{"id":"https://openalex.org/W7119521327","doi":"https://doi.org/10.1016/j.jss.2026.112781","title":"LogMeta: A few-shot model-agnostic meta-learning framework for robust and adaptive log anomaly detection","display_name":"LogMeta: A few-shot model-agnostic meta-learning framework for robust and adaptive log anomaly detection","publication_year":2026,"publication_date":"2026-01-09","ids":{"openalex":"https://openalex.org/W7119521327","doi":"https://doi.org/10.1016/j.jss.2026.112781"},"language":"en","primary_location":{"id":"doi:10.1016/j.jss.2026.112781","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jss.2026.112781","pdf_url":null,"source":{"id":"https://openalex.org/S37879656","display_name":"Journal of Systems and Software","issn_l":"0164-1212","issn":["0164-1212","1873-1228"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.jss.2026.112781","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122332094","display_name":"Yicheng Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yicheng Sun","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0007-6555-0571","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051403641","display_name":"Jacky Keung","orcid":"https://orcid.org/0000-0002-3803-9600"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jacky Wai Keung","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-3803-9600","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106597660","display_name":"Hi Kuen Yu","orcid":"https://orcid.org/0009-0009-8451-188X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hi Kuen Yu","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0009-8451-188X","affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122382381","display_name":"Wenqiang Luo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenqiang Luo","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0005-4171-2025","affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5122332094"],"corresponding_institution_ids":[],"apc_list":{"value":3560,"currency":"USD","value_usd":3560},"apc_paid":{"value":3560,"currency":"USD","value_usd":3560},"fwci":66.5743,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.99658513,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"235","issue":null,"first_page":"112781","last_page":"112781"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.4318000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.4318000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.13009999692440033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.054099999368190765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.673799991607666},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.36239999532699585},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3587999939918518},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.31189998984336853}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.673799991607666},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5824999809265137},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.48170000314712524},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42410001158714294},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.36239999532699585},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3246000111103058},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.31189998984336853},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2743000090122223},{"id":"https://openalex.org/C102248274","wikidata":"https://www.wikidata.org/wiki/Q168388","display_name":"Adaptive filter","level":2,"score":0.23160000145435333}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.jss.2026.112781","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jss.2026.112781","pdf_url":null,"source":{"id":"https://openalex.org/S37879656","display_name":"Journal of Systems and Software","issn_l":"0164-1212","issn":["0164-1212","1873-1228"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Software","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/f22fb10e-0d6e-4b1f-bbca-53c6574c07fa","is_oa":true,"landing_page_url":"https://hdl.handle.net/2031/f22fb10e-0d6e-4b1f-bbca-53c6574c07fa","pdf_url":null,"source":{"id":"https://openalex.org/S7407055387","display_name":"CityU Scholars","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sun, Y, Keung, J W, Yu, H K & Luo, W 2026, 'LogMeta : A few-shot model-agnostic meta-learning framework for robust and adaptive log anomaly detection', Journal of Systems and Software, vol. 235, 112781. https://doi.org/10.1016/j.jss.2026.112781","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.jss.2026.112781","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jss.2026.112781","pdf_url":null,"source":{"id":"https://openalex.org/S37879656","display_name":"Journal of Systems and