{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:08:24Z","timestamp":1775815704335,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272249"],"award-info":[{"award-number":["62272249"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302244"],"award-info":[{"award-number":["62302244"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072264"],"award-info":[{"award-number":["62072264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695535","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1680-1692","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["End-to-End AutoML for Unsupervised Log Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0330-0028","authenticated-orcid":false,"given":"Shenglin","family":"Zhang","sequence":"first","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1645-1686","authenticated-orcid":false,"given":"Yuhe","family":"Ji","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4720-2675","authenticated-orcid":false,"given":"Jiaqi","family":"Luan","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0371-854X","authenticated-orcid":false,"given":"Xiaohui","family":"Nie","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0732-7198","authenticated-orcid":false,"given":"Zi`ang","family":"Chen","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6303-1731","authenticated-orcid":false,"given":"Minghua","family":"Ma","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0266-7899","authenticated-orcid":false,"given":"Yongqian","family":"Sun","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5113-838X","authenticated-orcid":false,"given":"Dan","family":"Pei","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. LogCraft. https:\/\/anonymous.4open.science\/r\/LogCraft-54D8\/. Accessed: 2024-06-08."},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"MFE: Towards reproducible meta-feature extraction","volume":"21","author":"Alcoba\u00e7a Edesio","year":"2020","unstructured":"Edesio Alcoba\u00e7a, Felipe Siqueira, Adriano Rivolli, Lu\u00eds PF Garcia, Jefferson T Oliva, and Andr\u00e9 CPLF De Carvalho. 2020. MFE: Towards reproducible meta-feature extraction. Journal of Machine Learning Research 21, 111 (2020), 1--5.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-022-00309-0"},{"key":"e_1_3_2_1_4_1","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra James","year":"2012","unstructured":"James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization. Journal of machine learning research 13, 2 (2012).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.43"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Hao Chen Ruizhi Xiao and Shuyuan Jin. 2021. Unsupervised Anomaly Detection Based on System Logs.. In SEKE. 92--97.","DOI":"10.18293\/SEKE2021-126"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629553"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417055"},{"key":"e_1_3_2_1_9_1","volume-title":"Experience report: Deep learning-based system log analysis for anomaly detection. arXiv preprint arXiv:2107.05908","author":"Chen Zhuangbin","year":"2021","unstructured":"Zhuangbin Chen, Jinyang Liu, Wenwei Gu, Yuxin Su, and Michael R Lyu. 2021. Experience report: Deep learning-based system log analysis for anomaly detection. arXiv preprint arXiv:2107.05908 (2021)."},{"key":"e_1_3_2_1_10_1","volume-title":"Experience report: Deep learning-based system log analysis for anomaly detection. arXiv preprint arXiv:2107.05908","author":"Chen Zhuangbin","year":"2021","unstructured":"Zhuangbin Chen, Jinyang Liu, Wenwei Gu, Yuxin Su, and Michael R Lyu. 2021. Experience report: Deep learning-based system log analysis for anomaly detection. arXiv preprint arXiv:2107.05908 (2021)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10214-6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866850"},{"key":"e_1_3_2_1_15_1","volume-title":"Logbert: Log anomaly detection via bert. In 2021 international joint conference on neural networks (IJCNN)","author":"Guo Haixuan","year":"2021","unstructured":"Haixuan Guo, Shuhan Yuan, and Xintao Wu. 2021. Logbert: Log anomaly detection via bert. In 2021 international joint conference on neural networks (IJCNN). IEEE, 1--8."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482209"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_18_1","volume-title":"A survey on automated log analysis for reliability engineering. ACM computing surveys (CSUR) 54, 6","author":"He Shilin","year":"2021","unstructured":"Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, and Michael R Lyu. 2021. A survey on automated log analysis for reliability engineering. ACM computing surveys (CSUR) 54, 6 (2021), 1--37."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558963"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_21_1","volume-title":"Loghub: A large collection of system log datasets towards automated log analytics. arXiv preprint arXiv:2008.06448","author":"He Shilin","year":"2020","unstructured":"Shilin He, Jieming Zhu, Pinjia He, and Michael R Lyu. 2020. Loghub: A large collection of system log datasets towards automated log analytics. arXiv preprint arXiv:2008.06448 (2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"AutoML: A survey of the state-of-the-art. Knowledge-based systems 212","author":"He Xin","year":"2021","unstructured":"Xin He, Kaiyong Zhao, and Xiaowen Chu. 2021. AutoML: A survey of the state-of-the-art. Knowledge-based systems 212 (2021), 106622."