{"id":"https://openalex.org/W3199174176","doi":"https://doi.org/10.1109/ijcnn52387.2021.9534113","title":"LogBERT: Log Anomaly Detection via BERT","display_name":"LogBERT: Log Anomaly Detection via BERT","publication_year":2021,"publication_date":"2021-07-18","ids":{"openalex":"https://openalex.org/W3199174176","doi":"https://doi.org/10.1109/ijcnn52387.2021.9534113","mag":"3199174176"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn52387.2021.9534113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn52387.2021.9534113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039576446","display_name":"Haixuan Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haixuan Guo","raw_affiliation_strings":["Utah State University, UT"],"affiliations":[{"raw_affiliation_string":"Utah State University, UT","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080699291","display_name":"Shuhan Yuan","orcid":"https://orcid.org/0000-0001-6816-419X"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shuhan Yuan","raw_affiliation_strings":["Utah State University, UT"],"affiliations":[{"raw_affiliation_string":"Utah State University, UT","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008463509","display_name":"Xintao Wu","orcid":"https://orcid.org/0000-0002-2823-3063"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xintao Wu","raw_affiliation_strings":["University of Arkansas, Fayetteville, AR"],"affiliations":[{"raw_affiliation_string":"University of Arkansas, Fayetteville, AR","institution_ids":["https://openalex.org/I78715868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039576446"],"corresponding_institution_ids":["https://openalex.org/I121980950"],"apc_list":null,"apc_paid":null,"fwci":30.2465,"has_fulltext":false,"cited_by_count":321,"citation_normalized_percentile":{"value":0.99875618,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7866045832633972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.746623158454895},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5393938422203064},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4929776191711426},{"id":"https://openalex.org/keywords/hypersphere","display_name":"Hypersphere","score":0.4920179545879364},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47813642024993896},{"id":"https://openalex.org/keywords/minification","display_name":"Minification","score":0.42155390977859497},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.390774130821228},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34718579053878784}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7866045832633972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.746623158454895},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5393938422203064},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4929776191711426},{"id":"https://openalex.org/C2776562905","wikidata":"https://www.wikidata.org/wiki/Q306610","display_name":"Hypersphere","level":2,"score":0.4920179545879364},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47813642024993896},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.42155390977859497},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.390774130821228},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34718579053878784},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn52387.2021.9534113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn52387.2021.9534113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5600000023841858}],"awards":[{"id":"https://openalex.org/G3441588748","display_name":null,"funder_award_id":"1564250,1937010,2103829","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1540258466","https://openalex.org/W1990089904","https://openalex.org/W2039157918","https://openalex.org/W2053186076","https://openalex.org/W2096017373","https://openalex.org/W2107263349","https://openalex.org/W2114554028","https://openalex.org/W2122301654","https://openalex.org/W2132870739","https://openalex.org/W2159637520","https://openalex.org/W2296719434","https://openalex.org/W2401686019","https://openalex.org/W2560021099","https://openalex.org/W2585367509","https://openalex.org/W2754665629","https://openalex.org/W2767094836","https://openalex.org/W2803697594","https://openalex.org/W2896457183","https://openalex.org/W2947815220","https://openalex.org/W2963341956","https://openalex.org/W2963403868","https://openalex.org/W2965838158","https://openalex.org/W2986944522","https://openalex.org/W3049160591","https://openalex.org/W3169066865","https://openalex.org/W4385245566","https://openalex.org/W6632550495","https://openalex.org/W6683199847","https://openalex.org/W6712994927","https://openalex.org/W6739901393","https://openalex.org/W6751494907","https://openalex.org/W6782397432"],"related_works":["https://openalex.org/W2099702253","https://openalex.org/W2059484267","https://openalex.org/W1970780628","https://openalex.org/W2921850681","https://openalex.org/W942984284","https://openalex.org/W2069017679","https://openalex.org/W2133653616","https://openalex.org/W2079494444","https://openalex.org/W4389755575","https://openalex.org/W2466608391"],"abstract_inverted_index":{"Detecting":[0],"anomalous":[1],"events":[2],"in":[3],"online":[4],"computer":[5],"systems":[6,12],"is":[7,81],"crucial":[8],"to":[9,83],"protect":[10],"the":[11,57,85,96],"from":[13,52,100],"malicious":[14],"attacks":[15],"or":[16],"malfunctions.":[17],"System":[18],"logs,":[19],"which":[20],"record":[21],"detailed":[22],"information":[23],"of":[24,59,75,87],"computational":[25],"events,":[26],"are":[27],"widely":[28],"used":[29],"for":[30,43,116],"system":[31],"status":[32],"analysis.":[33],"In":[34],"this":[35],"paper,":[36],"we":[37],"propose":[38],"LogBERT,":[39],"a":[40],"self-supervised":[41,66],"framework":[42],"log":[44,61,70,89,108],"anomaly":[45,117],"detection":[46],"based":[47],"on":[48,106],"Bidirectional":[49],"Encoder":[50],"Representations":[51],"Transformers":[53],"(BERT).":[54],"LogBERT":[55,80,112],"learns":[56],"patterns":[58,86,98],"normal":[60,88],"sequences":[62,90],"by":[63],"two":[64],"novel":[65],"training":[67],"tasks,":[68],"masked":[69],"message":[71],"prediction":[72],"and":[73,91],"volume":[74],"hypersphere":[76],"minimization.":[77],"After":[78],"training,":[79],"able":[82],"capture":[84],"further":[92],"detect":[93],"anomalies":[94],"where":[95],"underlying":[97],"deviate":[99],"expected":[101],"patterns.":[102],"The":[103],"experimental":[104],"results":[105],"three":[107],"datasets":[109],"show":[110],"that":[111],"outperforms":[113],"state-of-the-art":[114],"approaches":[115],"detection.":[118]},"counts_by_year":[{"year":2026,"cited_by_count":24},{"year":2025,"cited_by_count":108},{"year":2024,"cited_by_count":80},{"year":2023,"cited_by_count":77},{"year":2022,"cited_by_count":25},{"year":2021,"cited_by_count":7}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
