{"id":"https://openalex.org/W4415744212","doi":"https://doi.org/10.1109/qrs-c65679.2025.00103","title":"A Novel Semi-Supervised Model for Generalizing Log Anomaly Detection with Limited Labeled Data","display_name":"A Novel Semi-Supervised Model for Generalizing Log Anomaly Detection with Limited Labeled Data","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744212","doi":"https://doi.org/10.1109/qrs-c65679.2025.00103"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00103","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00103","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084575196","display_name":"Yicheng Sun","orcid":"https://orcid.org/0009-0007-6555-0571"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yicheng Sun","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science,China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science,China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051403641","display_name":"Jacky Keung","orcid":"https://orcid.org/0000-0002-3803-9600"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jacky Keung","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science,China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science,China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021693730","display_name":"Zhen Yang","orcid":"https://orcid.org/0000-0003-0670-4538"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["Shandong University,School of Computer Science and Technology,Qingdao,China"],"affiliations":[{"raw_affiliation_string":"Shandong University,School of Computer Science and Technology,Qingdao,China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030830752","display_name":"Shuo Liu","orcid":"https://orcid.org/0000-0002-8877-3678"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shuo Liu","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science,China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science,China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":null,"display_name":"Wing Kwong Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wing Kwong Chan","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science,China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science,China","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5084575196"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35859252,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"775","last_page":"776"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":9.999999747378752e-05,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":9.999999747378752e-05,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7709000110626221},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6140999794006348},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5304999947547913},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5134000182151794},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.5044999718666077},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4431000053882599},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.3959999978542328},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.39579999446868896}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7709000110626221},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6333000063896179},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6140999794006348},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5715000033378601},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5304999947547913},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5134000182151794},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.5044999718666077},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4431000053882599},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.3959999978542328},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.39579999446868896},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.3734999895095825},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.3508000075817108},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.3407000005245209},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.33660000562667847},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31119999289512634},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30809998512268066},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C63553672","wikidata":"https://www.wikidata.org/wiki/Q581168","display_name":"Binary logarithm","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00103","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00103","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W3096831136","https://openalex.org/W4226128225","https://openalex.org/W4284692184","https://openalex.org/W4388212317","https://openalex.org/W4400583111","https://openalex.org/W4409357852"],"related_works":[],"abstract_inverted_index":{"Log":[0],"anomaly":[1,42,56,124],"detection":[2,43,125],"is":[3],"critical":[4],"for":[5,55,76,122],"ensuring":[6],"the":[7,104],"reliability":[8],"and":[9,35,58,99,109,116],"stability":[10],"of":[11,73],"large-scale":[12],"distributed":[13],"systems":[14],"by":[15],"identifying":[16],"unusual":[17],"patterns":[18],"in":[19,67,126],"system":[20,97],"logs.":[21],"However,":[22],"existing":[23],"methods":[24],"often":[25],"fail":[26],"to":[27,63,82,89],"generalize":[28,90],"across":[29,92],"diverse":[30,93],"datasets,":[31],"hindering":[32],"their":[33],"scalability":[34],"robustness.":[36],"This":[37],"paper":[38],"proposes":[39],"a":[40,119],"novel":[41],"model":[44,79],"that":[45],"integrates":[46],"an":[47],"LLM-based":[48],"log":[49,68,85,100,123],"parser,":[50],"Generative":[51],"Adversarial":[52],"Networks":[53],"(GANs)":[54],"detection,":[57],"Permutation":[59],"Event":[60],"Modeling":[61],"(PEM)":[62],"capture":[64],"temporal":[65],"dependencies":[66],"events,":[69],"using":[70],"only":[71],"5%":[72],"labeled":[74,107],"logs":[75],"training.":[77],"Our":[78],"leverages":[80],"GANs":[81],"generate":[83],"synthetic":[84],"data,":[86],"enabling":[87],"it":[88],"effectively":[91],"datasets":[94],"with":[95],"varying":[96],"architectures":[98],"formats.":[101],"By":[102],"reducing":[103],"reliance":[105],"on":[106],"data":[108],"enhancing":[110],"generalization,":[111],"our":[112],"approach":[113],"improves":[114],"performance":[115],"scalability,":[117],"offering":[118],"robust":[120],"solution":[121],"dynamic":[127],"environments.":[128]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-31T00:00:00"}
