参考文献/References:
[1]LE V H,ZHANG H. Log-based anomaly detection with deep learning:How far are we?[C]//Proceedings of the 44th International Conference on Software Engineering. Pittsburgh,PA,USA:ICSE,2022:1356-1367.
[2]张颖君,刘尚奇,杨牧,等. 基于日志的异常检测技术综述[J]. 网络与信息安全学报,2020,6(6):1-12.
[3]XIAO T,QUAN Z,WANG Z J,et al. Loader:A log anomaly detector based on transformer[J]. IEEE transactions on services computing,2023,16(5):3479-3492.
[4]ZHANG L,JIA T,JIA M,et al. Multivariate log-based anomaly detection for distributed database[C]//Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Barcelona,Spain:KDD,2024:4256-4267.
[5]HUANG S,LIU Y,FUNG C,et al. Improving log-based anomaly detection by pre-training hierarchical transformers[J]. IEEE transactions on computers,2023,72(9):2656-2667.
[6]QI J,LUAN Z,HUANG S,et al. Logencoder:Log-based contrastive representation learning for anomaly detection[J]. IEEE transactions on network and service management,2023,20(2):1378-1391.
[7]MENG W,LIU Y,ZHU Y,et al. Loganomaly:Unsupervised detection of sequential and quantitative anomalies in unstructured logs[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence. Macao,China:2019,19(7):4739-4745.
[8]刘春波,梁孟孟,侯晶雯,等. 面向不稳定日志的一致性异常检测方法[J]. 湖南大学学报(自然科学版),2022,49(4):89-99.
[9]DU M,LI F,ZHENG G,et al. Deeplog:Anomaly detection and diagnosis from system logs through deep learning[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. USA:CCS,2017:1285-1298.
[10]HAN S,WU Q,ZHANG H,et al. Log-based anomaly detection with robust feature extraction and online learning[J]. IEEE transactions on information forensics and security,2021,16:2300-2311.
[11]WANG X,SONG J,ZHANG X,et al. LogOnline:A semi-supervised log-based anomaly detector aided with online learning mechanism[C]//2023 38th IEEE/ACM International Conference on Automated Software Engineering(ASE). Echternach,Luxembourg:IEEE,2023:141-152.
[12]孙文举,李清勇,张靖,等. 基于深度神经网络的增量学习研究综述[J]. 数据分析与知识发现,2025(1):1-30.
[13]BUZZEGA P,BOSCHINI M,PORRELLO A,et al. Dark experience for general continual learning:a strong,simple baseline[J]. Advances in neural information processing systems,2020,33:15920-15930.
[14]YAN Q,GONG D,LIU Y,et al. Learning bayesian sparse networks with full experience replay for continual learning[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. USA:CVPR,2022:109-118.
[15]LI Z,SHI J,VAN LEEUWEN M. Graph neural networks based log anomaly detection and explanation[C]//Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering:Companion Proceedings. Lisbon,Portugal:ICSE Companion,2024:306-307.
[16]SCHWARZ J,CZARNECKI W,LUKETINA J,et al. Progress & compress:A scalable framework for continual learning[C]//Proceedings of the 35th International Conference on Machine Learning. Stockholm,Sweden:PMLR,2018:4528-4537.
[17]ZENKE F,POOLE B,GANGULI S. Continual learning through synaptic intelligence[C]//Proceedings of the 34th International Conference on Machine Learning. Sydney,Australia:PMLR,2017:3987-3995.
[18]RUSU A A,RABINOWITZ N C,DESJARDINS G,et al. Progressive neural networks[J/OL]. arxiv preprint arxiv:1606.04671,2016.
[19]CHENG D,JI Y,GONG D,et al. Continual all-in-one adverse weather removal with knowledge replay on a unified network structure[J]. IEEE transactions on multimedia,2024(26):8184-8196.
[20]MO J,ZOU R,HUA Y. Multi-level foreground prompt for incremental object detection[J]. IEEE access,2024(113):4048-4066.
[21]FU Y,LIANG K,XU J. MLog:Mogrifier LSTM-based log anomaly detection approach using semantic representation[J]. IEEE transactions on services computing,2023,16(5):3537-3549.
[22]ZHU J,HE S,HE P,et al. Loghub:A large collection of system log datasets for ai-driven log analytics[C]//2023 IEEE 34th International Symposium on Software Reliability Engineering(ISSRE). Florence,Italy:ISSRE,2023:355-366.
相似文献/References:
[1]李致远,朱求志,吴永焜,等.基于小波分析的无线传感网实时异常检测算法[J].南京师大学报(自然科学版),2014,37(01):87.
Li Zhiyuan,Zhu Qiuzhi,Wu Yongkun,et al.Wavelet Analysis-Based Real-Time Anomaly Detection Algorithm for Wireless Sensor Network[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(05):87.
[2]戚小莎,曾 静,吉根林.双交叉注意力自编码器改进视频异常检测[J].南京师大学报(自然科学版),2023,46(01):110.[doi:10.3969/j.issn.1001-4616.2023.01.015]
Qi Xiaosha,Zeng Jing,Ji Genlin.Improved Video Anomaly Detection with Dual Criss-Cross Attention Auto Encoder[J].Journal of Nanjing Normal University(Natural Science Edition),2023,46(05):110.[doi:10.3969/j.issn.1001-4616.2023.01.015]