{"id":"https://openalex.org/W4416251915","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227209","title":"LogLLaMA: Transformer-based log anomaly detection with LLaMA","display_name":"LogLLaMA: Transformer-based log anomaly detection with LLaMA","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251915","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227209"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11227209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023011245","display_name":"Zhuoyi Yang","orcid":"https://orcid.org/0009-0008-7909-4930"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]},{"id":"https://openalex.org/I4210140791","display_name":"Irvine University","ror":"https://ror.org/04ysmca02","country_code":"US","type":"education","lineage":["https://openalex.org/I4210140791"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhuoyi Yang","raw_affiliation_strings":["University of California, Irvine,Irvine,CA,US"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine,Irvine,CA,US","institution_ids":["https://openalex.org/I204250578","https://openalex.org/I4210140791"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ian G. Harris","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]},{"id":"https://openalex.org/I4210140791","display_name":"Irvine University","ror":"https://ror.org/04ysmca02","country_code":"US","type":"education","lineage":["https://openalex.org/I4210140791"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ian G. Harris","raw_affiliation_strings":["University of California, Irvine,Irvine,CA,US"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine,Irvine,CA,US","institution_ids":["https://openalex.org/I204250578","https://openalex.org/I4210140791"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023011245"],"corresponding_institution_ids":["https://openalex.org/I204250578","https://openalex.org/I4210140791"],"apc_list":null,"apc_paid":null,"fwci":4.1556,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.947899,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.0010000000474974513,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7132999897003174},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5547999739646912},{"id":"https://openalex.org/keywords/log-log-plot","display_name":"Log-log plot","score":0.550000011920929},{"id":"https://openalex.org/keywords/binary-logarithm","display_name":"Binary logarithm","score":0.45750001072883606},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4036000072956085},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.3993000090122223},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.3912999927997589}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7132999897003174},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6650999784469604},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5547999739646912},{"id":"https://openalex.org/C195292467","wikidata":"https://www.wikidata.org/wiki/Q2091879","display_name":"Log-log plot","level":3,"score":0.550000011920929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49779999256134033},{"id":"https://openalex.org/C63553672","wikidata":"https://www.wikidata.org/wiki/Q581168","display_name":"Binary logarithm","level":2,"score":0.45750001072883606},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4036000072956085},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3993000090122223},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.3912999927997589},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3547999858856201},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.34929999709129333},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.28119999170303345},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.2759999930858612},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C104352257","wikidata":"https://www.wikidata.org/wiki/Q1238961","display_name":"Web log analysis software","level":5,"score":0.2712000012397766},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2671999931335449},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11227209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2039157918","https://openalex.org/W2107263349","https://openalex.org/W2119717200","https://openalex.org/W2132870739","https://openalex.org/W2296719434","https://openalex.org/W2560021099","https://openalex.org/W2754665629","https://openalex.org/W2767094836","https://openalex.org/W2965838158","https://openalex.org/W3083529589","https://openalex.org/W3092557781","https://openalex.org/W3199174176","https://openalex.org/W4296442240","https://openalex.org/W4385245566","https://openalex.org/W4391235307","https://openalex.org/W4392240262","https://openalex.org/W4399174497","https://openalex.org/W4402159050"],"related_works":[],"abstract_inverted_index":{"Log":[0],"anomaly":[1,27,110],"detection":[2,28,111],"refers":[3],"to":[4,34,65,90],"the":[5,9,71,106],"task":[6],"that":[7,50,103],"distinguishes":[8],"anomalous":[10,92],"log":[11,15,26,59,78,82,93],"messages":[12,60,79,94],"from":[13,61],"normal":[14,58],"messages.":[16,83],"Transformer-based":[17],"large":[18],"language":[19,39],"models":[20],"(LLMs)":[21],"are":[22],"becoming":[23],"popular":[24],"for":[25,109],"because":[29],"of":[30,75],"their":[31,67],"superb":[32],"ability":[33],"understand":[35],"complex":[36],"and":[37,115],"long":[38],"patterns.":[40,68],"In":[41],"this":[42],"paper,":[43],"we":[44],"propose":[45],"LogLLaMA,":[46],"a":[47],"novel":[48],"framework":[49],"leverages":[51],"LLaMA2.":[52],"LogLLaMA":[53,104],"is":[54,73,87],"first":[55],"finetuned":[56],"on":[57,112],"three":[62],"large-scale":[63],"datasets":[64],"learn":[66],"After":[69],"finetuning,":[70],"model":[72,86],"capable":[74],"generating":[76],"successive":[77],"given":[80],"previous":[81],"Our":[84],"generative":[85],"further":[88],"trained":[89],"identify":[91],"using":[95],"reinforcement":[96],"learning":[97],"(RL).":[98],"The":[99],"experimental":[100],"results":[101],"show":[102],"outperforms":[105],"state-of-the-art":[107],"approaches":[108],"BGL,":[113],"Thunderbird,":[114],"HDFS":[116],"datasets.":[117]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-14T00:00:00"}
