
Hoffman, M., Bach, F., and Blei, D. (2010). Online learn-
ing for latent dirichlet allocation. Advances in Neural
Information Processing Systems, 23:856–864.
Le, V.-H. and Zhang, H. (2022). Log-based anomaly de-
tection with deep learning: How far are we? In
Proceedings of the 44th International Conference on
Software Engineering, ICSE ’22, pages 1356–1367.
IEEE/ACM.
Li, Z., Zhang, J., Zhang, X., Lin, F., Wang, C., and Cai,
X. (2022). Natural language processing-based model
for log anomaly detection. In Proceedings of the
2nd International Conference on Software Engineer-
ing and Artificial Intelligence, SEAI ’22, pages 129–
134. IEEE.
Lu, S., Wei, X., Li, Y., and Wang, L. (2018). De-
tecting anomaly in big data system logs using con-
volutional neural network. In Proceedings of the
16th International Conference on Dependable, Au-
tonomic and Secure Computing, 16th International
Conference on Pervasive Intelligence and Comput-
ing, 4th International Conference on Big Data In-
telligence and Computing and Cyber Science and
Technology Congress, DASC/PiCom/DataCom/Cy-
berSciTech ’18, pages 151–158. IEEE.
Meng, W., Liu, Y., Zhu, Y., Zhang, S., Pei, D., Liu, Y.,
Chen, Y., Zhang, R., Tao, S., Sun, P., et al. (2019).
LogAnomaly: Unsupervised detection of sequential
and quantitative anomalies in unstructured logs. In
Proceedings of the International Joint Conference on
Artificial Intelligence, volume 19 of IJCAI ’19, pages
4739–4745.
Panichella, A., Dit, B., Oliveto, R., Di Penta, M., Poshy-
nanyk, D., and De Lucia, A. (2013). How to ef-
fectively use topic models for software engineering
tasks? an approach based on genetic algorithms.
In Proceedings of the 35th International Conference
on Software Engineering, ICSE ’13, pages 522–531.
IEEE/ACM.
Shahin, M., Ali Babar, M., and Zhu, L. (2017). Continu-
ous integration, delivery and deployment: A system-
atic review on approaches, tools, challenges and prac-
tices. IEEE Access, 5:3909–3943.
Sievert, C. and Shirley, K. (2014). LDAvis: A method for
visualizing and interpreting topics. In Proceedings of
the Workshop on Interactive Language Learning, Vi-
sualization, and Interfaces, pages 63–70. ACL.
Wittkopp, T., Wiesner, P., Scheinert, D., and Kao, O.
(2022). A taxonomy of anomalies in log data. In
Proceedings of the 20th International Conference on
Service-Oriented Computing, ICSOC ’22, pages 153–
164. Springer.
Yang, L., Chen, J., Wang, Z., Wang, W., Jiang, J., Dong,
X., and Zhang, W. (2021). Semi-supervised log-
based anomaly detection via probabilistic label esti-
mation. In Proceedings of the 43rd International Con-
ference on Software Engineering, ICSE ’21, pages
1448–1460. IEEE/ACM.
Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y.,
Xie, C., Yang, X., Cheng, Q., Li, Z., Chen, J., He,
X., Yao, R., Lou, J.-G., Chintalapati, M., Shen, F.,
and Zhang, D. (2019). Robust log-based anomaly de-
tection on unstable log data. In Proceedings of the
27th Joint Meeting on European Software Engineer-
ing Conference and Symposium on the Foundations
of Software Engineering, ESEC/FSE ’19, pages 807–
817. ACM.
Zhao, N., Wang, H., Li, Z., Peng, X., Wang, G., Pan, Z.,
Wu, Y., Feng, Z., Wen, X., Zhang, W., Sui, K., and
Pei, D. (2021). An empirical investigation of practical
log anomaly detection for online service systems. In
Proceedings of the 29th Joint Meeting on European
Software Engineering Conference and Symposium on
the Foundations of Software Engineering, ESEC/FSE
’21, pages 1404–1415. ACM.
ENASE 2023 - 18th International Conference on Evaluation of Novel Approaches to Software Engineering
468