[1]Velikovi P, Cucurull G, Casanova A, et al. Graph attention networks[J]. arXiv preprint, arXiv:1710.10903, 2018[2]Yun S, Jeong M, Kim R, et al. Graph transformer networks[J]. Advances in Neural Information Processing Systems, 2019, 32:[3]Cinque M, Della C R, Moscato V, et al. A graphbased approach to detect unexplained sequences in a log[J]. Expert Systems with Applications, 2021, 171: 114556[4]Ma X, Keung J, He P, et al. A semisupervised approach for industrial anomaly detection via selfadaptive clustering[J]. IEEE Trans on Industrial Informatics, 2024, 20(2): 16871697[5]Yang L, Chen J, Wang Z, et al. Semisupervised logbased anomaly detection via probabilistic label estimation[C] Proc of the 43rd IEEEACM Int Conf on Software Engineering (ICSE). Piscataway, NJ: IEEE, 2021: 14481460[6]Wang J, Zhao C, He S, et al. LogUAD: Log unsupervised anomaly detection based on Word2Vec[J]. Computer Systems Science and Engineering, 2022, 41(3): 12071222[7]Lu J Z, Wang C L, Huang Y Y, et al. An adversarial example defense algorithm for intelligent driving[J]. IEEE Network, 2024, 38(6): 98105[8]Zhang C, Peng X, Sha C, et al. DeepTraLog: Tracelog combined microservice anomaly detection through graphbased deep learning[C] Proc of the 44th Int Conf on Software Engineering. New York: ACM, 2022: 623634[9]Lu J Z, Chen K, Zhuo Z L, et al. A temporal correlation and traffic analysis approach for APT attacks detection[J]. Cluster Computing, 2019, 22(增刊3): S7347S7358[10]Lu J Z, Lan J, Huang Y Y, et al. Antiattack intrusion detection model based on MPNN and traffic spatiotemporal characteristics[J]. Journal of Grid Computing, 2023, 21(4): 6074[11]张浩和, 韩刚, 杨甜甜, 等. 工业互联网中融入域适应的混合神经网络加密恶意流量检测[J]. 信息安全研究, 2025, 11(5): 457464[12]Han N, Lu S, Wang D, et al. Skdlog: Selfknowledge distillationbased CNN for abnormal log detection[C] Proc of the 2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles. Piscataway, NJ: IEEE, 2022: 796805[13]Chen R, Zhang S, Li D, et al.Logtransfer: Crosssystem log anomaly detection for software systems with transfer learning[C] Proc of the 31st IEEE Int Symp on Software Reliability Engineering (ISSRE). Piscataway, NJ: IEEE, 2020: 3747[14]Hinton G, Vinyals O, Dean J. Distilling the knowledge in a neural network[J]. arXiv preprint, arXiv:1503.02531, 2015[15]He P, Zhu J, Zheng Z, et al. Drain: An online log parsing approach with fixed depth tree[C] Proc of 2017 IEEE Int Conf on Web Services (ICWS). Piscataway, NJ: IEEE, 2017: 3340
|