{"id":"https://openalex.org/W4410553225","doi":"https://doi.org/10.1109/saner64311.2025.00049","title":"Cross-System Software Log-based Anomaly Detection Using Meta-Learning","display_name":"Cross-System Software Log-based Anomaly Detection Using Meta-Learning","publication_year":2025,"publication_date":"2025-03-04","ids":{"openalex":"https://openalex.org/W4410553225","doi":"https://doi.org/10.1109/saner64311.2025.00049"},"language":"en","primary_location":{"id":"doi:10.1109/saner64311.2025.00049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner64311.2025.00049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100461325","display_name":"Yuqing Wang","orcid":"https://orcid.org/0000-0002-0047-1748"},"institutions":[{"id":"https://openalex.org/I133731052","display_name":"University of Helsinki","ror":"https://ror.org/040af2s02","country_code":"FI","type":"education","lineage":["https://openalex.org/I133731052"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Yuqing Wang","raw_affiliation_strings":["University of Helsinki,Department of Computer Science,Helsinki,Finland"],"affiliations":[{"raw_affiliation_string":"University of Helsinki,Department of Computer Science,Helsinki,Finland","institution_ids":["https://openalex.org/I133731052"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078824435","display_name":"Mika M\u00e4ntyl\u00e4","orcid":"https://orcid.org/0000-0002-2841-5879"},"institutions":[{"id":"https://openalex.org/I133731052","display_name":"University of Helsinki","ror":"https://ror.org/040af2s02","country_code":"FI","type":"education","lineage":["https://openalex.org/I133731052"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Mika V. M\u00e4ntyl\u00e4","raw_affiliation_strings":["University of Helsinki,Department of Computer Science,Helsinki,Finland"],"affiliations":[{"raw_affiliation_string":"University of Helsinki,Department of Computer Science,Helsinki,Finland","institution_ids":["https://openalex.org/I133731052"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010229040","display_name":"Jesse Nyyss\u00f6l\u00e4","orcid":null},"institutions":[{"id":"https://openalex.org/I133731052","display_name":"University of Helsinki","ror":"https://ror.org/040af2s02","country_code":"FI","type":"education","lineage":["https://openalex.org/I133731052"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jesse Nyyss\u00f6l\u00e4","raw_affiliation_strings":["University of Helsinki,Department of Computer Science,Helsinki,Finland"],"affiliations":[{"raw_affiliation_string":"University of Helsinki,Department of Computer Science,Helsinki,Finland","institution_ids":["https://openalex.org/I133731052"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101821893","display_name":"Ke Ping","orcid":"https://orcid.org/0009-0002-0638-7931"},"institutions":[{"id":"https://openalex.org/I133731052","display_name":"University of Helsinki","ror":"https://ror.org/040af2s02","country_code":"FI","type":"education","lineage":["https://openalex.org/I133731052"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Ke Ping","raw_affiliation_strings":["University of Helsinki,Department of Computer Science,Helsinki,Finland"],"affiliations":[{"raw_affiliation_string":"University of Helsinki,Department of Computer Science,Helsinki,Finland","institution_ids":["https://openalex.org/I133731052"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100427869","display_name":"Liqiang Wang","orcid":"https://orcid.org/0000-0002-3998-7004"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liqiang Wang","raw_affiliation_strings":["University of Central Florida,Department of Computer Science,Orlando,United States"],"affiliations":[{"raw_affiliation_string":"University of Central Florida,Department of Computer Science,Orlando,United States","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100461325"],"corresponding_institution_ids":["https://openalex.org/I133731052"],"apc_list":null,"apc_paid":null,"fwci":4.6734,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93286799,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"454","last_page":"464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9715999960899353,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7107357382774353},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6777604818344116},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45825400948524475},{"id":"https://openalex.org/keywords/meta-learning","display_name":"Meta learning (computer science)","score":0.43820756673812866},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4327419400215149},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3679198622703552},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3651491403579712},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1630251109600067},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.125004380941391},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.08580490946769714}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7107357382774353},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6777604818344116},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45825400948524475},{"id":"https://openalex.org/C2781002164","wikidata":"https://www.wikidata.org/wiki/Q6822311","display_name":"Meta