{"id":"https://openalex.org/W4313563765","doi":"https://doi.org/10.1145/3551349.3556904","title":"Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems","display_name":"Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4313563765","doi":"https://doi.org/10.1145/3551349.3556904"},"language":"en","primary_location":{"id":"doi:10.1145/3551349.3556904","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3551349.3556904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100669271","display_name":"Zilong He","orcid":"https://orcid.org/0000-0001-7963-082X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zilong He","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335060","display_name":"Pengfei Chen","orcid":"https://orcid.org/0000-0003-0972-6900"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037451526","display_name":"Yu Luo","orcid":"https://orcid.org/0009-0005-5766-5913"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Luo","raw_affiliation_strings":["Tencent Inc., China"],"affiliations":[{"raw_affiliation_string":"Tencent Inc., China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065807779","display_name":"Qiuyu Yan","orcid":"https://orcid.org/0009-0009-9667-9276"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuyu Yan","raw_affiliation_strings":["Tencent Inc., China"],"affiliations":[{"raw_affiliation_string":"Tencent Inc., China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075637613","display_name":"Hongyang Chen","orcid":"https://orcid.org/0000-0002-9419-3768"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyang Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075077822","display_name":"Guangba Yu","orcid":"https://orcid.org/0000-0001-6195-9088"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangba Yu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100742425","display_name":"Fangyuan Li","orcid":"https://orcid.org/0000-0001-6799-1310"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangyuan Li","raw_affiliation_strings":["Tencent Inc., China"],"affiliations":[{"raw_affiliation_string":"Tencent Inc., China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100669271"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":1.4274,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.82980818,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8188878893852234},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48325568437576294},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.454562246799469},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.4253028631210327},{"id":"https://openalex.org/keywords/online-algorithm","display_name":"Online algorithm","score":0.41973063349723816},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4154314398765564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38408362865448},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3558157682418823},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33820030093193054},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3017776608467102},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24510478973388672},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1508539915084839}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8188878893852234},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48325568437576294},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.454562246799469},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.4253028631210327},{"id":"https://openalex.org/C196921405","wikidata":"https://www.wikidata.org/wiki/Q786431","display_name":"Online algorithm","level":2,"score":0.41973063349723816},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4154314398765564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38408362865448},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3558157682418823},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33820030093193054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3017776608467102},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24510478973388672},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1508539915084839}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3551349.3556904","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3551349.3556904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1678356000","https://openalex.org/W1973166106","https://openalex.org/W2004641051","https://openalex.org/W2049298676","https://openalex.org/W2074453851","https://openalex.org/W2093606067","https://openalex.org/W2122111042","https://openalex.org/W2163687466","https://openalex.org/W2295598076","https://openalex.org/W2391120767","https://openalex.org/W2401686019","https://openalex.org/W2513041336","https://openalex.org/W2521200999","https://openalex.org/W2743617586","https://openalex.org/W2785362611","https://openalex.org/W2883560233","https://openalex.org/W2884697754","https://openalex.org/W2888639043","https://openalex.org/W2903799441","https://openalex.org/W2911666282","https://openalex.org/W2942544869","https://openalex.org/W2948517885","https://openalex.org/W2966971704","https://openalex.org/W2999561215","https://openalex.org/W3000445396","https://openalex.org/W3006243790","https://openalex.org/W3012644936","https://openalex.org/W3047008933","https://openalex.org/W3098957257","https://openalex.org/W3099845770","https://openalex.org/W3103539622","https://openalex.org/W3105931142","https://openalex.org/W3155331679","https://openalex.org/W3161254931","https://openalex.org/W3163635305","https://openalex.org/W3195057108","https://openalex.org/W4293713156","https://openalex.org/W4299689471","https://openalex.org/W6610017368"],"related_works":["https://openalex.org/W2787993192","https://openalex.org/W2582295320","https://openalex.org/W2060809589","https://openalex.org/W3109786615","https://openalex.org/W2158269427","https://openalex.org/W4381280689","https://openalex.org/W3033859939","https://openalex.org/W2847365777","https://openalex.org/W2174759944","https://openalex.org/W2990948995"],"abstract_inverted_index":{"With":[0,119],"the":[1,22,63,70,92,103,112,120,139,144,167,172,182,194,198,203],"ever":[2],"increasing":[3],"scale":[4],"and":[5,65,101,115,125,196,210],"complexity":[6],"of":[7,38,69,78,95,111,184,200,205,208],"online":[8,28,99,169],"systems,":[9,29],"incidents":[10,31,71],"are":[11,32],"gradually":[12],"becoming":[13],"commonplace.":[14],"Without":[15],"appropriate":[16],"handling,":[17],"they":[18],"can":[19],"seriously":[20],"harm":[21],"system":[23,176],"availability.":[24],"However,":[25],"in":[26,35,58,82,98,177,193,202],"large-scale":[27],"these":[30,54],"usually":[33],"drowning":[34],"a":[36,59,66,75,87,127,148,206],"slew":[37],"issues":[39,55,97,209],"(i.e.,":[40],"something":[41],"abnormal,":[42],"while":[43],"not":[44],"necessarily":[45],"an":[46],"incident),":[47],"rendering":[48],"them":[49],"difficult":[50],"to":[51,89,133,153],"handle.":[52],"Typically,":[53],"will":[56],"result":[57],"cascading":[60,93],"effect":[61,94],"across":[62],"system,":[64,171],"proper":[67],"management":[68],"depends":[72],"heavily":[73],"on":[74],"thorough":[76],"analysis":[77],"this":[79,83],"effect.":[80],"Therefore,":[81],"paper,":[84],"we":[85,123,142],"propose":[86],"method":[88],"automatically":[90],"analyze":[91],"availability":[96],"systems":[100],"extract":[102],"corresponding":[104],"graph":[105,128],"based":[106,131],"issue":[107,113],"representations":[108],"incorporating":[109],"both":[110],"symptoms":[114],"affected":[116],"service":[117,170],"attributes.":[118],"extracted":[121],"representations,":[122],"train":[124],"utilize":[126],"neural":[129],"networks":[130],"model":[132],"perform":[134],"incident":[135],"detection.":[136],"Then,":[137],"for":[138],"detected":[140],"incident,":[141],"leverage":[143],"PageRank":[145],"algorithm":[146],"with":[147],"flexible":[149],"transition":[150],"matrix":[151],"design":[152],"locate":[154],"its":[155],"root":[156],"cause.":[157],"We":[158],"evaluate":[159],"our":[160,185,188],"approach":[161,189],"using":[162],"real-world":[163],"data":[164],"collected":[165],"from":[166],"WeChat":[168],"largest":[173],"instant":[174],"message":[175],"China.":[178],"The":[179],"results":[180],"confirm":[181],"effectiveness":[183],"approach.":[186],"Moreover,":[187],"is":[190],"successfully":[191],"deployed":[192],"company":[195],"eases":[197],"burden":[199],"operators":[201],"face":[204],"flood":[207],"related":[211],"alert":[212],"signals.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