Software","issn_l":"0164-1212","issn":["0164-1212","1873-1228"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Software","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.48537567257881165}],"awards":[{"id":"https://openalex.org/G3748026768","display_name":null,"funder_award_id":"9229098","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"},{"id":"https://openalex.org/G4282291828","display_name":null,"funder_award_id":"9229029","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"},{"id":"https://openalex.org/G4935474317","display_name":null,"funder_award_id":"6000796","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"},{"id":"https://openalex.org/G527981196","display_name":null,"funder_award_id":"9220103","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"},{"id":"https://openalex.org/G978262999","display_name":null,"funder_award_id":"9229109","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"}],"funders":[{"id":"https://openalex.org/F4320309893","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23"},{"id":"https://openalex.org/F4320321592","display_name":"Research Grants Council, University Grants Committee","ror":"https://ror.org/00djwmt25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2138779671","https://openalex.org/W2601243251","https://openalex.org/W2795340004","https://openalex.org/W2895810692","https://openalex.org/W3095840026","https://openalex.org/W3158187846","https://openalex.org/W4211208325","https://openalex.org/W4378574344","https://openalex.org/W4378696973","https://openalex.org/W4384345672","https://openalex.org/W4387435361","https://openalex.org/W4394745212","https://openalex.org/W4400583111","https://openalex.org/W4409357852","https://openalex.org/W4411450161","https://openalex.org/W4413294151","https://openalex.org/W7084123161"],"related_works":[],"abstract_inverted_index":{"<b>Context:":[0],"</b>Log":[1],"anomaly":[2,47,74,213,229],"detection":[3,75,214],"is":[4],"critical":[5,129],"for":[6,69,115,211,226,258],"maintaining":[7,187],"the":[8,34,43,110],"security,":[9],"stability,":[10],"and":[11,23,42,53,71,78,121,128,142,162,205,223,237,247,263],"operational":[12],"efficiency":[13],"of":[14,36,45,199],"modern":[15],"software":[16,260],"systems,":[17],"especially":[18],"as":[19],"they":[20],"generate":[21],"vast":[22],"diverse":[24,77,191],"log":[25,38,73,104,132,192,228,251],"data.":[26],"However,":[27],"existing":[28],"deep":[29],"learning":[30],"models":[31],"struggle":[32],"with":[33,87,119,194],"challenges":[35,232],"heterogeneous":[37,146],"formats":[39],"across":[40,190],"systems":[41,105,252],"scarcity":[44],"labeled":[46,140],"logs,":[48],"limiting":[49],"their":[50],"real-world":[51,227],"deployment":[52],"generalization":[54,242],"capabilities.":[55],"<br/><b>Objective:":[56],"</b>To":[57],"address":[58,93],"these":[59],"challenges,":[60],"we":[61],"propose":[62],"LogMeta,":[63],"a":[64,88,168,221,255],"novel":[65],"semi-supervised":[66],"framework":[67],"designed":[68],"adaptive":[70],"efficient":[72],"in":[76,145,171,215],"low-resource":[79,174],"environments.":[80,147],"<br/><b>Method:":[81],"</b>LogMeta":[82,219],"integrates":[83],"Model-Agnostic":[84],"Meta-Learning":[85],"(MAML)":[86],"hybrid":[89,111],"language":[90],"model":[91,112],"to":[92,99,102,124,167,177,234,249],"key":[94],"challenges.":[95],"MAML":[96],"enables":[97],"LogMeta":[98,157,181,201],"rapidly":[100],"adapt":[101],"unseen":[103],"using":[106],"few-shot":[107],"samples,":[108],"while":[109],"combines":[113],"RoBERTa":[114],"extracting":[116],"semantic":[117],"representations":[118],"Bi-LSTM":[120],"attention":[122],"mechanisms":[123],"capture":[125],"sequential":[126],"dependencies":[127],"features":[130],"within":[131],"sequences.":[133],"This":[134],"design":[135],"reduces":[136],"reliance":[137],"on":[138,151],"large-scale":[139,216],"datasets":[141,154,193],"enhances":[143],"adaptability":[144,248],"<br/><b>Results:":[148],"</b>Experimental":[149],"evaluations":[150],"multiple":[152],"benchmark":[153],"demonstrate":[155],"that":[156],"consistently":[158],"outperforms":[159],"state-of-the-art":[160],"supervised":[161],"unsupervised":[163],"methods,":[164],"achieving":[165],"up":[166],"28.3%":[169],"improvement":[170],"F1-scores":[172],"under":[173],"scenarios":[175],"compared":[176],"other":[178],"models.":[179],"Furthermore,":[180],"exhibits":[182],"exceptional":[183],"domain":[184],"transfer":[185],"capabilities,":[186,243],"robust":[188],"performance":[189],"minimal":[195,244],"fine-tuning.":[196],"In":[197],"terms":[198],"efficiency,":[200],"achieves":[202],"competitive":[203],"training":[204],"inference":[206],"times,":[207],"making":[208],"it":[209,254],"suitable":[210],"real-time":[212],"systems.":[217],"<br/><b>Conclusion:":[218],"provides":[220],"scalable":[222],"practical":[224],"solution":[225],"detection,":[230],"overcoming":[231],"related":[233],"data":[235],"heterogeneity":[236],"label":[238],"scarcity.":[239],"Its":[240],"strong":[241],"supervision":[245],"requirements,":[246],"new":[250],"make":[253],"promising":[256],"tool":[257],"enhancing":[259],"system":[261],"reliability":[262],"security.":[264],"<br/>\u00a9":[265],"2026":[266],"The":[267],"Author(s).":[268]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-05-01T08:36:08.643496","created_date":"2026-01-09T00:00:00"}