learning (computer science)","level":3,"score":0.43820756673812866},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4327419400215149},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3679198622703552},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3651491403579712},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1630251109600067},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.125004380941391},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.08580490946769714},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saner64311.2025.00049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner64311.2025.00049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1985236007","https://openalex.org/W2064675550","https://openalex.org/W2102632804","https://openalex.org/W2107263349","https://openalex.org/W2560021099","https://openalex.org/W2626180518","https://openalex.org/W2754665629","https://openalex.org/W2903799441","https://openalex.org/W2947815220","https://openalex.org/W3099780882","https://openalex.org/W3100214273","https://openalex.org/W3198845989","https://openalex.org/W3210131940","https://openalex.org/W3216171905","https://openalex.org/W4205965165","https://openalex.org/W4226128225","https://openalex.org/W4255845613","https://openalex.org/W4319990463","https://openalex.org/W4388212317","https://openalex.org/W4394745427","https://openalex.org/W4394841363","https://openalex.org/W4400582506","https://openalex.org/W4400583065","https://openalex.org/W4400681092","https://openalex.org/W6712994927","https://openalex.org/W6736057607","https://openalex.org/W6797636097","https://openalex.org/W6863620572"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Modern":[0],"software":[1,35,262],"systems":[2,106,123,166,217],"produce":[3],"vast":[4],"amounts":[5],"of":[6,30,90,140,160,181,191,261],"logs,":[7],"serving":[8],"as":[9,208],"an":[10,65],"essential":[11],"resource":[12],"for":[13,18,34,68,95,130,235,251],"anomaly":[14,32,71,132,233,254],"detection.":[15,133],"Artificial":[16],"Intelligence":[17],"IT":[19],"Operations":[20],"(AIOps)":[21],"tools":[22],"have":[23],"been":[24],"developed":[25],"to":[26,85,114,121,167,215],"automate":[27],"the":[28,157,188,192],"process":[29],"log-based":[31],"detection":[33,234,255],"systems.":[36,58,238,263],"Three":[37],"practical":[38],"challenges":[39],"are":[40],"widely":[41,175],"recognized":[42],"in":[43,51,194,256],"this":[44,60],"field:":[45],"data":[46],"labeling":[47],"costs,":[48],"evolving":[49,189],"logs":[50,91,110,193],"dynamic":[52],"systems,":[53,210],"and":[54,92,117,149,169,206,219,248,258],"adaptability":[55],"across":[56,177],"different":[57],"In":[59],"paper,":[61],"we":[62],"propose":[63],"CroSysLog,":[64],"AIOps":[66],"tool":[67,250],"log-event":[69,252],"level":[70,253],"detection,":[72],"considering":[73],"these":[74,165,236],"challenges.":[75],"Following":[76],"prior":[77],"approaches,":[78],"CroSysLog":[79,100,136,203,211,243],"uses":[80],"a":[81,87,125,178,222,245],"neural":[82],"representation":[83],"approach":[84],"gain":[86],"nuanced":[88],"understanding":[89],"generate":[93],"representations":[94],"individual":[96],"log":[97,128,154,162,184,225],"events":[98,129,226],"accordingly.":[99],"can":[101,212],"be":[102],"trained":[103],"on":[104,204],"source":[105,209],"with":[107,124],"sufficient":[108],"labeled":[109,127,224],"from":[111,164,227],"open":[112,138],"datasets":[113,139],"achieve":[115],"robustness,":[116],"then":[118],"efficiently":[119,213],"adapt":[120,214],"target":[122,216,229,237],"few":[126,223],"effective":[131],"We":[134,151],"evaluate":[135,170],"using":[137,221],"four":[141],"large-scale":[142],"distributed":[143,176],"supercomputing":[144],"systems:":[145],"BGL,":[146],"Thunderbird,":[147],"Liberty,":[148],"Spirit.":[150],"used":[152],"random":[153],"splits,":[155],"maintaining":[156],"chronological":[158],"order":[159],"consecutive":[161],"events,":[163],"train":[168],"CroSysLog.":[171],"These":[172],"splits":[173],"were":[174],"one/two-year":[179],"span":[180],"each":[182,195,228],"system's":[183],"collection":[185],"duration,":[186],"capturing":[187],"nature":[190],"system.":[196],"Our":[197],"results":[198,240],"show":[199],"that,":[200],"after":[201],"training":[202],"Liberty":[205],"BGL":[207],"Thunderbird":[218],"Spirit":[220],"system,":[230],"effectively":[231],"performing":[232],"The":[239],"demonstrate":[241],"that":[242],"is":[244],"practical,":[246],"scalable,":[247],"adaptable":[249],"operational":[257],"maintenance":[259],"contexts":[260]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
