{"id":"https://openalex.org/W7124455170","doi":"https://doi.org/10.1109/tnse.2026.3654089","title":"Log Anomaly Detection via Transformers Pre-Trained on Massive Unlabeled Data","display_name":"Log Anomaly Detection via Transformers Pre-Trained on Massive Unlabeled Data","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124455170","doi":"https://doi.org/10.1109/tnse.2026.3654089"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2026.3654089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3654089","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006983806","display_name":"Senming Yan","orcid":"https://orcid.org/0000-0001-8748-368X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Senming Yan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024562387","display_name":"Lei Shi","orcid":"https://orcid.org/0000-0003-1628-1559"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Shi","raw_affiliation_strings":["School of Integrated Circuits (School of Electronic Information and Electrical Engineering), Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits (School of Electronic Information and Electrical Engineering), Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101417689","display_name":"Jing Ren","orcid":"https://orcid.org/0000-0002-9523-5210"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Ren","raw_affiliation_strings":["Department of Strategic and Advanced Interdisciplinary Research, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Strategic and Advanced Interdisciplinary Research, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123210808","display_name":"Wei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Department of Strategic and Advanced Interdisciplinary Research, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Strategic and Advanced Interdisciplinary Research, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123234921","display_name":"Limin Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123198497","display_name":"Wei Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wei Zhang","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006983806"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11700498,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"5943","last_page":"5960"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.005400000140070915,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7078999876976013},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6298999786376953},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6061000227928162},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.45739999413490295},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.3898000121116638},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3652999997138977},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.34709998965263367},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.323199987411499}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7623999714851379},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7078999876976013},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6820999979972839},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6298999786376953},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6061000227928162},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.3898000121116638},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3831000030040741},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.34709998965263367},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.323199987411499},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3122999966144562},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.302700012922287},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C175309249","wikidata":"https://www.wikidata.org/wiki/Q725864","display_name":"Pipeline transport","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2026.3654089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3654089","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W753847829","https://openalex.org/W2027380800","https://openalex.org/W2064675550","https://openalex.org/W2107263349","https://openalex.org/W2114554028","https://openalex.org/W2154091998","https://openalex.org/W2296719434","https://openalex.org/W2536393303","https://openalex.org/W2560021099","https://openalex.org/W2583874385","https://openalex.org/W2743138268","https://openalex.org/W2754665629","https://openalex.org/W2767094836","https://openalex.org/W2895810692","https://openalex.org/W2896457183","https://openalex.org/W2898998129","https://openalex.org/W2963999143","https://openalex.org/W2964082701","https://openalex.org/W2965838158","https://openalex.org/W2984100107","https://openalex.org/W2998409251","https://openalex.org/W3012496643","https://openalex.org/W3034368386","https://openalex.org/W3035404611","https://openalex.org/W3048896729","https://openalex.org/W3094502228","https://openalex.org/W3095840026","https://openalex.org/W3099780882","https://openalex.org/W3132998919","https://openalex.org/W3173451065","https://openalex.org/W3183619936","https://openalex.org/W3185152627","https://openalex.org/W3187309050","https://openalex.org/W3196864331","https://openalex.org/W3198845989","https://openalex.org/W3199174176","https://openalex.org/W3210131940","https://openalex.org/W3212722888","https://openalex.org/W4205173404","https://openalex.org/W4205965165","https://openalex.org/W4206238429","https://openalex.org/W4312340546","https://openalex.org/W4313156423","https://openalex.org/W4323545743","https://openalex.org/W4376288669","https://openalex.org/W4378647935","https://openalex.org/W4385245566","https://openalex.org/W4391096001","https://openalex.org/W4391235307","https://openalex.org/W4391514872","https://openalex.org/W4393158805","https://openalex.org/W4396877761","https://openalex.org/W4400266743","https://openalex.org/W4400583065","https://openalex.org/W4402159050","https://openalex.org/W4402263242","https://openalex.org/W4402351853","https://openalex.org/W4402742611","https://openalex.org/W4405787870","https://openalex.org/W4406011761","https://openalex.org/W4406011829","https://openalex.org/W4406302454","https://openalex.org/W4408568331","https://openalex.org/W4409102261","https://openalex.org/W4411336764","https://openalex.org/W4411552468","https://openalex.org/W4412086250","https://openalex.org/W4414322240"],"related_works":[],"abstract_inverted_index":{"Cyber":[0],"attacks":[1],"pose":[2],"serious":[3],"threats":[4],"to":[5,76,101,137,172],"computer":[6],"systems.":[7],"Automatically":[8],"detecting":[9],"anomalous":[10],"patterns":[11],"in":[12,88,157,199],"system":[13],"logs":[14,32],"is":[15,93,178],"critical":[16],"for":[17,52,61,120],"identifying":[18],"and":[19,30,49,55,63,109,146],"mitigating":[20],"security":[21],"risks.":[22],"However,":[23],"as":[24],"log":[25,53,65,73,122],"data":[26,177],"grows":[27],"increasingly":[28],"complex":[29],"labeled":[31,176],"remain":[33],"scarce,":[34],"existing":[35],"detection":[36],"methods":[37],"face":[38],"significant":[39],"challenges.":[40],"To":[41,106],"address":[42],"these":[43],"issues,":[44],"we":[45,69,112],"introduce":[46],"the":[47,85,103,127,143,186],"pre-training":[48],"fine-tuning":[50],"paradigm":[51],"analysis":[54],"propose":[56],"a":[57,71,78,115,163],"hybrid":[58],"pipeline":[59],"tailored":[60,119],"accurate":[62],"low-cost":[64],"anomaly":[66,104,123],"detection.":[67],"Specifically,":[68],"employ":[70],"masked":[72],"reconstruction":[74],"strategy":[75],"pre-train":[77],"Transformer":[79],"encoder-based":[80],"foundation":[81],"model":[82,92],"by":[83],"leveraging":[84],"sequential":[86],"dependencies":[87],"unlabeled":[89],"logs.":[90],"The":[91],"then":[94],"fine-tuned":[95],"on":[96,142,162],"an":[97],"event":[98],"prediction":[99],"task":[100],"derive":[102],"detector.":[105],"reduce":[107],"computational":[108],"storage":[110],"overhead,":[111,195],"further":[113],"design":[114],"knowledge":[116,183],"distillation":[117,184],"method":[118,131],"compressing":[121],"detectors.":[124],"Beyond":[125],"fitting":[126],"detector's":[128],"outputs,":[129],"our":[130,152,182],"also":[132],"exploits":[133],"its":[134],"internal":[135],"representations":[136],"transfer":[138],"richer":[139],"knowledge.":[140],"Experiments":[141],"HDFS,":[144],"BGL,":[145],"Thunderbird":[147],"public":[148],"datasets":[149],"demonstrate":[150],"that":[151,168],"framework":[153],"outperforms":[154],"state-of-the-art":[155],"baselines":[156],"multiple":[158],"metrics.":[159],"Empirical":[160],"evaluation":[161],"reconstructed":[164],"HDFS":[165],"dataset":[166],"confirms":[167],"it":[169],"can":[170],"adapt":[171],"real-world":[173,200],"scenarios":[174],"where":[175],"scarce.":[179],"Moreover,":[180],"through":[181],"approach,":[185],"lightweight":[187],"detectors":[188],"achieve":[189],"outstanding":[190],"performance":[191],"with":[192],"substantially":[193],"lower":[194],"while":[196],"maintaining":[197],"robustness":[198],"scenarios.":[201]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-17T00:00:00"}
