{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:11Z","timestamp":1772119931159,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["No. 2022YFB3104103"],"award-info":[{"award-number":["No. 2022YFB3104103"]}]},{"name":"the Major Key Project of PCL","award":["No. PCL2024A05-3"],"award-info":[{"award-number":["No. PCL2024A05-3"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s11280-025-01380-w","type":"journal-article","created":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T08:32:09Z","timestamp":1760776329000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DPP-CL: orthogonal subspace continual learning for dialogue policy planning"],"prefix":"10.1007","volume":"28","author":[{"given":"Yue","family":"Han","sequence":"first","affiliation":[]},{"given":"Rong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yinxuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Aiping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weihong","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,18]]},"reference":[{"key":"1380_CR1","doi-asserted-by":"publisher","first-page":"4615","DOI":"10.1109\/ACCESS.2019.2963056","volume":"8","author":"SS Sarwar","year":"2019","unstructured":"Sarwar, S.S., Ankit, A., Roy, K.: Incremental learning in deep convolutional neural networks using partial network sharing. Ieee Access 8, 4615\u20134628 (2019)","journal-title":"Ieee Access"},{"key":"1380_CR2","unstructured":"Yoon, J., Kim, S., Yang, E., Hwang, S.J.: Scalable and order-robust continual learning with additive parameter decomposition (2019). arXiv preprint arXiv:1902.09432"},{"key":"1380_CR3","doi-asserted-by":"publisher","first-page":"150480","DOI":"10.1109\/ACCESS.2021.3126027","volume":"9","author":"G Saha","year":"2021","unstructured":"Saha, G., Garg, I., Ankit, A., Roy, K.: Space: structured compression and sharing of representational space for continual learning. IEEE Access 9, 150480\u2013150494 (2021)","journal-title":"IEEE Access"},{"key":"1380_CR4","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1109\/ACCESS.2019.2961960","volume":"8","author":"I Garg","year":"2019","unstructured":"Garg, I., Panda, P., Roy, K.: A low effort approach to structured cnn design using pca. IEEE Access 8, 1347\u20131360 (2019)","journal-title":"IEEE Access"},{"key":"1380_CR5","first-page":"1023","volume":"33","author":"Y Guo","year":"2020","unstructured":"Guo, Y., Liu, M., Yang, T., Rosing, T.: Improved schemes for episodic memory-based lifelong learning. Adv. Neural. Inf. Process. Syst. 33, 1023\u20131035 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1380_CR6","unstructured":"Lopez-Paz, D., Ranzato, M.: Gradient episodic memory for continual learning. Adv. Neural Inform. Process. Syst. 30 (2017)"},{"key":"1380_CR7","unstructured":"Chaudhry, A., Ranzato, M., Rohrbach, M., Elhoseiny, M.: Efficient lifelong learning with a-gem (2018). arXiv preprint arXiv:1812.00420"},{"key":"1380_CR8","unstructured":"Saha, G., Garg, I., Roy, K.: Gradient projection memory for continual learning (2021). arXiv preprint arXiv:2103.09762"},{"issue":"4","key":"1380_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s11280-025-01351-1","volume":"28","author":"X Tang","year":"2025","unstructured":"Tang, X., Chen, L., Yang, W., Yang, Z., Ju, M., Shu, X., Yang, Z., Tang, Y.: Tabular-textual question answering: from parallel program generation to large language models. World Wide Web 28(4), 42 (2025)","journal-title":"World Wide Web"},{"key":"1380_CR10","unstructured":"Williams, J.D., Zweig, G.: End-to-end lstm-based dialog control optimized with supervised and reinforcement learning (2016). arXiv preprint arXiv:1606.01269"},{"key":"1380_CR11","doi-asserted-by":"crossref","unstructured":"Cuay\u00e1huitl, H.: Simpleds: A simple deep reinforcement learning dialogue system. In: Dialogues with Social Robots: Enablements, Analyses, and Evaluation, pp. 109\u2013118 (2016). Springer","DOI":"10.1007\/978-981-10-2585-3_8"},{"key":"1380_CR12","doi-asserted-by":"crossref","unstructured":"Lu, K., Zhang, S., Chen, X.: Goal-oriented dialogue policy learning from failures. