Portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 2 
Published in IEEE Transactions on Information Forensics and Security, 2022
In this paper, we propose DeepSyslog, a deep anomaly detection method for Syslog that integrates unsupervised sentence embedding with event metadata to capture contextual semantics and improve detection accuracy, outperforming existing log-based approaches.
Recommended citation: J. Zhou, Y. Qian, Q. Zou, P. Liu and J. Xiang, "DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3051-3061, 2022, doi: 10.1109/TIFS.2022.3201379. keywords: {Metadata;Anomaly detection;Feature extraction;Semantics;Indexes;History;Event detection;Anomaly detection;sentence embedding;event metadata}, https://ieeexplore.ieee.org/document/9865986
Published in IEEE Transactions on Dependable and Secure Computing , 2025
In this paper, we propose LogDLR, a novel unsupervised cross-system log anomaly detection method. It uses universal sentence embeddings and a Transformer-based autoencoder to extract domain-invariant latent representations, adapts to heterogeneous log formats, captures semantic dependencies, and achieves efficient and accurate anomaly detection across different systems.
Recommended citation: J. Zhou et al., "LogDLR: Unsupervised Cross-System Log Anomaly Detection Through Domain-Invariant Latent Representation," in IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 4, pp. 4456-4471, July-Aug. 2025, doi: 10.1109/TDSC.2025.3548050. keywords: {Semantics;Anomaly detection;Feature extraction;Transformers;Data models;Training;Autoencoders;Syntactics;Vectors;Long short term memory;Anomaly detection;log analysis;adversarial training}, [https://ieeexplore.ieee.org/document/9865986](https://ieeexplore.ieee.org/document/10910216)
Published in Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
In this paper, we propose GLog, an end-to-end self-evolving log anomaly prediction framework. It fine-tunes instruction-tuned LLMs to achieve high-accuracy anomaly detection on raw unparsed logs, clusters anomalies for automatic pseudo label generation, and supports continuous self-evolving model optimization, which greatly reduces manual annotation cost and adapts to evolving system behaviors.
Recommended citation: JunWei Zhou, Yuyang Gao, Cheng Tan, Yanchao Yang, and Jianwen Xiang. 2025. Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering. In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS 25). Association for Computing Machinery, New York, NY, USA, 4791–4793. https://dl.acm.org/doi/10.1145/3719027.3760727
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.