{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:32Z","timestamp":1763102372264,"version":"3.45.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060740","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T02:21:26Z","timestamp":1740450086000},"page":"1291-1306","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["LogDA: Dual Attention-Based Log Anomaly Detection Addressing Data Imbalance"],"prefix":"10.32604","volume":"83","author":[{"given":"Chexiaole","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haiyan","family":"Fu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Su J, Jiang C, Jin X, Qiao Y, Xiao T, Ma H, et al. Large language models for forecasting and anomaly detection: a systematic literature review. arXiv:2402.10350. 2024."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1629087.1629089","article-title":"Automated anomaly detection and performance modeling of enterprise applications","volume":"27","author":"Cherkasova","year":"2009","journal-title":"ACM Trans Comput Syst"},{"key":"ref3","series-title":"Proceedings of the 29th Annual Computer Security Applications Conference; 2013 Dec 08\u201312","first-page":"199","article-title":"Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks","author":"Yen"},{"key":"ref4","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct 30\u2013Nov 3","first-page":"1285","article-title":"DeepLog: anomaly detection and diagnosis from system logs through deep learning","author":"Du"},{"key":"ref5","series-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence; 2019 Aug 10\u201316","first-page":"4739","article-title":"LogAnomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs","author":"Meng"},{"key":"ref6","series-title":"2017 IEEE International Conference on Web Services (ICWS)","first-page":"33","article-title":"Drain: an online log parsing approach with fixed depth tree","author":"He","year":"2017 Jun 25\u201330"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2213","DOI":"10.1109\/TKDE.2018.2875442","article-title":"Spell: online streaming parsing of large unstructured system logs","volume":"31","author":"Du","year":"2019","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"110689","DOI":"10.1016\/j.asoc.2023.110689","article-title":"LAnoBERT: system log anomaly detection based on BERT masked language model","volume":"146","author":"Lee","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref9","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)","first-page":"121","article-title":"Tools and benchmarks for automated log parsing","author":"Zhu","year":"2019 May 25\u201331"},{"key":"ref10","series-title":"Seventh IEEE International Conference on Data Mining (ICDM 2007)","first-page":"583","article-title":"Failure prediction in IBM BlueGene\/L event logs","author":"Liang","year":"2007 Oct 28\u201331"},{"key":"ref11","series-title":"International Conference on Autonomic Computing","first-page":"36","article-title":"Failure diagnosis using decision trees","author":"Chen","year":"2024 May 17\u201318"},{"key":"ref12","series-title":"Advances in data science and management","first-page":"497","article-title":"Unstructured log analysis for system anomaly detection\u2013A study","author":"Behera","year":"2022"},{"key":"ref13","series-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","first-page":"807","article-title":"Robust log-based anomaly detection on unstable log data","author":"Zhang","year":"2019"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"109860","DOI":"10.1016\/j.asoc.2022.109860","article-title":"LayerLog: log sequence anomaly detection based on hierarchical semantics","volume":"132","author":"Zhang","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref15","series-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)","first-page":"230","article-title":"PLELog: semi-supervised log-based anomaly detection via probabilistic label estimation","author":"Yang","year":"2021 May 25\u201328"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1378","DOI":"10.1109\/TNSM.2023.3239522","article-title":"LogEncoder: log-based contrastive representation learning for anomaly detection","volume":"20","author":"Qi","year":"2023","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref17","series-title":"2021 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"LogBERT: log anomaly detection via BERT","author":"Guo","year":"2021 Jul 18\u201322"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2656","DOI":"10.1109\/TC.2023.3257518","article-title":"Improving log-based anomaly detection by pre-training hierarchical transformers","volume":"72","author":"Huang","year":"2023","journal-title":"IEEE Trans Comput"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3537","DOI":"10.1109\/TSC.2023.3289488","article-title":"MLog: mogrifier LSTM-based log anomaly detection approach using semantic representation","volume":"16","author":"Fu","year":"2023","journal-title":"IEEE Trans Serv Comput"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"119576","DOI":"10.1016\/j.ins.2023.119576","article-title":"Discrete log anomaly detection: a novel time-aware graph-based link prediction approach","volume":"647","author":"Yan","year":"2023","journal-title":"Inf Sci"},{"key":"ref21","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"207","article-title":"Parameter-efficient log anomaly detection based on pre-training model and LORA","author":"He","year":"2023 Oct 9\u201312"},{"key":"ref22","first-page":"135","article-title":"LogFormer: a pre-train and tuning pipeline for log anomaly detection","volume":"38","author":"Guo","year":"2024","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3224","DOI":"10.1109\/TSC.2023.3270566","article-title":"Brain: log parsing with bidirectional parallel tree","volume":"16","author":"Yu","year":"2023","journal-title":"IEEE Trans Serv Comput"},{"key":"ref24","series-title":"Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP); 2019 Nov 3\u20137","first-page":"3980","article-title":"Sentence-BERT: sentence embeddings using Siamese BERT-networks","author":"Reimers"},{"key":"ref25","series-title":"31st Conference on Neural Information Processing Systems (NIPS 2017)","article-title":"Attention is all you need","author":"Vaswani","year":"2017 Dec 3\u20139"},{"key":"ref26","unstructured":"Zhai S, Talbott W, Srivastava N, Huang C, Goh H, Zhang R, et al. An attention free transformer. arXiv:2105.14103. 2021."},{"key":"ref27","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"355","article-title":"Loghub: a large collection of system log datasets for AI-driven log analytics","author":"Zhu","year":"2023 Oct 9\u201312"},{"key":"ref28","series-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles; 2009 Oct 11\u201314","first-page":"117","article-title":"Detecting large-scale system problems by mining console logs","author":"Xu"},{"key":"ref29","series-title":"37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907)","first-page":"575","article-title":"What supercomputers say: a study of five system logs","author":"Oliner","year":"2007 Jun 25\u201328"},{"key":"ref30","series-title":"2010 USENIX Annual Technical Conference (USENIX ATC 10); 2010 Jun 23\u201325","article-title":"Mining invariants from console logs for system problem detection","author":"Lou","year":"2010"},{"key":"ref31","series-title":"2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"207","article-title":"Experience report: system log analysis for anomaly detection","author":"He","year":"2016 Oct 23\u201327"},{"key":"ref32","series-title":"Proceedings of the 44th International Conference on Software Engineering; 2022 May 21\u201329","first-page":"1356","article-title":"Log-based anomaly detection with deep learning: how far are we?","author":"Le","year":"2022"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_60740\/TSP_CMC_60740.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:36:53Z","timestamp":1763102213000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060740","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}