{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:08:14Z","timestamp":1775912894599,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62006016"],"award-info":[{"award-number":["62006016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1016\/j.ins.2022.11.007","type":"journal-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T11:12:00Z","timestamp":1667992320000},"page":"249-262","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"special_numbering":"C","title":["Black-box attacks against log anomaly detection with adversarial examples"],"prefix":"10.1016","volume":"619","author":[{"given":"Siyang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Mingquan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongdong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Sizhe","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ningning","family":"Han","sequence":"additional","affiliation":[]},{"given":"Liqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2022.11.007_b0005","unstructured":"D. Wang, S. Zhang, L. Wang, Deep epidemiological modeling by black-box knowledge distillation: An accurate deep learning model for covid-19, arXiv preprint arXiv:2101.10280."},{"key":"10.1016\/j.ins.2022.11.007_b0010","first-page":"97","article-title":"Granular computing","volume":"vol. 2","author":"Bargiela","year":"2022"},{"key":"10.1016\/j.ins.2022.11.007_b0015","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.neucom.2021.03.118","article-title":"Aevrnet: Adaptive exploration network with variance reduced optimization for visual tracking","volume":"449","author":"Yang","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ins.2022.11.007_b0020","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.neunet.2020.10.018","article-title":"Fmixcutmatch for semi-supervised deep learning","volume":"133","author":"Wei","year":"2021","journal-title":"Neural Networks"},{"issue":"4","key":"10.1016\/j.ins.2022.11.007_b0025","first-page":"31","article-title":"Towards detecting and classifying malicious urls using deep learning","volume":"11","author":"Johnson","year":"2020","journal-title":"J. Wireless Mobile Networks, Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"key":"10.1016\/j.ins.2022.11.007_b0030","series-title":"Web Services (ICWS), 2017 IEEE International Conference on","first-page":"389","article-title":"Log-based abnormal task detection and root cause analysis for spark","author":"Lu","year":"2017"},{"key":"10.1016\/j.ins.2022.11.007_b0035","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.future.2018.12.002","article-title":"Ladra: Log-based abnormal task detection and root-cause analysis in big data processing with spark","volume":"95","author":"Lu","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.ins.2022.11.007_b0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109561","article-title":"3lpr: A three-stage label propagation and reassignment framework for class-imbalanced semi-supervised learning","volume":"253","author":"Kong","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.ins.2022.11.007_b0045","unstructured":"X. Wang, L. Ren, R. Yuan, L.T. Yang, M.J. Deen, Qtt-dlstm: A cloud-edge-aided distributed lstm for cyber-physical-social big data, IEEE Trans. Neural Networks Learn. Syst."},{"key":"10.1016\/j.ins.2022.11.007_b0050","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.neucom.2021.04.101","article-title":"Active dropblock: Method to enhance deep model accuracy and robustness","volume":"454","author":"Yao","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ins.2022.11.007_b0055","doi-asserted-by":"crossref","unstructured":"D. Wang, Y. Li, L. Wang, B. Gong, Neural networks are more productive teachers than human raters: Active mixup for data-efficient knowledge distillation from a blackbox model, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 1498\u20131507.","DOI":"10.1109\/CVPR42600.2020.00157"},{"issue":"1","key":"10.1016\/j.ins.2022.11.007_b0060","first-page":"44","article-title":"Dynamic mobile malware detection through system call-based image representation","volume":"12","author":"Casolare","year":"2021","journal-title":"J. Wireless Mobile Networks, Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"issue":"1","key":"10.1016\/j.ins.2022.11.007_b0065","first-page":"2","article-title":"Modelling