{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T04:16:56Z","timestamp":1774585016524,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3696630.3728519","type":"proceedings-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:08:09Z","timestamp":1753729689000},"page":"661-665","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["From Few-Label to Zero-Label: An Approach for Cross-System Log-Based Anomaly Detection with Meta-Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8230-1039","authenticated-orcid":false,"given":"Xinlong","family":"Zhao","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5946-9829","authenticated-orcid":false,"given":"Tong","family":"Jia","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4439-9810","authenticated-orcid":false,"given":"Minghua","family":"He","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9969-4795","authenticated-orcid":false,"given":"Yihan","family":"Wu","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9667-2423","authenticated-orcid":false,"given":"Ying","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4686-3181","authenticated-orcid":false,"given":"Gang","family":"Huang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5152-4"},{"key":"e_1_3_2_1_2_1","volume-title":"LogTransfer: Cross-System Log Anomaly Detection for Software Systems with Transfer Learning. In 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE). 37\u201347","author":"Chen Rui","year":"2020","unstructured":"Rui Chen, Shenglin Zhang, Dongwen Li, Yuzhe Zhang, Fangrui Guo, Weibin Meng, Dan Pei, Yuzhi Zhang, Xu Chen, and Yuqing Liu. 2020. LogTransfer: Cross-System Log Anomaly Detection for Software Systems with Transfer Learning. In 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE). 37\u201347. 10.1109\/ISSRE5003.2020.00013"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Du Min","year":"2017","unstructured":"Min Du, Feifei Li, Guineng Zheng, and Vivek Srikumar. 2017. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 1285\u20131298. 10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_4_1","volume-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 46\u201356","author":"Duan Chiming","year":"2023","unstructured":"Chiming Duan, Tong Jia, Huaqian Cai, Ying Li, and Gang Huang. 2023. Afalog: A general augmentation framework for log-based anomaly detection with active learning. In 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 46\u201356."},{"key":"e_1_3_2_1_5_1","volume-title":"2023 IEEE International Conference on Web Services (ICWS). IEEE, 436\u2013443","author":"Duan Chiming","year":"2023","unstructured":"Chiming Duan, Tong Jia, Ying Li, and Gang Huang. 2023. Aclog: An approach to detecting anomalies from system logs with active learning. In 2023 IEEE International Conference on Web Services (ICWS). IEEE, 436\u2013443."},{"key":"e_1_3_2_1_6_1","volume-title":"2023 IEEE International Conference on Web Services (ICWS). 436\u2013443","author":"Duan Chiming","year":"2023","unstructured":"Chiming Duan, Tong Jia, Ying Li, and Gang Huang. 2023. AcLog: An Approach to Detecting Anomalies from System Logs with Active Learning. In 2023 IEEE International Conference on Web Services (ICWS). 436\u2013443. 10.1109\/ICWS60048.2023.00062"},{"key":"e_1_3_2_1_7_1","volume-title":"ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Duan Chiming","unstructured":"Chiming Duan, Tong Jia, Yong Yang, Guiyang Liu, Jinbu Liu, Huxing Zhang, Qi Zhou, Ying Li, and Gang Huang. 2025. EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection. In ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 1\u20135."},{"key":"e_1_3_2_1_8_1","volume-title":"2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE). IEEE Computer Society, 610\u2013610","author":"Duan Chiming","year":"2025","unstructured":"Chiming Duan, Yong Yang, Tong Jia, Guiyang Liu, Jinbu Liu, Huxing Zhang, Qi Zhou, Ying Li, and Gang Huang. 2025. FAMOS: Fault diagnosis for Microservice Systems through Effective Multi-modal Data Fusion. In 2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE). IEEE Computer Society, 610\u2013610."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"1135","author":"Finn Chelsea","year":"2017","unstructured":"Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 70), Doina Precup and Yee Whye Teh (Eds.). PMLR, 1126\u20131135. https:\/\/proceedings.mlr.press\/v70\/finn17a.html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2599532"},{"key":"e_1_3_2_1_11_1","volume-title":"Lin (Eds.)","volume":"33","author":"Goldblum Micah","year":"2020","unstructured":"Micah Goldblum, Liam Fowl, and Tom Goldstein. 2020. Adversarially Robust Few-Shot Learning: A Meta-Learning Approach. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (Eds.), Vol. 33. Curran Associates, Inc., 17886\u201317895. