{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:22:49Z","timestamp":1756383769113,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["6000796,9229109,9229098,9220103,9229029"],"award-info":[{"award-number":["6000796,9229109,9229098,9220103,9229029"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,2]]},"DOI":"10.1109\/compsac61105.2024.00157","type":"proceedings-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T17:23:31Z","timestamp":1724693011000},"page":"1178-1183","source":"Crossref","is-referenced-by-count":1,"title":["Unveiling Hidden Anomalies: Leveraging SMAC-LSTM for Enhanced Software Log Analysis"],"prefix":"10.1109","author":[{"given":"Yicheng","family":"Sun","sequence":"first","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong,China"}]},{"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong,China"}]},{"given":"Jingyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong,China"}]},{"given":"Hi Kuen","family":"Yu","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong,China"}]},{"given":"Wenqiang","family":"Luo","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong,China"}]},{"given":"Shuo","family":"Liu","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"ref2","article-title":"Efficiency of unsupervised anomaly detection methods on software logs","author":"Nyyssola","year":"2023","journal-title":"arXiv preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623308"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00055"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2023.100470"},{"key":"ref6","article-title":"Mining invariants from console logs for system problem detection","volume-title":"2010 USENIX Annual Technical Conference (USENIX ATC 10)","author":"Lou","year":"2010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511809071"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100030"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020157"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3441448"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00148"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.06.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549176"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref22","article-title":"Practical bayesian optimization of machine learning algorithms","volume":"25","author":"Snoek","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1214\/17-EJS1335SI"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4202735"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25566-3_40"},{"article-title":"Sequential model-based optimization for general algorithm con-figuration (extended version)","volume-title":"Technical Report TR-2010\u201310, University of British Columbia, Computer Science, Tech. Rep.","year":"2010","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"}],"event":{"name":"2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)","start":{"date-parts":[[2024,7,2]]},"location":"Osaka, Japan","end":{"date-parts":[[2024,7,4]]}},"container-title":["2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10633276\/10633246\/10633425.pdf?arnumber=10633425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T10:39:26Z","timestamp":1725014366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10633425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/compsac61105.2024.00157","relation":{},"subject":[],"published":{"date-parts":[[2024,7,2]]}}}