network traffic and exploiting encrypted packets to detect stepping-stone intrusions","volume":"12","author":"Yang","year":"2022","journal-title":"J. Internet Services Inform. Secur. (JISIS)"},{"issue":"1","key":"10.1016\/j.ins.2022.11.007_b0070","first-page":"3","article-title":"Machine learning based approach to anomaly and cyberattack detection in streamed network traffic data","volume":"12","author":"Komisarek","year":"2021","journal-title":"J. Wireless Mobile Networks, Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"key":"10.1016\/j.ins.2022.11.007_b0075","doi-asserted-by":"crossref","unstructured":"S. Lu, X. Wei, Y. Li, L. Wang, Detecting anomaly in big data system logs using convolutional neural network, in: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), IEEE, 2018, pp. 151\u2013158.","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"10.1016\/j.ins.2022.11.007_b0080","doi-asserted-by":"crossref","unstructured":"M. Du, F. Li, G. Zheng, V. Srikumar, Deeplog: Anomaly detection and diagnosis from system logs through deep learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1285\u20131298.","DOI":"10.1145\/3133956.3134015"},{"key":"10.1016\/j.ins.2022.11.007_b0085","doi-asserted-by":"crossref","unstructured":"A. Brown, A. Tuor, B. Hutchinson, N. Nichols, Recurrent neural network attention mechanisms for interpretable system log anomaly detection, in: Proceedings of the First Workshop on Machine Learning for Computing Systems, 2018, pp. 1\u20138.","DOI":"10.1145\/3217871.3217872"},{"key":"10.1016\/j.ins.2022.11.007_b0090","series-title":"International Conference on Science of Cyber Security","first-page":"61","article-title":"Loggan: a sequence-based generative adversarial network for anomaly detection based on system logs","author":"Xia","year":"2019"},{"key":"10.1016\/j.ins.2022.11.007_b0095","series-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","first-page":"1448","article-title":"Semi-supervised log-based anomaly detection via probabilistic label estimation","author":"Yang","year":"2021"},{"key":"10.1016\/j.ins.2022.11.007_b0100","unstructured":"H. Guo, S. Yuan, X. Wu, Logbert: Log anomaly detection via bert, arXiv preprint arXiv:2103.04475."},{"key":"10.1016\/j.ins.2022.11.007_b0105","unstructured":"J. Devlin, M.-W. Chang, K. Lee, K. Toutanova, Bert: Pre-training of deep bidirectional transformers for language understanding, arXiv preprint arXiv:1810.04805."},{"key":"10.1016\/j.ins.2022.11.007_b0110","unstructured":"K. Steverson, J. Mullin, M. Ahiskali, Adversarial robustness for machine learning cyber defenses using log data, arXiv preprint arXiv:2007.14983."},{"key":"10.1016\/j.ins.2022.11.007_b0115","doi-asserted-by":"crossref","unstructured":"J.D. Herath, P. Yang, G. Yan, Real-time evasion attacks against deep learning-based anomaly detection from distributed system logs, in: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, 2021, pp. 29\u201340.","DOI":"10.1145\/3422337.3447833"},{"key":"10.1016\/j.ins.2022.11.007_b0120","unstructured":"X. Wei, B. Gong, Z. Liu, W. Lu, L. Wang, Improving the improved training of wasserstein gans: A consistency term and its dual effect, in: International Conference on Learning Representations, 2018."},{"issue":"2","key":"10.1016\/j.ins.2022.11.007_b0125","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","article-title":"Adversarial attacks and defenses in images, graphs and text: A review","volume":"17","author":"Xu","year":"2020","journal-title":"Int. J. Autom. Comput."},{"issue":"9","key":"10.1016\/j.ins.2022.11.007_b0130","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","article-title":"Adversarial examples: Attacks and defenses for deep learning","volume":"30","author":"Yuan","year":"2019","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"10.1016\/j.ins.2022.11.007_b0135","unstructured":"A. Madry, A. Makelov, L. Schmidt, D. Tsipras, A. Vladu, Towards deep learning models resistant to adversarial attacks, arXiv preprint arXiv:1706.06083."