{"id":"https://openalex.org/W4411799670","doi":"https://doi.org/10.1109/tifs.2025.3583483","title":"SSDALog: Semi-Supervised Domain Adaptation for Incremental Log-Based Anomaly Detection","display_name":"SSDALog: Semi-Supervised Domain Adaptation for Incremental Log-Based Anomaly Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411799670","doi":"https://doi.org/10.1109/tifs.2025.3583483"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3583483","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3583483","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007279961","display_name":"Jiyu Tian","orcid":"https://orcid.org/0000-0001-5684-2571"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiyu Tian","raw_affiliation_strings":["School of Software, Dalian University of Technology, Dalian, China","School of Software Technology, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Software Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101931446","display_name":"Mingchu Li","orcid":"https://orcid.org/0000-0001-7969-6415"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]},{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingchu Li","raw_affiliation_strings":["School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, Jiangxi, China","School of Software Technology, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, Jiangxi, China","institution_ids":["https://openalex.org/I53592917"]},{"raw_affiliation_string":"School of Software Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100443536","display_name":"Liming Chen","orcid":"https://orcid.org/0000-0003-0200-7989"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Chen","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101861808","display_name":"Zumin Wang","orcid":"https://orcid.org/0000-0003-1194-8203"},"institutions":[{"id":"https://openalex.org/I4210092944","display_name":"Dalian University","ror":"https://ror.org/00g2ypp58","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092944"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zumin Wang","raw_affiliation_strings":["College of Information Engineering, Dalian University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Dalian University, Dalian, China","institution_ids":["https://openalex.org/I4210092944"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000961497","display_name":"Xiaoyu Nie","orcid":"https://orcid.org/0000-0003-3408-1630"},"institutions":[{"id":"https://openalex.org/I4210092944","display_name":"Dalian University","ror":"https://ror.org/00g2ypp58","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092944"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Nie","raw_affiliation_strings":["College of Information Engineering, Dalian University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Dalian University, Dalian, China","institution_ids":["https://openalex.org/I4210092944"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027494900","display_name":"Jing Qin","orcid":"https://orcid.org/0000-0003-0577-1755"},"institutions":[{"id":"https://openalex.org/I4210092944","display_name":"Dalian University","ror":"https://ror.org/00g2ypp58","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092944"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Qin","raw_affiliation_strings":["School of Software Engineering, Dalian University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Dalian University, Dalian, China","institution_ids":["https://openalex.org/I4210092944"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5007279961"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07388783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"6607","last_page":"6619"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9203000068664551,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7789591550827026},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6866739988327026},{"id":"https://openalex.org/keywords/domain-adaptation","display_name":"Domain adaptation","score":0.6325499415397644},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5515539050102234},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.453340083360672},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4397318363189697},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4238187372684479},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41688844561576843},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3686280846595764},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33486998081207275},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10644766688346863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789591550827026},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6866739988327026},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.6325499415397644},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5515539050102234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.453340083360672},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4397318363189697},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4238187372684479},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41688844