{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:43Z","timestamp":1766442463600,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","funder":[{"name":"the National Key Research and Development Program","award":["2022YFB3104001"],"award-info":[{"award-number":["2022YFB3104001"]}]},{"name":"the Hubei Province Major Science and Technology Innovation Program","award":["2024BAA011"],"award-info":[{"award-number":["2024BAA011"]}]},{"name":"the Key Research and Development Program of Hubei Province","award":["2023BAB016"],"award-info":[{"award-number":["2023BAB016"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3760727","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"4791-4793","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6094-1203","authenticated-orcid":false,"given":"JunWei","family":"Zhou","sequence":"first","affiliation":[{"name":"Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7281-5989","authenticated-orcid":false,"given":"Yuyang","family":"Gao","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2110-9529","authenticated-orcid":false,"given":"Cheng","family":"Tan","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9012-8971","authenticated-orcid":false,"given":"Yanchao","family":"Yang","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8440-4181","authenticated-orcid":false,"given":"Jianwen","family":"Xiang","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, Wuhan, Hubei, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Max Landauer Sebastian Onder and et al. 2023. Deep learning for anomaly detection in log data: A survey. Machine Learning with Applications (2023) 100470.","DOI":"10.1016\/j.mlwa.2023.100470"},{"volume-title":"Proceedings of the IEEE International Conference on High Performance Computing and Communications. 273--280","author":"Qi Jiaxing","key":"e_1_3_2_1_2_1","unstructured":"Jiaxing Qi, Shaohan Huang, and et al. 2023. LogGPT: Exploring ChatGPT for log-based anomaly detection. In Proceedings of the IEEE International Conference on High Performance Computing and Communications. 273--280."},{"volume-title":"Proceedings of the IEEE\/ACM 31st International Symposium on Quality of Service. 1--11","author":"Tao Shimin","key":"e_1_3_2_1_3_1","unstructured":"Shimin Tao, Yilun Liu, and et al. 2023. Biglog: Unsupervised large-scale pretraining for a unified log representation. In Proceedings of the IEEE\/ACM 31st International Symposium on Quality of Service. 1--11."},{"key":"e_1_3_2_1_4_1","unstructured":"An Yang Baosong Yang and et al. 2024. Qwen2.5 Technical Report. arXiv:2412.15115 (2024) 1--25."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3222417"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3201379"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3760727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:26:02Z","timestamp":1766442362000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3760727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":6,"alternative-id":["10.1145\/3719027.3760727","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3760727","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}