{"id":"https://openalex.org/W4409797280","doi":"https://doi.org/10.1109/apsec65559.2024.00051","title":"Large Language Models Empowered Online Log Anomaly Detection in AIOps","display_name":"Large Language Models Empowered Online Log Anomaly Detection in AIOps","publication_year":2024,"publication_date":"2024-12-03","ids":{"openalex":"https://openalex.org/W4409797280","doi":"https://doi.org/10.1109/apsec65559.2024.00051"},"language":"en","primary_location":{"id":"doi:10.1109/apsec65559.2024.00051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec65559.2024.00051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 31st Asia-Pacific Software Engineering Conference (APSEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040897754","display_name":"Suqiong Zhang","orcid":"https://orcid.org/0000-0002-6365-0727"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Suqiong Zhang","raw_affiliation_strings":["Zhejiang Sci-Tech University,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Sci-Tech University,Hangzhou,China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052273729","display_name":"Dongyi Fan","orcid":"https://orcid.org/0009-0008-1345-6644"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongyi Fan","raw_affiliation_strings":["Zhejiang Sci-Tech University,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Sci-Tech University,Hangzhou,China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101410038","display_name":"Lili He","orcid":"https://orcid.org/0000-0002-9130-0900"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili He","raw_affiliation_strings":["Zhejiang Sci-Tech University,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Sci-Tech University,Hangzhou,China","institution_ids":["https://openalex.org/I1328775524"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040897754"],"corresponding_institution_ids":["https://openalex.org/I1328775524"],"apc_list":null,"apc_paid":null,"fwci":0.3316,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70550761,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"402","last_page":"411"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9377999901771545,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5871455669403076},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5279238224029541},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4668353796005249},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32853156328201294},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09738707542419434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5871455669403076},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5279238224029541},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4668353796005249},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32853156328201294},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09738707542419434},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsec65559.2024.00051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec65559.2024.00051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 31st Asia-Pacific Software Engineering Conference (APSEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2060422862","https://openalex.org/W2107263349","https://openalex.org/W2754665629","https://openalex.org/W2767094836","https://openalex.org/W2942544869","https://openalex.org/W2944703101","https://openalex.org/W2965838158","https://openalex.org/W2970266365","https://openalex.org/W3199174176","https://openalex.org/W3205811065","https://openalex.org/W3217360625","https://openalex.org/W4206316563","https://openalex.org/W4226128225","https://openalex.org/W4281741287","https://openalex.org/W4319662928","https://openalex.org/W4384345635","https://openalex.org/W4385485508","https://openalex.org/W4388212317","https://openalex.org/W4389520222","https://openalex.org/W4398239377","https://openalex.org/W4404782032","https://openalex.org/W6778883912","https://openalex.org/W6809646742","https://openalex.org/W6846254642","https://openalex.org/W6846556436","https://openalex.org/W6850202480","https://openalex.org/W6850886341"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"AIOps":[0,131],"has":[1],"become":[2],"increasingly":[3],"crucial":[4],"in":[5,19,33,39,54,108],"managing":[6],"modern":[7],"IT":[8],"infrastructures,":[9],"leveraging":[10],"AI":[11],"techniques":[12],"to":[13,43,79,112,149],"enhance":[14],"operational":[15],"efficiency":[16,53],"and":[17,45,48,72,101,121,127],"reliability":[18],"log":[20,34,139],"anomaly":[21,35],"detection.":[22],"However,":[23],"existing":[24],"approaches,":[25],"such":[26],"as":[27],"Deeplog,":[28],"face":[29],"two":[30],"significant":[31],"challenges":[32],"detection:":[36],"frequent":[37],"changes":[38],"data":[40,117],"patterns":[41],"due":[42],"software":[44,152],"hardware":[46],"upgrades,":[47],"the":[49,91,95],"demand":[50],"for":[51,97,130,146],"high":[52,106],"online":[55,109,138],"scenarios.":[56,110],"To":[57],"address":[58],"these":[59],"issues,":[60],"we":[61,123],"propose":[62],"LogX,":[63],"a":[64,143],"novel":[65],"method":[66],"based":[67],"on":[68],"large":[69],"language":[70],"models":[71],"optimized":[73],"prompting":[74],"strategies,":[75],"particularly":[76],"interactive":[77],"modes,":[78],"promptly":[80],"correct":[81],"previously":[82],"unseen":[83],"errors.":[84],"By":[85],"integrating":[86],"input-label":[87],"pairs":[88],"directly":[89],"into":[90],"prompt,":[92],"LogX":[93],"eliminates":[94],"need":[96],"iterative":[98],"training":[99],"processes":[100,154],"additional":[102],"resource":[103],"costs,":[104],"ensuring":[105,119],"adaptability":[107],"Furthermore,":[111],"maintain":[113],"control":[114],"over":[115],"sensitive":[116],"while":[118],"privacy":[120],"security,":[122],"utilize":[124],"open-source":[125],"tools":[126],"on-premise":[128],"infrastructure":[129],"system.":[132],"It":[133],"seamlessly":[134],"integrates":[135],"with":[136],"LogX's":[137],"diagnostic":[140],"capabilities,":[141],"providing":[142],"robust":[144],"solution":[145],"companies":[147],"aiming":[148],"manage":[150],"their":[151],"maintenance":[153],"internally.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
