{"id":"https://openalex.org/W7124170655","doi":"https://doi.org/10.1109/icpads67057.2025.11322907","title":"LINEADAPTER: Parameter-Efficient Fine-Tuning for Log Anomaly Detection and Root Cause Analysis","display_name":"LINEADAPTER: Parameter-Efficient Fine-Tuning for Log Anomaly Detection and Root Cause Analysis","publication_year":2025,"publication_date":"2025-12-14","ids":{"openalex":"https://openalex.org/W7124170655","doi":"https://doi.org/10.1109/icpads67057.2025.11322907"},"language":null,"primary_location":{"id":"doi:10.1109/icpads67057.2025.11322907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads67057.2025.11322907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004967641","display_name":"Xinyuan Liu","orcid":"https://orcid.org/0009-0002-3407-7703"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Xinyuan Liu","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122997102","display_name":"Wenhao Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Wenhao Bao","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423548","display_name":"Yumin Zhang","orcid":"https://orcid.org/0000-0003-0767-1221"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yumin Zhang","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010422853","display_name":"Yinhao Li","orcid":"https://orcid.org/0000-0001-6846-9161"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yinhao Li","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123043086","display_name":"Rajiv Ranjan","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rajiv Ranjan","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123048341","display_name":"Devki Nandan Jha","orcid":null},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Devki Nandan Jha","raw_affiliation_strings":["School of Computing, Newcastle University,Newcastle upon Tyne,UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University,Newcastle upon Tyne,UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004967641"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72215622,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.00039999998989515007,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6779999732971191},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5059999823570251},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.489300012588501},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.43950000405311584},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.42739999294281006},{"id":"https://openalex.org/keywords/domain-adaptation","display_name":"Domain adaptation","score":0.4189000129699707},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.40459999442100525},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.38370001316070557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.70169997215271},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6779999732971191},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5059999823570251},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.489300012588501},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4745999872684479},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.43950000405311584},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.42739999294281006},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.4189000129699707},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.40459999442100525},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.38370001316070557},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.38370001316070557},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3702999949455261},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3644999861717224},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36059999465942383},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35690000653266907},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31290000677108765},{"id":"https://openalex.org/C130963320","wikidata":"https://www.wikidata.org/wiki/Q1401207","display_name":"Root cause analysis","level":2,"score":0.3021000027656555},{"id":"https://openalex.org/C177284502","wikidata":"https://www.wikidata.org/wiki/Q1005390","display_name":"Adapter (computing)","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.28450000286102295},{"id":"https://openalex.org/C63553672","wikidata":"https://www.wikidata.org/wiki/Q581168","display_name":"Binary logarithm","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C117884012","wikidata":"https://www.wikidata.org/wiki/Q94489","display_name":"n-gram","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.25529998540878296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpads67057.2025.11322907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads67057.2025.11322907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2039157918","https://openalex.org/W2107263349","https://openalex.org/W2754665629","https://openalex.org/W2909880748","https://openalex.org/W2963999143","https://openalex.org/W2999561215","https://openalex.org/W3013888836","https://openalex.org/W3155949183","https://openalex.org/W4286697486","https://openalex.org/W4372338130","https://openalex.org/W4380485520","https://openalex.org/W4385621806","https://openalex.org/W4391558097","https://openalex.org/W4391783445","https://openalex.org/W4393141466","https://openalex.org/W4394745212","https://openalex.org/W4400583065","https://openalex.org/W4400681092","https://openalex.org/W4404782964","https://openalex.org/W4404953656","https://openalex.org/W4409494030","https://openalex.org/W4411306042","https://openalex.org/W4411987799"],"related_works":[],"abstract_inverted_index":{"The":[0],"growing":[1],"scale":[2,43],"and":[3,22,28,48,81,106,122,146,203,213,227],"complexity":[4],"of":[5,14,112],"distributed":[6],"systems":[7],"such":[8,76],"as":[9,57,77,223],"Hadoop":[10],"produce":[11],"massive":[12],"volumes":[13],"complex":[15],"log":[16,62,93,143,195],"data,":[17],"making":[18],"automated":[19],"anomaly":[20,144,232],"detection":[21,145],"root":[23,147],"cause":[24,148],"analysis":[25,94],"both":[26],"essential":[27],"increasingly":[29],"challenging.":[30],"Traditional":[31],"rule-based":[32,204],"approaches,":[33],"relying":[34],"on":[35,119,191,218],"static":[36],"thresholds":[37],"or":[38],"manual":[39],"heuristics,":[40],"struggle":[41],"to":[42,45,92,155,171,174],"due":[44],"limited":[46,114],"adaptability":[47],"high":[49,104],"maintenance":[50],"costs.":[51],"Transformer-based":[52],"language":[53],"models":[54],"have":[55,85],"emerged":[56],"powerful":[58],"tools":[59],"for":[60,140,230],"modelling":[61],"sequences":[63],"by":[64,158],"capturing":[65],"contextual":[66],"patterns.":[67],"To":[68,128],"enable":[69],"efficient":[70],"adaptation":[71],"with":[72,95,177,200],"fewer":[73],"parameters,":[74],"techniques":[75],"In-Context":[78],"Learning":[79],"(ICL)":[80],"Low-Rank":[82],"Adaptation":[83],"(LoRA)":[84],"been":[86],"proposed.":[87],"However,":[88],"applying":[89],"these":[90,130],"methods":[91],"Small":[96],"Language":[97],"Models":[98],"(SLMs)":[99],"introduces":[100],"several":[101],"challenges,":[102],"including":[103],"memory":[105],"computational":[107,179],"overhead":[108],"(in":[109],"the":[110,183],"case":[111],"ICL),":[113],"fine-tuning":[115,137],"capacity":[116],"(with":[117],"LoRA":[118],"smaller":[120],"models),":[121],"poor":[123],"generalisation":[124],"across":[125],"heterogeneous":[126],"environments.":[127],"address":[129],"limitations,":[131],"we":[132],"propose":[133],"Lineadapter,":[134],"a":[135,224],"parameter-efficient":[136],"framework":[138],"tailored":[139],"SLMs":[141,170],"in":[142],"analysis.":[149],"Lineadapter":[150,209],"extends":[151],"convolutional":[152,162],"adapter":[153],"principles":[154],"sequential":[156],"data":[157],"integrating":[159],"lightweight":[160],"1D":[161],"layers":[163],"within":[164],"transformer":[165],"blocks.":[166],"This":[167],"design":[168],"enables":[169],"adapt":[172],"effectively":[173],"log-specific":[175],"patterns":[176],"minimal":[178],"cost,":[180],"while":[181],"preserving":[182],"backbone":[184],"model's":[185],"representational":[186],"power.":[187],"We":[188],"evaluate":[189],"LINEADAPTER":[190],"multiple":[192],"real-world":[193],"system":[194],"datasets,":[196],"comparing":[197],"its":[198],"performance":[199],"ICL,":[201],"LoRA,":[202],"baselines.":[205],"Results":[206],"show":[207],"that":[208],"achieves":[210],"higher":[211],"F1-scores":[212],"better":[214],"precision-recall":[215],"trade-offs,":[216],"particularly":[217],"medium-scale":[219],"models,":[220],"establishing":[221],"it":[222],"scalable,":[225],"robust,":[226],"practical":[228],"solution":[229],"log-based":[231],"detection.":[233]},"counts_by_year":[],"updated_date":"2026-01-16T23:16:36.188383","created_date":"2026-01-15T00:00:00"}
