{"id":"https://openalex.org/W4385691576","doi":"https://doi.org/10.1145/3605801.3605824","title":"LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning","display_name":"LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning","publication_year":2023,"publication_date":"2023-06-16","ids":{"openalex":"https://openalex.org/W4385691576","doi":"https://doi.org/10.1145/3605801.3605824"},"language":"en","primary_location":{"id":"doi:10.1145/3605801.3605824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605801.3605824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013095820","display_name":"Xiaoda Xie","orcid":"https://orcid.org/0009-0008-8071-7314"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoda Xie","raw_affiliation_strings":["National University of Defence Technology, China"],"affiliations":[{"raw_affiliation_string":"National University of Defence Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000084858","display_name":"Songlei Jian","orcid":"https://orcid.org/0000-0002-1435-0410"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songlei Jian","raw_affiliation_strings":["National University of Defence Technology, China"],"affiliations":[{"raw_affiliation_string":"National University of Defence Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021356897","display_name":"Chenlin Huang","orcid":"https://orcid.org/0000-0002-6792-1651"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenlin Huang","raw_affiliation_strings":["National University of Defence Technology, China"],"affiliations":[{"raw_affiliation_string":"National University of Defence Technology, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013095820"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.6027,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68027761,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"116","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7874260544776917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7796664237976074},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7338992357254028},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5582910180091858},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.531505286693573},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.5088163018226624},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5074276328086853},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5060738921165466},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.46992456912994385},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.421480655670166},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4152892231941223},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4103076457977295},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3663143217563629},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3647218942642212},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.14651283621788025},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10027128458023071}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7874260544776917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7796664237976074},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7338992357254028},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5582910180091858},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.531505286693573},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.5088163018226624},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5074276328086853},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5060738921165466},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.46992456912994385},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.421480655670166},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4152892231941223},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4103076457977295},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3663143217563629},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3647218942642212},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.14651283621788025},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10027128458023071},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3605801.3605824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605801.3605824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8316370131","display_name":null,"funder_award_id":"No.62172431, No.62002371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2094924503","https://openalex.org/W2170890990","https://openalex.org/W2250539671","https://openalex.org/W2508465325","https://openalex.org/W2560021099","https://openalex.org/W2767094836","https://openalex.org/W2907492528","https://openalex.org/W2963999143","https://openalex.org/W2965838158","https://openalex.org/W2970266365","https://openalex.org/W2970971581","https://openalex.org/W3090066802","https://openalex.org/W3100178186","https://openalex.org/W3163667769","https://openalex.org/W3178076956","https://openalex.org/W3183619936","https://openalex.org/W4284688717","https://openalex.org/W4285082635","https://openalex.org/W4288269198","https://openalex.org/W4312003035","https://openalex.org/W4319781619","https://openalex.org/W4321482504"],"related_works":["https://openalex.org/W3186512740","https://openalex.org/W3194885736","https://openalex.org/W4363671829","https://openalex.org/W2806741695","https://openalex.org/W2983142544","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W2891059443","https://openalex.org/W3210364259"],"abstract_inverted_index":{"Abstract:":[0],"The":[1,180],"anomaly":[2,18,50,96,106,147],"detection":[3,19,51,97,107],"technique":[4],"is":[5,60,98],"increasingly":[6],"applied":[7],"in":[8,43,162],"various":[9],"security":[10],"fields":[11],"and":[12,15,39,58,71,88,113,119,165,168,189,201],"the":[13,47,66,86,111,133,151,170,173],"effectiveness":[14],"efficiency":[16],"of":[17,49,68,81,141,172],"models":[20,28],"have":[21],"become":[22],"vitally":[23],"important":[24],"issues.":[25],"Deep":[26],"learning":[27,40,126],"are":[29],"widely":[30],"used":[31,54,145],"to":[32,36,45,91,115,128,194],"detect":[33],"anomalies":[34,161],"due":[35],"their":[37],"flexibility":[38],"ability.":[41],"However,":[42],"order":[44],"improve":[46],"performance":[48,171],"models,":[52],"information":[53,94,137],"for":[55,95,146],"model":[56,127],"training":[57],"detecting":[59],"most":[61],"significant.":[62],"Previous":[63],"methods":[64,195],"involve":[65],"usage":[67],"system":[69],"logs":[70,87,112,164,198],"traces,":[72,200],"but":[73],"mostly":[74],"only":[75,197],"focus":[76],"on":[77,153],"one":[78],"single":[79],"type":[80],"data":[82,135,142],"source.":[83],"And":[84],"combining":[85],"traces":[89,114,167],"appropriately":[90],"retrieve":[92],"comprehensive":[93],"still":[99],"challenging.":[100],"We":[101,149],"propose":[102],"LogTraceAD,":[103],"a":[104,117,121,154,187],"novel":[105],"method":[108,175,184],"that":[109,158],"utilizes":[110],"generate":[116],"graph,":[118],"leverages":[120],"variational":[122],"autoencoder-based":[123],"graph":[124],"representation":[125],"complete":[129],"feature":[130,134],"learning.":[131],"Then":[132],"containing":[136],"from":[138],"both":[139],"types":[140],"can":[143,185],"be":[144],"detection.":[148],"conduct":[150],"experiment":[152],"publicly":[155],"available":[156],"dataset":[157],"contains":[159],"23,334":[160],"7,705,050":[163],"132,485":[166],"compare":[169],"proposed":[174],"with":[176],"several":[177],"previous":[178],"approaches.":[179],"result":[181],"shows":[182],"our":[183],"achieve":[186],"24%":[188],"27%":[190],"improvement":[191],"respectively":[192],"compared":[193],"using":[196],"or":[199],"will":[202],"not":[203],"cause":[204],"high":[205],"overhead.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
