{"id":"https://openalex.org/W4414004005","doi":"https://doi.org/10.14778/3749646.3749668","title":"CoLA: Model Collaboration for Log-Based Anomaly Detection","display_name":"CoLA: Model Collaboration for Log-Based Anomaly Detection","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4414004005","doi":"https://doi.org/10.14778/3749646.3749668"},"language":"en","primary_location":{"id":"doi:10.14778/3749646.3749668","is_oa":false,"landing_page_url":"https://doi.org/10.14778/3749646.3749668","pdf_url":null,"source":{"id":"https://openalex.org/S4210226185","display_name":"Proceedings of the VLDB Endowment","issn_l":"2150-8097","issn":["2150-8097"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the VLDB Endowment","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046331183","display_name":"Xiao\u2010Hua Zhu","orcid":"https://orcid.org/0000-0001-8598-2194"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuhang Zhu","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112122466","display_name":"Tang Xiu","orcid":null},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiu Tang","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017672363","display_name":"Sai Wu","orcid":"https://orcid.org/0000-0002-7903-1496"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sai Wu","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091854037","display_name":"Jichen Li","orcid":"https://orcid.org/0000-0001-8599-1197"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jichen Li","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049707744","display_name":"Haobo Wang","orcid":"https://orcid.org/0000-0001-8586-3048"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haobo Wang","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100522735","display_name":"Chang Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Yao","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074979952","display_name":"Quanqing Xu","orcid":"https://orcid.org/0000-0001-8989-9662"},"institutions":[{"id":"https://openalex.org/I4210135679","display_name":"Antea Group (France)","ror":"https://ror.org/03kfw6k71","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210101086","https://openalex.org/I4210135679"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Quanqing Xu","raw_affiliation_strings":["OceanBase, Ant Group"],"affiliations":[{"raw_affiliation_string":"OceanBase, Ant Group","institution_ids":["https://openalex.org/I4210135679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100389286","display_name":"Gang Chen","orcid":"https://orcid.org/0000-0002-7483-0045"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Chen","raw_affiliation_strings":["Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security","institution_ids":["https://openalex.org/I1328775524"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5046331183"],"corresponding_institution_ids":["https://openalex.org/I1328775524"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32517639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"11","first_page":"3979","last_page":"3987"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cola","display_name":"Cola (plant)","score":0.6922363638877869},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5903798341751099},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5061137080192566},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4167178273200989},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.288893461227417},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.11319929361343384},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10210496187210083}],"concepts":[{"id":"https://openalex.org/C2781138811","wikidata":"https://www.wikidata.org/wiki/Q114264","display_name":"Cola (plant)","level":2,"score":0.6922363638877869},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5903798341751099},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5061137080192566},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4167178273200989},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.288893461227417},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.11319929361343384},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10210496187210083},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C134018914","wikidata":"https://www.wikidata.org/wiki/Q162606","display_name":"Endocrinology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.14778/3749646.3749668","is_oa":false,"landing_page_url":"https://doi.org/10.14778/3749646.3749668","pdf_url":null,"source":{"id":"https://openalex.org/S4210226185","display_name":"Proceedings of the VLDB Endowment","issn_l":"2150-8097","issn":["2150-8097"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the VLDB Endowment","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2059471177","https://openalex.org/W2063566496","https://openalex.org/W2153522563","https://openalex.org/W2767094836","https://openalex.org/W2947815220","https://openalex.org/W2965838158","https://openalex.org/W3042609801","https://openalex.org/W3217482398","https://openalex.org/W4205965165","https://openalex.org/W4226128225","https://openalex.org/W4255845613","https://openalex.org/W4372263685","https://openalex.org/W4380433171","https://openalex.org/W4380433214","https://openalex.org/W4389539730","https://openalex.org/W4389610902","https://openalex.org/W4391054871","https://openalex.org/W4392453936","https://openalex.org/W4393158476","https://openalex.org/W4400583065","https://openalex.org/W4401352021","https://openalex.org/W4402043304","https://openalex.org/W4402667025","https://openalex.org/W4404181033","https://openalex.org/W4407542088"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Log-based":[0],"anomaly":[1,65],"detection":[2,17,66],"plays":[3],"a":[4,35,61,75,83],"crucial":[5],"role":[6],"in":[7,113],"ensuring":[8],"the":[9,22,43,97],"reliability":[10],"of":[11,31,45,115],"systems.":[12],"While":[13],"deep":[14],"learning-based":[15],"small":[16],"models":[18,25],"(SDMs)":[19],"are":[20,27],"efficient,":[21],"large":[23,103],"language":[24],"(LLMs)":[26],"accurate":[28],"and":[29,58,95,118],"capable":[30],"providing":[32],"explanations.":[33],"Intuitively,":[34],"compelling":[36],"question":[37],"arises:":[38],"Can":[39],"we":[40,51],"seamlessly":[41],"combine":[42],"advantages":[44],"both":[46],"approaches?":[47],"In":[48],"this":[49,54],"work,":[50],"delve":[52],"into":[53],"underexplored":[55],"research":[56],"direction":[57],"propose":[59],"CoLA,":[60],"novel":[62],"collaborative":[63,69],"log":[64],"framework.":[67],"During":[68],"inference,":[70],"an":[71,88],"SDM":[72],"serves":[73],"as":[74,87],"filter":[76],"to":[77,90],"select":[78],"potentially":[79],"anomalous":[80],"instances,":[81],"while":[82,120],"downstream":[84],"LLM":[85],"acts":[86],"expert":[89],"detect":[91],"anomalies,":[92],"offer":[93],"explanations,":[94],"refine":[96],"SDM.":[98],"Extensive":[99],"experiments":[100],"on":[101],"three":[102],"real-world":[104],"datasets":[105],"demonstrate":[106],"that":[107],"CoLA":[108],"significantly":[109],"outperforms":[110],"state-of-the-art":[111],"methods":[112],"terms":[114],"effectiveness,":[116],"efficiency,":[117],"explainability,":[119],"also":[121],"greatly":[122],"reducing":[123],"labor":[124],"costs.":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
