Augmenting log-based anomaly detection models to reduce false anomalies with human feedback
T Jia, Y Li, Y Yang, G Huang, Z Wu - Proceedings of the 28th ACM …, 2022 - dl.acm.org
With the increasing complexity of modern software systems, it is essential yet hard to detect
anomalies and diagnose problems precisely. Existing log-based anomaly detection …
anomalies and diagnose problems precisely. Existing log-based anomaly detection …
AcLog: An Approach to Detecting Anomalies from System Logs with Active Learning
C Duan, T Jia, Y Li, G Huang - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Log-based anomaly detection is an essential aspect of maintaining software reliability,
particularly in the context of microservice systems. However, existing log-based anomaly …
particularly in the context of microservice systems. However, existing log-based anomaly …
Automated Static Warning Identification via Path-based Semantic Representation
Despite their ability to aid developers in detecting potential defects early in the software
development life cycle, static analysis tools often suffer from precision issues (ie, high false …
development life cycle, static analysis tools often suffer from precision issues (ie, high false …
MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-Learning
Log-based anomaly detection plays a crucial role in ensuring the stability of software.
However, current approaches for log-based anomaly detection heavily depend on a vast …
However, current approaches for log-based anomaly detection heavily depend on a vast …
AFALog: A General Augmentation Framework for Log-based Anomaly Detection with Active Learning
C Duan, T Jia, H Cai, Y Li… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Log-based anomaly detection is becoming more and more important for maintaining the
availability of modern microservice systems. Existing supervised/semi-supervised log …
availability of modern microservice systems. Existing supervised/semi-supervised log …
[PDF][PDF] Automatically Annotating Decompiled Code with Meaningful Names and Types
J Lacomis - 2023 - reports-archive.adm.cs.cmu.edu
Software reverse engineering is the problem of understanding the behavior of a program
without access to its source code. Since there is no source code, analysts must use the …
without access to its source code. Since there is no source code, analysts must use the …
[PDF][PDF] Deep Bug Reports Processing (DBRP): A Systematic Literature Review
Many software projects utilize Bug Tracking System (BTS) to manage and process bug
reports. Over the years, the number of bug report submissions has largely increased with …
reports. Over the years, the number of bug report submissions has largely increased with …
Adaptive Cross-Project Bug Localization with Graph Learning
V Arumugam - 2022 - uwspace.uwaterloo.ca
Bug localization is the process of identifying the source code files associated with a bug
report. This is important because it allows developers to focus their efforts on fixing the bugs …
report. This is important because it allows developers to focus their efforts on fixing the bugs …
Analysis of dataset in private cloud for cloud forensics using eucalyptus and hadoop
MS Patil, B Ainapure - 2019 international conference on smart …, 2019 - ieeexplore.ieee.org
At present, in most of the areas of research, development and daily usage, almost all
platforms and service providers are dependent on cloud computing. To achieve scalability …
platforms and service providers are dependent on cloud computing. To achieve scalability …