LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly Detection
This program is tentative and subject to change.
Robust anomaly detection in system logs plays a crucial role in maintaining stable and reliable software operations. However, existing methods often struggle to accommodate evolving log formats and distributional shifts across systems, as they heavily rely on large volumes of labeled data, log parsing, and predefined event templates. To address these challenges, we propose LogMoE, a scalable and parsing-free log anomaly detection framework. LogMoE utilizes labeled logs from multiple mature systems to train a set of lightweight expert models, which are integrated via a gating mechanism within a Mixture-of-Experts (MoE) architecture. This design enables LogMoE to generalize effectively to previously unseen target systems. By eliminating the need for log parsing, our approach remains robust against the heterogeneity of log formats and syntactic structures. We conduct extensive evaluations on eight log datasets under varying generalization scenarios: single-system, homogeneous-system, and heterogeneous-system. Experimental results demonstrate that LogMoE consistently achieves robust generalization, particularly under conditions with scarce labeled data in the target system. As such, LogMoE provides a scalable, parsing-free, and generalization-capable solution tailored for complex and continuously evolving software system environments, positioning it as a future-ready approach to log anomaly detection.
This program is tentative and subject to change.
Mon 17 NovDisplayed time zone: Seoul change
11:00 - 12:40 | |||
11:00 10mTalk | LogMoE: Lightweight Expert Mixture for Cross-System Log Anomaly Detection Research Papers Jiaxing Qi Beihang University, Zhongzhi Luan Beihang University, Shaohan Huang Beihang University, Carol Fung Concordia University, Yuchen Wang Beihang University, Aibin Wang Beihang University, Hongyu Zhang Chongqing University, Hailong Yang Beihang University, China, Depei Qian Beihang University, China | ||
11:10 10mTalk | Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces Research Papers Wang Jialai National University of Singapore, Juncheng Lu Southeast University, Jie Yang Wuhan University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zeyu Gao Tsinghua University, Chao Zhang Tsinghua University, Zhenkai Liang NUS, Ee-Chien Chang School of Computing, NUS | ||
11:20 10mTalk | LogUpdater: Automated Detection and Repair of Specific Defects in Logging Statements Journal-First Track Renyi Zhong The Chinese University of Hong Kong, Yichen LI ByteDance, Jinxi Kuang The Chinese University of Hong Kong, Wenwei Gu The Chinese University of Hong Kong, Yintong Huo Singapore Management University, Singapore, Michael Lyu The Chinese University of Hong Kong | ||
11:30 10mTalk | LogAction: Consistent Cross-system Anomaly Detection through Logs via Active Domain Adaptation Research Papers Chiming Duan Peking University, Minghua He Peking University, Pei Xiao Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Xin Zhang Peking University, Zhewei Zhong Bytedance, Xiang Luo Bytedance, Yan Niu Bytedance, Lingzhe Zhang Peking University, China, Yifan Wu Peking University, Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University | ||
11:40 10mTalk | Diplomatist: What Do Cross-language Dependencies Reflect Software Ecosystem Health? Research Papers Fanyi Meng Shenyang University of Technology, Ying Wang Northeastern University, Chun Yong Chong Monash University Malaysia, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China | ||
11:50 10mTalk | Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Reasoning Research Papers Xin Wang Changsha University of Science and Technology, Zhenhao Li York University, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou) | ||
12:00 10mTalk | Which Is Better For Reducing Outdated And Vulnerable Dependencies: Pinning Or Floating? Research Papers Imranur Rahman North Carolina State University, Jill Marley North Carolina State University, William Enck North Carolina State University, Laurie Williams North Carolina State University | ||
12:10 10mTalk | On Automating Configuration Dependency Validation via Retrieval-Augmented Generation Research Papers Sebastian Simon Leipzig University, Alina Mailach Leipzig University, Johannes Dorn Leipzig University, Norbert Siegmund Leipzig University Pre-print | ||
12:20 10mTalk | CollaborLog: Efficient-Generalizable Log Anomaly Detection via Large-Small Model Collaboration in Software Evolution Research Papers Pei Xiao Peking University, Chiming Duan Peking University, Minghua He Peking University, Tong Jia Institute for Artificial Intelligence, Peking University, Beijing, China, Yifan Wu Peking University, Jing Xu ByteDance, Gege Gao ByteDance, Lingzhe Zhang Peking University, China, Weijie Hong Peking university, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Gang Huang Peking University | ||
12:30 10mTalk | On the Robustness Evaluation of 3D Obstacle Detection Against Specifications in Autonomous Driving Research Papers Tri Minh-Triet Pham Concordia University, Bo Yang Concordia University, Jinqiu Yang Concordia University | ||