{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:27Z","timestamp":1775912787290,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T00:00:00Z","timestamp":1729728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"PKU-ZTE Cooperation Research Project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,24]]},"DOI":"10.1145\/3674805.3695403","type":"proceedings-article","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T18:39:24Z","timestamp":1729017564000},"page":"538-548","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Reducing Events to Augment Log-based Anomaly Detection Models: An Empirical Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9500-4489","authenticated-orcid":false,"given":"Lingzhe","family":"Zhang","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5946-9829","authenticated-orcid":false,"given":"Tong","family":"Jia","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9540-6502","authenticated-orcid":false,"given":"Kangjin","family":"Wang","sequence":"additional","affiliation":[{"name":"Alibaba Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0979-9803","authenticated-orcid":false,"given":"Mengxi","family":"Jia","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9667-2423","authenticated-orcid":false,"given":"Yong","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking Univerity, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6278-2357","authenticated-orcid":false,"given":"Ying","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"e_1_3_2_1_2_1","first-page":"879","article-title":"Logram: Efficient Log Parsing Using n n-Gram Dictionaries","volume":"48","author":"Dai Hetong","year":"2020","unstructured":"Hetong Dai, Heng Li, Che-Shao Chen, Weiyi Shang, and Tse-Hsun Chen. 2020. Logram: Efficient Log Parsing Using n n-Gram Dictionaries. IEEE Transactions on Software Engineering 48, 3 (2020), 879\u2013892.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_3_1","unstructured":"donglee afar. 2023. logdeep. https:\/\/github.com\/donglee-afar\/logdeep"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_5_1","volume-title":"DevOps and the cost of downtime: Fortune 1000 best practice metrics quantified","author":"Elliot Stephen","year":"2014","unstructured":"Stephen Elliot. 2014. DevOps and the cost of downtime: Fortune 1000 best practice metrics quantified. International Data Corporation (IDC) (2014)."},{"key":"e_1_3_2_1_6_1","volume-title":"Logbert: Log anomaly detection via bert. In 2021 international joint conference on neural networks (IJCNN)","author":"Guo Haixuan","year":"2021","unstructured":"Haixuan Guo, Shuhan Yuan, and Xintao Wu. 2021. Logbert: Log anomaly detection via bert. In 2021 international joint conference on neural networks (IJCNN). IEEE, 1\u20138."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482209"},{"key":"e_1_3_2_1_9_1","volume-title":"An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"He Pinjia","unstructured":"Pinjia He, Jieming Zhu, Shilin He, Jian Li, and Michael\u00a0R Lyu. 2016. An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, 654\u2013661."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_12_1","volume-title":"Loghub: A large collection of system log datasets towards automated log analytics.","author":"He Shilin","year":"2023","unstructured":"Shilin He, Jieming Zhu, Pinjia He, and Michael\u00a0R Lyu. 2023. Loghub: A large collection of system log datasets towards automated log analytics. (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539106"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00021"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.50"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00315"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377813.3381371"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2023.100470"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"e_1_3_2_1_20_1","volume-title":"SwissLog: Robust anomaly detection and localization for interleaved unstructured logs","author":"Li Xiaoyun","year":"2022","unstructured":"Xiaoyun Li, Pengfei Chen, Linxiao Jing, Zilong He, and Guangba Yu. 2022. SwissLog: Robust anomaly detection and localization for interleaved unstructured logs. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"e_1_3_2_1_23_1","volume-title":"4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech)","author":"Lu Siyang","unstructured":"Siyang Lu, Xiang Wei, Yandong Li, and Liqiang Wang. 2018. Detecting anomaly in big data system logs using convolutional neural network. In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, 151\u2013158."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"e_1_3_2_1_25_1","volume-title":"Rough Logs: A Data Reduction Approach for Log Files.. In ICEIS (2). 