},{"key":"e_1_3_2_1_23_1","volume-title":"Genetic algorithms. Scientific american 267, 1","author":"Holland John H","year":"1992","unstructured":"John H Holland. 1992. Genetic algorithms. Scientific american 267, 1 (1992), 66--73."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613891"},{"key":"e_1_3_2_1_25_1","unstructured":"Kaggle. 2018. 2018 Kaggle Machine Learning and Data Science Survey. https:\/\/www.kaggle.com\/kaggle\/kaggle-survey-2018. Accessed: 2024-05-13."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(92)90104-Y"},{"key":"e_1_3_2_1_28_1","volume-title":"A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques. arXiv preprint arXiv:2309.02854","author":"Landauer Max","year":"2023","unstructured":"Max Landauer, Florian Skopik, and Markus Wurzenberger. 2023. A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques. arXiv preprint arXiv:2309.02854 (2023)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00204"},{"key":"e_1_3_2_1_32_1","volume-title":"Revisiting Log Parsing: The Present, the Future, and the Uncertainties","author":"Li Zhijing","year":"2024","unstructured":"Zhijing Li, Qiuai Fu, Zhijun Huang, Jianbo Yu, Yiqian Li, Yuanhao Lai, and Yuchi Ma. 2024. Revisiting Log Parsing: The Present, the Future, and the Uncertainties. IEEE Transactions on Reliability (2024)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Yinglung Liang Yanyong Zhang Hui Xiong and Ramendra Sahoo. 2007. Failure Prediction in IBM BlueGene\/L Event Logs. 583 -- 588. 10.1109\/ICDM.2007.46","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_35_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"e_1_3_2_1_37_1","volume-title":"2010 USENIX Annual Technical Conference (USENIX ATC 10)","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou, Qiang Fu, Shenqi Yang, Ye Xu, and Jiang Li. 2010. Mining invariants from console logs for system problem detection. In 2010 USENIX Annual Technical Conference (USENIX ATC 10)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_2_1_39_1","volume-title":"Jump-Starting Multivariate Time Series Anomaly Detection for Online Service Systems. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021","author":"Ma Minghua","year":"2021","unstructured":"Minghua Ma, Shenglin Zhang, Junjie Chen, Jim Xu, Haozhe Li, Yongliang Lin, Xiaohui Nie, Bo Zhou, Yong Wang, and Dan Pei. 2021. Jump-Starting Multivariate Time Series Anomaly Detection for Online Service Systems. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021, July 14--16, 2021. USENIX Association, 413--426."},{"key":"e_1_3_2_1_40_1","volume-title":"Robust and Rapid Adaption for Concept Drift in Software System Anomaly Detection. In 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018","author":"Ma Minghua","year":"2018","unstructured":"Minghua Ma, Shenglin Zhang, Dan Pei, Xin Huang, and Hongwei Dai. 2018. Robust and Rapid Adaption for Concept Drift in Software System Anomaly Detection. In 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018, Memphis, TN, USA, October 15--18, 2018. IEEE Computer Society, 13--24."},{"key":"e_1_3_2_1_41_1","first-page":"4739","article-title":"Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs","volume":"19","author":"Meng Weibin","year":"2019","unstructured":"Weibin Meng, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, Ruizhi Zhang, Shimin Tao, Pei Sun, et al. 2019. Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs.. In IJCAI, Vol. 19. 4739--4745.","journal-title":"IJCAI"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076466"},{"key":"e_1_3_2_1_43_1","volume-title":"37th annual IEEE\/IFIP international conference on dependable systems and networks (DSN'07)","author":"Oliner Adam","unstructured":"Adam Oliner and Jon Stearley. 2007. What supercomputers say: A study of five system logs. In 37th annual IEEE\/IFIP international conference on dependable systems and networks (DSN'07). IEEE, 575--584."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.365"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"e_1_3_2_1_49_1","volume-title":"Taking human out of learning applications: A survey on automated machine learning. arXiv preprint arXiv:1810.13306","author":"Yao Quanming","year":"2018","unstructured":"Quanming Yao, Mengshuo Wang, Yuqiang Chen, Wenyuan Dai, Yu-Feng Li, Wei-Wei Tu, Qiang Yang, and Yang Yu. 2018. Taking human out of learning applications: A survey on automated machine learning. arXiv preprint arXiv:1810.13306 (2018)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663826"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639205"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473933"},{"key":"e_1_3_2_1_54_1","first-page":"4489","article-title":"Automatic unsupervised outlier model selection","volume":"34","author":"Zhao Yue","year":"2021","unstructured":"Yue Zhao, Ryan Rossi, and Leman Akoglu. 2021. Automatic unsupervised outlier model selection. Advances in Neural Information Processing Systems 34 (2021), 4489--4502.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695535","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:39Z","timestamp":1750295379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":56,"alternative-id":["10.1145\/3691620.3695535","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695535","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}