},{"issue":"3","key":"10.1016\/j.ins.2022.11.007_b0140","first-page":"30","article-title":"Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service","volume":"11","author":"Narteni","year":"2021","journal-title":"J. Internet Serv. Inform. Secur. (JISIS)"},{"key":"10.1016\/j.ins.2022.11.007_b0145","series-title":"International Conference on Brain Informatics and Health","first-page":"369","article-title":"Witnesses for the doctor in the loop","author":"Kieseberg","year":"2015"},{"key":"10.1016\/j.ins.2022.11.007_b0150","unstructured":"I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples, arXiv preprint arXiv:1412.6572."},{"issue":"3","key":"10.1016\/j.ins.2022.11.007_b0155","first-page":"1","article-title":"Adversarial attacks on deep-learning models in natural language processing: A survey","volume":"11","author":"Zhang","year":"2020","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"10.1016\/j.ins.2022.11.007_b0160","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1162\/tacl_a_00254","article-title":"Analysis methods in neural language processing: A survey","volume":"7","author":"Belinkov","year":"2019","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"10.1016\/j.ins.2022.11.007_b0165","unstructured":"J. Ebrahimi, A. Rao, D. Lowd, D. Dou, Hotflip: White-box adversarial examples for text classification, arXiv preprint arXiv:1712.06751."},{"key":"10.1016\/j.ins.2022.11.007_b0170","doi-asserted-by":"crossref","unstructured":"M. Cheng, J. Yi, P.-Y. Chen, H. Zhang, C.-J. Hsieh, Seq2sick: Evaluating the robustness of sequence-to-sequence models with adversarial examples, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34, 2020, pp. 3601\u20133608.","DOI":"10.1609\/aaai.v34i04.5767"},{"key":"10.1016\/j.ins.2022.11.007_b0175","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1162\/tacl_a_00279","article-title":"Trick me if you can: Human-in-the-loop generation of adversarial examples for question answering","volume":"7","author":"Wallace","year":"2019","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"10.1016\/j.ins.2022.11.007_b0180","unstructured":"E. Wallace, S. Feng, N. Kandpal, M. Gardner, S. Singh, Universal adversarial triggers for attacking and analyzing nlp, arXiv preprint arXiv:1908.07125."},{"key":"10.1016\/j.ins.2022.11.007_b0185","doi-asserted-by":"crossref","unstructured":"S. Zhang, W. Meng, J. Bu, S. Yang, Y. Liu, D. Pei, J. Xu, Y. Chen, H. Dong, X. Qu, et al., Syslog processing for switch failure diagnosis and prediction in datacenter networks, in: 2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS), IEEE, 2017, pp. 1\u201310.","DOI":"10.1109\/IWQoS.2017.7969130"},{"key":"10.1016\/j.ins.2022.11.007_b0190","doi-asserted-by":"crossref","first-page":"30245","DOI":"10.1109\/ACCESS.2020.2972691","article-title":"Efficient and robust syslog parsing for network devices in datacenter networks","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2022.11.007_b0195","doi-asserted-by":"crossref","unstructured":"C. Audet, J. Denni, D. Moore, A. Booker, P. Frank, A surrogate-model-based method for constrained optimization, in: 8th symposium on multidisciplinary analysis and optimization, 2000, p. 4891.","DOI":"10.2514\/6.2000-4891"},{"key":"10.1016\/j.ins.2022.11.007_b0200","doi-asserted-by":"crossref","unstructured":"W. Xu, L. Huang, A. Fox, D. Patterson, M.I. Jordan, Detecting large-scale system problems by mining console logs, in: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, 2009, pp. 117\u2013132.","DOI":"10.1145\/1629575.1629587"},{"key":"10.1016\/j.ins.2022.11.007_b0205","doi-asserted-by":"crossref","unstructured":"A. Borghesi, A. Bartolini, M. Lombardi, M. Milano, L. Benini, Anomaly detection using autoencoders in high performance computing systems, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33, 2019, pp. 9428\u20139433.","DOI":"10.1609\/aaai.v33i01.33019428"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025522012798?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025522012798?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T05:56:44Z","timestamp":1758088604000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025522012798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":41,"alternative-id":["S0020025522012798"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2022.11.007","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Black-box attacks against log anomaly detection with adversarial examples","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2022.11.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier Inc.","name":"copyright","label":"Copyright"}]}}