Abstract: With the rapid development of software systems, logs have become essential data for monitoring the security and stability of computer systems. Current log anomaly detection methods usually ...