wu. 2016. Google\u2019s neural machine translation system: Bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144 https:\/\/doi.org\/10.48550\/arXiv.1609.08144 10.48550\/arXiv.1609.08144","DOI":"10.48550\/arXiv.1609.08144"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00175"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_2_47_1","unstructured":"Siyu Yu. 2023. Codes and data of Log3T. https:\/\/github.com\/logpai\/logparser\/tree\/master\/logparser\/Log3T"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3270566"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":50,"alternative-id":["10.1145\/3611643.3616355","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616355","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}