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/cfee398643cbc3dc5eefc89334cacdc1-Paper.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1398"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 30th ACM International Conference on Information & Knowledge Management (Virtual Event","author":"Han Xiao","year":"2021","unstructured":"Xiao Han and Shuhan Yuan. 2021. Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management (Virtual Event, Queensland, Australia) (CIKM '21). Association for Computing Machinery, New York, NY, USA, 3068\u20133072. 10.1145\/3459637.3482209"},{"key":"e_1_3_2_1_14_1","volume-title":"2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 132\u2013143","author":"He Minghua","year":"2024","unstructured":"Minghua He, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li, and Gang Huang. 2024. LLMeLog: An Approach for Anomaly Detection based on LLM-enriched Log Events. In 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 132\u2013143."},{"key":"e_1_3_2_1_15_1","volume-title":"2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE). IEEE Computer Society, 726\u2013726","author":"He Minghua","year":"2025","unstructured":"Minghua He, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li, and Gang Huang. 2025. Weakly-supervised Log-based Anomaly Detection with Inexact Labels via Multi-instance Learning. In 2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE). IEEE Computer Society, 726\u2013726."},{"key":"e_1_3_2_1_16_1","volume-title":"Drain: An Online Log Parsing Approach with Fixed Depth Tree. In 2017 IEEE International Conference on Web Services (ICWS). 33\u201340","author":"He Pinjia","year":"2017","unstructured":"Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. 2017. Drain: An Online Log Parsing Approach with Fixed Depth Tree. In 2017 IEEE International Conference on Web Services (ICWS). 33\u201340. 10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3079209"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (Washington DC, USA) (KDD '22)","author":"Jia Tong","year":"2022","unstructured":"Tong Jia, Ying Li, Yong Yang, Gang Huang, and Zhonghai Wu. 2022. Augmenting Log-based Anomaly Detection Models to Reduce False Anomalies with Human Feedback. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (Washington DC, USA) (KDD '22). Association for Computing Machinery, New York, NY, USA, 3081\u20133089. 10.1145\/3534678.3539106"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice","author":"Kim Jinhan","year":"2020","unstructured":"Jinhan Kim, Valeriy Savchenko, Kihyuck Shin, Konstantin Sorokin, Hyunseok Jeon, Georgiy Pankratenko, Sergey Markov, and Chul-Joo Kim. 2020. Automatic abnormal log detection by analyzing log history for providing debugging insight. In Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice (Seoul, South Korea) (ICSE-SEIP '20). Association for Computing Machinery, New York, NY, USA, 71\u201380. 10.1145\/3377813.3381371"},{"key":"e_1_3_2_1_20_1","volume-title":"Log-based Anomaly Detection Without Log Parsing. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 492\u2013504","author":"Le Van-Hoang","year":"2021","unstructured":"Van-Hoang Le and Hongyu Zhang. 2021. Log-based Anomaly Detection Without Log Parsing. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 492\u2013504. 10.1109\/ASE51524.2021.9678773"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19","author":"Meng Weibin","year":"2019","unstructured":"Weibin Meng, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, Ruizhi Zhang, Shimin Tao, Pei Sun, and Rong Zhou. 2019. LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19. International Joint Conferences on Artificial Intelligence Organization, 4739\u20134745. 10.24963\/ijcai.2019\/658"},{"key":"e_1_3_2_1_22_1","volume-title":"What Supercomputers Say: A Study of Five System Logs. In 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN'07)","author":"Oliner Adam","year":"2007","unstructured":"Adam Oliner and Jon Stearley. 2007. What Supercomputers Say: A Study of Five System Logs. In 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN'07). 575\u2013584. 10.1109\/DSN.2007.103"},{"key":"e_1_3_2_1_23_1","volume-title":"2010 IEEE Network Operations and Management Symposium - NOMS 2010","author":"Reidemeister Thomas","year":"2010","unstructured":"Thomas Reidemeister, Mohammad A. Munawar, and Paul A.S. Ward. 2010. Identifying symptoms of recurrent faults in log files of distributed information systems. In 2010 IEEE Network Operations and Management Symposium - NOMS 2010. 187\u2013194. 10.1109\/NOMS.2010.5488459"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3478805"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22","author":"Wu Jun","year":"2022","unstructured":"Jun Wu and Jingrui He. 2022. A Unified Meta-Learning Framework for Dynamic Transfer Learning. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, Lud De Raedt (Ed.). International Joint Conferences on Artificial Intelligence Organization, 3573\u20133579. Main Track. 10.24963\/ijcai.2022\/496"},{"key":"e_1_3_2_1_26_1","volume-title":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS). 167\u2013175","author":"Xia Wensheng","year":"2019","unstructured":"Wensheng Xia, Ying Li, Tong Jia, and Zhonghai Wu. 2019. BugIdentifier: An Approach to Identifying Bugs via Log Mining for Accelerating Bug Reporting Stage. In 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS). 167\u2013175. 10.1109\/QRS.2019.00033"},{"key":"e_1_3_2_1_27_1","volume-title":"LogCAE: An Approach for Log-based Anomaly Detection with Active Learning and Contrastive Learning. In 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 144\u2013155","author":"Xiao Pei","year":"2024","unstructured":"Pei Xiao, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li, and Gang Huang. 2024. LogCAE: An Approach for Log-based Anomaly Detection with Active Learning and Contrastive Learning. In 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 144\u2013155."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles","author":"Xu Wei","unstructured":"Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I. Jordan. 2009. Detecting large-scale system problems by mining console logs. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (Big Sky, Montana, USA) (SOSP '09). Association for Computing Machinery, New York, NY, USA, 117\u2013132. 10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_29_1","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 1448\u20131460","author":"Yang Lin","year":"2021","unstructured":"Lin Yang, Junjie Chen, Zan Wang, Weijing Wang, Jiajun Jiang, Xuyuan Dong, and Wenbin Zhang. 2021. Semi-Supervised Log-Based Anomaly Detection via Probabilistic Label Estimation. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 1448\u20131460. 10.1109\/ICSE43902.2021.00130"},{"key":"e_1_3_2_1_30_1","volume-title":"Enhancing Web Service Anomaly Detection via Finegrained Multi-modal Association and Frequency Domain Analysis. arXiv preprint arXiv:2501.16875","author":"Yang Xixuan","year":"2025","unstructured":"Xixuan Yang, Xin Huang, Chiming Duan, Tong Jia, Shandong Dong, Ying Li, and Gang Huang. 2025. Enhancing Web Service Anomaly Detection via Finegrained Multi-modal Association and Frequency Domain Analysis. arXiv preprint arXiv:2501.16875 (2025)."},{"key":"e_1_3_2_1_31_1","volume-title":"Improving Log-Based Anomaly Detection with Component-Aware Analysis. In 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME). 667\u2013671","author":"Yin Kun","year":"2020","unstructured":"Kun Yin, Meng Yan, Ling Xu, Zhou Xu, Zhao Li, Dan Yang, and Xiaohong Zhang. 2020. Improving Log-Based Anomaly Detection with Component-Aware Analysis. In 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME). 667\u2013671. 10.1109\/ICSME46990.2020.00069"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering","author":"Zhang Chenyangguang","year":"2024","unstructured":"Chenyangguang Zhang, Tong Jia, Guopeng Shen, Pinyan Zhu, and Ying Li. 2024. MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-Learning. In Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (Lisbon, Portugal) (ICSE '24). Association for Computing Machinery, New York, NY, USA, Article 154, 12 pages. 10.1145\/3597503.3639205"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (Tallinn, Estonia) (ESEC\/FSE","author":"Zhang Xu","year":"2019","unstructured":"Xu Zhang, Yong Xu, Qingwei Lin, Bo Qiao, Hongyu Zhang, Yingnong Dang, Chunyu Xie, Xinsheng Yang, Qian Cheng, Ze Li, Junjie Chen, Xiaoting He, Randolph Yao, Jian-Guang Lou, Murali Chintalapati, Furao Shen, and Dongmei Zhang. 2019. Robust log-based anomaly detection on unstable log data. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (Tallinn, Estonia) (ESEC\/FSE 2019). Association for Computing Machinery, New York, NY, USA, 807\u2013817. 10.1145\/3338906.3338931"}],"event":{"name":"FSE Companion '25: 33rd ACM International Conference on the Foundations of Software Engineering","location":"Clarion Hotel Trondheim Trondheim Norway","acronym":"FSE Companion '25","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696630.3728519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:11:17Z","timestamp":1753729877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696630.3728519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":33,"alternative-id":["10.1145\/3696630.3728519","10.1145\/3696630"],"URL":"https:\/\/doi.org\/10.1145\/3696630.3728519","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-07-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}