A survey on explainable anomaly detection

Z Li, Y Zhu, M Van Leeuwen - ACM Transactions on Knowledge …, 2023 - dl.acm.org
In the past two decades, most research on anomaly detection has focused on improving the
accuracy of the detection, while largely ignoring the explainability of the corresponding …

Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review

R **n, J Wang, P Chen, Z Zhao - ACM Computing Surveys, 2025 - dl.acm.org
Performance diagnosis systems are defined as detecting abnormal performance
phenomena and play a crucial role in cloud applications. An effective performance …

LogPal: A generic anomaly detection scheme of heterogeneous logs for network systems

L Sun, X Xu - Security and Communication Networks, 2023 - Wiley Online Library
As a key resource for diagnosing and identifying problems, network syslog contains vast
quantities of information. And it is the main source of data for anomaly detection of systems …

Trustworthy anomaly detection: A survey

S Yuan, X Wu - arxiv preprint arxiv:2202.07787, 2022 - arxiv.org
Anomaly detection has a wide range of real-world applications, such as bank fraud detection
and cyber intrusion detection. In the past decade, a variety of anomaly detection models …

Explainable sequential anomaly detection via prototypes

H Cheng, D Xu, S Yuan - 2023 International Joint Conference …, 2023 - ieeexplore.ieee.org
Sequential anomaly detection has received more and more attention because of its wide
applications in various domains, such as debugging system failures via logs. Researchers …

Abnormal event detection via hypergraph contrastive learning

B Yan, C Yang, C Shi, J Liu, X Wang - Proceedings of the 2023 SIAM …, 2023 - SIAM
Abnormal event detection, which refers to mining unusual interactions among involved
entities, plays an important role in many real applications. Previous works mostly …

[PDF][PDF] Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding.

Y Fang, Z Zhao, Y Xu, Z Liu - Computers, Materials & Continua, 2023 - cdn.techscience.cn
System logs are essential for detecting anomalies, querying faults, and tracing attacks.
Because of the time-consuming and labor-intensive nature of manual system …

Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods

S Lupton, H Washizaki, N Yoshioka… - IEEE Access, 2024 - ieeexplore.ieee.org
As production system estates become larger and more complex, ensuring stability through
traditional monitoring approaches becomes more challenging. Rule-based monitoring is …

Achieving Counterfactual Explanation for Sequence Anomaly Detection

H Cheng, D Xu, S Yuan, X Wu - Joint European Conference on Machine …, 2024 - Springer
Anomaly detection on discrete sequential data has been investigated for a long time
because of its potential in various applications, such as detecting novel attacks or abnormal …

MDAP: Module Dependency based Anomaly Prediction

H Borse, B Sahoo, P Chanda, S Sinha… - Computer …, 2023 - Elsevier
In large-scale distributed systems with multiple interconnected modules, failure of even a
single module might have a cascading effect and might result in overall system failure …