Partial label learning: Taxonomy, analysis and outlook

Y Tian, X Yu, S Fu - Neural Networks, 2023 - Elsevier
Partial label learning (PLL) is an emerging framework in weakly supervised machine
learning with broad application prospects. It handles the case in which each training …

[PDF][PDF] Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs.

W Meng, Y Liu, Y Zhu, S Zhang, D Pei, Y Liu, Y Chen… - IJCAI, 2019 - nkcs.iops.ai
Recording runtime status via logs is common for almost computer system, and detecting
anomalies in logs is crucial for timely identifying malfunctions of systems. However …

IT infrastructure anomaly detection and failure handling: A systematic literature review focusing on datasets, log preprocessing, machine & deep learning approaches …

DA Bhanage, AV Pawar, K Kotecha - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, reliability assurance is crucial in components of IT infrastructures. Unavailability
of any element or connection results in downtime and triggers monetary and performance …

LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things

J Wang, Y Tang, S He, C Zhao, PK Sharma, O Alfarraj… - Sensors, 2020 - mdpi.com
Log anomaly detection is an efficient method to manage modern large-scale Internet of
Things (IoT) systems. More and more works start to apply natural language processing …

Prefix: Switch failure prediction in datacenter networks

S Zhang, Y Liu, W Meng, Z Luo, J Bu, S Yang… - Proceedings of the …, 2018 - dl.acm.org
In modern datacenter networks (DCNs), failures of network devices are the norm rather than
the exception, and many research efforts have focused on dealing with failures after they …

Robust and rapid adaption for concept drift in software system anomaly detection

M Ma, S Zhang, D Pei, X Huang… - 2018 IEEE 29th …, 2018 - ieeexplore.ieee.org
Anomaly detection is critical for web-based software systems. Anecdotal evidence suggests
that in these systems, the accuracy of a static anomaly detection method that was previously …

A semantic-aware representation framework for online log analysis

W Meng, Y Liu, Y Huang, S Zhang… - 2020 29th …, 2020 - ieeexplore.ieee.org
Logs are one of the most valuable data sources for large-scale service management. Log
representation, which converts unstructured texts to structured vectors or matrices, serves as …

Practical intrusion detection of emerging threats

R Mills, AK Marnerides, M Broadbent… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), in combination with advancements in Big Data, communications
and networked systems, offers a positive impact across a range of sectors including health …

Logclass: Anomalous log identification and classification with partial labels

W Meng, Y Liu, S Zhang, F Zaiter… - … on Network and …, 2021 - ieeexplore.ieee.org
Logs are imperative in the management process of networks and services. However,
manually identifying and classifying anomalous logs is time-consuming, error-prone, and …

Logparse: Making log parsing adaptive through word classification

W Meng, Y Liu, F Zaiter, S Zhang… - 2020 29th …, 2020 - ieeexplore.ieee.org
Logs are one of the most valuable data sources for large-scale service (eg, social network,
search engine) maintenance. Log parsing serves as the the first step towards automated log …