Black-box Attacks to Log-based Anomaly Detection | IEEE Conference Publication | IEEE Xplore