295\u2013302.","author":"Meinig Michael","year":"2019","unstructured":"Michael Meinig, Peter Tr\u00f6ger, and Christoph Meinel. 2019. Rough Logs: A Data Reduction Approach for Log Files.. In ICEIS (2). 295\u2013302."},{"key":"e_1_3_2_1_26_1","volume-title":"Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs.. In IJCAI, Vol.\u00a019. 4739\u20134745.","author":"Meng Weibin","year":"2019","unstructured":"Weibin Meng, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, Ruizhi Zhang, Shimin Tao, Pei Sun, 2019. Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs.. In IJCAI, Vol.\u00a019. 4739\u20134745."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463281"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67667-4_8"},{"key":"e_1_3_2_1_29_1","volume-title":"15th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 21). 183\u2013198.","author":"Rodrigues Kirk","unstructured":"Kirk Rodrigues, Yu Luo, and Ding Yuan. 2021. { CLP} : Efficient and Scalable Search on Compressed Text Logs. In 15th { USENIX} Symposium on Operating Systems Design and Implementation ({ OSDI} 21). 183\u2013198."},{"key":"e_1_3_2_1_30_1","volume-title":"An Effective Approach for Parsing Large Log Files. In 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 1\u201312","author":"Sedki Issam","year":"2022","unstructured":"Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Ait-Mohamed, and Mohammed\u00a0A Shehab. 2022. An Effective Approach for Parsing Large Log Files. In 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 1\u201312."},{"key":"e_1_3_2_1_31_1","volume-title":"Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213","author":"Shima Keiichi","year":"2016","unstructured":"Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213 (2016)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"e_1_3_2_1_34_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Yang Stephen","year":"2018","unstructured":"Stephen Yang, Seo\u00a0Jin Park, and John Ousterhout. 2018. { NanoLog} : A Nanosecond Scale Logging System. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 335\u2013350."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00069"},{"key":"e_1_3_2_1_36_1","volume-title":"LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, 1763\u20131775","author":"Yu Guangba","year":"2023","unstructured":"Guangba Yu, Pengfei Chen, Pairui Li, Tianjun Weng, Haibing Zheng, Yuetang Deng, and Zibin Zheng. 2023. LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, 1763\u20131775."},{"key":"e_1_3_2_1_37_1","volume-title":"Brain: Log Parsing with Bidirectional Parallel Tree","author":"Yu Siyu","year":"2023","unstructured":"Siyu Yu, Pinjia He, Ningjiang Chen, and Yifan Wu. 2023. Brain: Log Parsing with Bidirectional Parallel Tree. IEEE Transactions on Services Computing (2023)."},{"key":"e_1_3_2_1_38_1","first-page":"618","article-title":"Two-stage file compaction framework by log-structured merge-tree for time series data","volume":"41","author":"Lingzhe ZHANG","year":"2021","unstructured":"Lingzhe ZHANG, Xiangdong HUANG, Jialin QIAO, Wangminhao GOU, and Jianmin WANG. 2021. Two-stage file compaction framework by log-structured merge-tree for time series data. Journal of Computer Applications 41, 3 (2021), 618.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671725"},{"key":"e_1_3_2_1_40_1","volume-title":"A Survey of AIOps for Failure Management in the Era of Large Language Models. arXiv preprint arXiv:2406.11213","author":"Zhang Lingzhe","year":"2024","unstructured":"Lingzhe Zhang, Tong Jia, Mengxi Jia, Yong Yang, Zhonghai Wu, and Ying Li. 2024. A Survey of AIOps for Failure Management in the Era of Large Language Models. arXiv preprint arXiv:2406.11213 (2024)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2023.102224"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132778"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEM '24: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","location":"Barcelona Spain","acronym":"ESEM '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 18th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674805.3695403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674805.3695403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T12:56:25Z","timestamp":1755867385000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674805.3695403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,24]]},"references-count":44,"alternative-id":["10.1145\/3674805.3695403","10.1145\/3674805"],"URL":"https:\/\/doi.org\/10.1145\/3674805.3695403","relation":{},"subject":[],"published":{"date-parts":[[2024,10,24]]},"assertion":[{"value":"2024-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}