561576843},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3686280846595764},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33486998081207275},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10644766688346863},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3583483","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3583483","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.4099999964237213}],"awards":[{"id":"https://openalex.org/G2336620882","display_name":null,"funder_award_id":"T2350710232","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5329985676","display_name":null,"funder_award_id":"DUT20GJ205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7907229962","display_name":null,"funder_award_id":"62466025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W2039157918","https://openalex.org/W2107263349","https://openalex.org/W2560021099","https://openalex.org/W2754665629","https://openalex.org/W2767094836","https://openalex.org/W2898998129","https://openalex.org/W2947815220","https://openalex.org/W2963999143","https://openalex.org/W2965838158","https://openalex.org/W2986381065","https://openalex.org/W2992308087","https://openalex.org/W3035510274","https://openalex.org/W3047074067","https://openalex.org/W3090066802","https://openalex.org/W3099780882","https://openalex.org/W3106895564","https://openalex.org/W3110080985","https://openalex.org/W3121951581","https://openalex.org/W3176602994","https://openalex.org/W3176720610","https://openalex.org/W3176969075","https://openalex.org/W3183619936","https://openalex.org/W3194768773","https://openalex.org/W3212722888","https://openalex.org/W4205965165","https://openalex.org/W4211008139","https://openalex.org/W4226128225","https://openalex.org/W4255845613","https://openalex.org/W4292968359","https://openalex.org/W4307823382","https://openalex.org/W4319993380","https://openalex.org/W4378647935","https://openalex.org/W4382119071","https://openalex.org/W4383750504","https://openalex.org/W4386076382","https://openalex.org/W4388483274","https://openalex.org/W4391558391","https://openalex.org/W4394745427","https://openalex.org/W6632550495","https://openalex.org/W6730559633","https://openalex.org/W6750366282","https://openalex.org/W6762913911","https://openalex.org/W6763165154","https://openalex.org/W6775960091","https://openalex.org/W6779447676","https://openalex.org/W6784038069","https://openalex.org/W6790312409","https://openalex.org/W6795445251","https://openalex.org/W6796844437","https://openalex.org/W6797001314","https://openalex.org/W6856828132"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4394775207","https://openalex.org/W4389474468"],"abstract_inverted_index":{"Log-based":[0],"anomaly":[1,78],"detection":[2,79,174],"(LAD)":[3],"is":[4],"one":[5],"of":[6,16,40,60,75,114,124,135,148,172,181],"the":[7,12,21,58,73,86,102,106,121,133,136,169,173,179,182,198],"dominant":[8],"approaches":[9,27],"to":[10,57,92,138,161],"improving":[11,168],"reliability":[13],"and":[14,98,145],"security":[15],"software":[17],"systems.":[18,205],"Presently,":[19],"despite":[20],"efficacy":[22,180],"demonstrated":[23],"by":[24,141],"state-of-the-art":[25],"LAD":[26,51,200],"in":[28,68],"processing":[29],"static":[30],"log":[31,41,61,77,125],"events,":[32],"their":[33],"performance":[34],"significantly":[35],"degrades":[36],"when":[37],"confronting":[38],"changes":[39],"event":[42],"types":[43],"from":[44],"system":[45],"updates.":[46],"To":[47],"construct":[48],"a":[49,65,115,163],"reliable":[50],"model":[52,87,137],"that":[53,194],"could":[54],"adapt":[55],"well":[56],"evolution":[59],"data,":[62],"we":[63],"propose":[64],"method":[66,196],"grounded":[67],"semi-supervised":[69,151],"domain":[70,152],"adaptation":[71,153],"on":[72,157],"rationale":[74],"incremental":[76,150],"dubbed":[80],"as":[81],"SSDALog,":[82],"which":[83,119],"dynamically":[84],"updates":[85],"utilizing":[88],"limited":[89],"labeled":[90],"samples":[91],"reconcile":[93],"distributional":[94],"shifts":[95],"between":[96],"evolving":[97,143,204],"historical":[99],"data.":[100],"Specifically,":[101],"proposed":[103],"approach":[104,184],"addresses":[105],"issue":[107],"through":[108,128],"two":[109,186],"primary":[110],"mechanisms:":[111],"(i)":[112],"creation":[113],"cross-domain":[116],"mixup":[117],"algorithm,":[118],"computes":[120],"feature":[122,165],"salience":[123],"discrete":[126],"sequences":[127],"occlusion":[129],"strategy,":[130],"thus":[131,167],"enhancing":[132],"adaptability":[134],"unknown":[139],"patterns":[140],"mixing":[142],"features;":[144],"(ii)":[146],"design":[147],"an":[149],"training":[154],"framework":[155],"based":[156],"noisy":[158],"label":[159],"learning":[160],"obtain":[162],"robust":[164],"extractor,":[166],"generalization":[170],"ability":[171],"model.":[175],"We":[176],"empirically":[177],"assess":[178],"SSDALog":[183],"across":[185],"publicly":[187],"available":[188],"datasets.":[189],"The":[190],"experimental":[191],"results":[192],"show":[193],"our":[195],"outperforms":[197],"SOTA":[199],"approach,":[201],"particularly":[202],"for":[203]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