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 2596\u20132603 (2019)","DOI":"10.1609\/aaai.v33i01.33012596"},{"key":"1380_CR13","doi-asserted-by":"crossref","unstructured":"Sreedhar, M.N., Rebedea, T., Parisien, C.: Unsupervised extraction of dialogue policies from conversations (2024). arXiv preprint arXiv:2406.15214","DOI":"10.18653\/v1\/2024.emnlp-main.1060"},{"key":"1380_CR14","unstructured":"Geishauser, C., Niekerk, C., Lubis, N., Heck, M., Lin, H.-C., Feng, S., Ga\u0161i\u0107, M.: Dynamic dialogue policy for continual reinforcement learning (2022). arXiv preprint arXiv:2204.05928"},{"key":"1380_CR15","doi-asserted-by":"crossref","unstructured":"He, T., Liao, L., Cao, Y., Liu, Y., Liu, M., Chen, Z., Qin, B.: Planning like human: A dual-process framework for dialogue planning (2024). arXiv preprint arXiv:2406.05374","DOI":"10.18653\/v1\/2024.acl-long.262"},{"key":"1380_CR16","doi-asserted-by":"crossref","unstructured":"He, T., Liao, L., Cao, Y., Liu, Y., Sun, Y., Chen, Z., Liu, M., Qin, B.: Simulation-free hierarchical latent policy planning for proactive dialogues. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 39, pp. 24032\u201324040 (2025)","DOI":"10.1609\/aaai.v39i22.34577"},{"issue":"4","key":"1380_CR17","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11280-025-01364-w","volume":"28","author":"S Yang","year":"2025","unstructured":"Yang, S., Doan, B.G., Montague, P., De Vel, O., Abraham, T., Abuadbba, A., Abbasnejad, E., Camtepe, S., Ranasinghe, D.C., Kanhere, S.S.: Graph spectral purification for backdoor defence in graph neural networks. World Wide Web 28(4), 49 (2025)","journal-title":"World Wide Web"},{"issue":"4","key":"1380_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-025-01354-y","volume":"28","author":"J Yu","year":"2025","unstructured":"Yu, J., Wang, H., Chen, C., Wang, X., Qin, L., Zhang, W., Zhang, Y., Liu, X.: Rida: a robust attack framework on incomplete graphs. World Wide Web 28(4), 1\u201324 (2025)","journal-title":"World Wide Web"},{"key":"1380_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, X., Jiang, R., Han, Y., Li, A., Peng, Z.: A survey on cybersecurity knowledge graph construction. Comput. Secur. 136, 103524 (2024)","DOI":"10.1016\/j.cose.2023.103524"},{"key":"1380_CR20","doi-asserted-by":"crossref","unstructured":"Schlette, D., Vielberth, M., Pernul, G.: Cti-soc2m2-the quest for mature, intelligence-driven security operations and incident response capabilities. Comput. Secur. 111, 102482 (2021)","DOI":"10.1016\/j.cose.2021.102482"},{"key":"1380_CR21","unstructured":"Chen, T., Dong, C., Lv, M., Song, Q., Liu, H., Zhu, T., Xu, K., Chen, L., Ji, S., Fan, Y.: Apt-kgl: An intelligent apt detection system based on threat knowledge and heterogeneous provenance graph learning. IEEE Trans Dependable Secure Comput. (2022)"},{"issue":"6","key":"1380_CR22","doi-asserted-by":"publisher","first-page":"5247","DOI":"10.1109\/TDSC.2023.3243667","volume":"20","author":"T Zhu","year":"2023","unstructured":"Zhu, T., Yu, J., Xiong, C., Cheng, W., Yuan, Q., Ying, J., Chen, T., Zhang, J., Lv, M., Chen, Y., et al.: Aptshield: a stable, efficient and real-time apt detection system for linux hosts. IEEE Trans. Dependable Secure Comput. 20(6), 5247\u20135264 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1380_CR23","unstructured":"Jia, Z., Xiong, Y., Nan, Y., Zhang, Y., Zhao, J., Wen, M.: $$\\{$$MAGIC$$\\}$$: Detecting advanced persistent threats via masked graph representation learning. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 5197\u20135214 (2024)"},{"key":"1380_CR24","doi-asserted-by":"crossref","unstructured":"Fieblinger, R., Alam, M.T., Rastogi, N.: Actionable cyber threat intelligence using knowledge graphs and large language models. In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 100\u2013111 (2024). IEEE","DOI":"10.1109\/EuroSPW61312.2024.00018"},{"issue":"2","key":"1380_CR25","doi-asserted-by":"publisher","first-page":"324","DOI":"10.3390\/electronics14020324","volume":"14","author":"Y Han","year":"2025","unstructured":"Han, Y., Jiang, R., Li, C., Huang, Y., Chen, K., Yu, H., Li, A., Han, W., Pang, S., Zhao, X.: At4ctire: adversarial training for cyber threat intelligence relation extraction. Electronics 14(2), 324 (2025)","journal-title":"Electronics"},{"key":"1380_CR26","doi-asserted-by":"crossref","unstructured":"Satapara, S., Srijith, P.: Tl-cl: Task and language incremental continual learning. In: Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, pp. 12123\u201312142 (2024)","DOI":"10.18653\/v1\/2024.emnlp-main.676"},{"key":"1380_CR27","doi-asserted-by":"crossref","unstructured":"Wang, M., Adel, H., Lange, L., Str\u00f6tgen, J., Sch\u00fctze, H.: Rehearsal-free modular and compositional continual learning for language models (2024). arXiv preprint arXiv:2404.00790","DOI":"10.18653\/v1\/2024.naacl-short.39"},{"key":"1380_CR28","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, T., Ge, Q., Xia, H., Bao, R., Zheng, R., Zhang, Q., Gui, T., Huang, X.: Orthogonal subspace learning for language model continual learning (2023). arXiv preprint arXiv:2310.14152","DOI":"10.18653\/v1\/2023.findings-emnlp.715"},{"issue":"2","key":"1380_CR29","first-page":"3","volume":"1","author":"EJ Hu","year":"2022","unstructured":"Hu, E.J., Shen, Y., Wallis, P., Allen-Zhu, Z., Li, Y., Wang, S., Wang, L., Chen, W., et al.: Lora: low-rank adaptation of large language models. ICLR 1(2), 3 (2022)","journal-title":"ICLR"},{"key":"1380_CR30","doi-asserted-by":"crossref","unstructured":"Karpukhin, V., Oguz, B., Min, S., Lewis, P.S., Wu, L., Edunov, S., Chen, D., Yih, W.-t.: Dense passage retrieval for open-domain question answering. In: EMNLP (1), pp. 6769\u20136781 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"1380_CR31","doi-asserted-by":"crossref","unstructured":"Taneeya, Ferraro, F., Finin, T.: Casie: Extracting cybersecurity event information from text. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 8749\u20138757 (2020)","DOI":"10.1609\/aaai.v34i05.6401"},{"key":"1380_CR32","unstructured":"Farajtabar, M., Azizan, N., Mott, A., Li, A.: Orthogonal gradient descent for continual learning. In: International Conference on Artificial Intelligence and Statistics, pp. 3762\u20133773 (2020). PMLR"},{"key":"1380_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhang, Z., Lee, C.-Y., Zhang, H., Sun, R., Ren, X., Su, G., Perot, V., Dy, J., Pfister, T.: Learning to prompt for continual learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 139\u2013149 (2022)","DOI":"10.1109\/CVPR52688.2022.00024"},{"key":"1380_CR34","unstructured":"Qin, C., Joty, S.: Lfpt5: A unified framework for lifelong few-shot language learning based on prompt tuning of t5 (2021). arXiv preprint arXiv:2110.07298"},{"key":"1380_CR35","unstructured":"Razdaibiedina, A., Mao, Y., Hou, R., Khabsa, M., Lewis, M., Almahairi, A.: Progressive prompts: Continual learning for language models (2023). arXiv preprint arXiv:2301.12314"},{"key":"1380_CR36","doi-asserted-by":"crossref","unstructured":"Wang, Z., Liu, Y., Ji, T., Wang, X., Wu, Y., Jiang, C., Chao, Y., Han, Z., Wang, L., Shao, X., et al: Rehearsal-free continual language learning via efficient parameter isolation. In: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 10933\u201310946 (2023)","DOI":"10.18653\/v1\/2023.acl-long.612"},{"key":"1380_CR37","doi-asserted-by":"crossref","unstructured":"Zhao, W., Wang, S., Hu, Y., Zhao, Y., Qin, B., Zhang, X., Yang, Q., Xu, D., Che, W.: Sapt: A shared attention framework for parameter-efficient continual learning of large language models (2024). arXiv preprint arXiv:2401.08295","DOI":"10.18653\/v1\/2024.acl-long.625"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-025-01380-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-025-01380-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-025-01380-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T04:06:32Z","timestamp":1764821192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-025-01380-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,18]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["1380"],"URL":"https:\/\/doi.org\/10.1007\/s11280-025-01380-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7024974\/v1","asserted-by":"object"}]},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,18]]},"assertion":[{"value":"2 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable. This paper makes no mention of ethical issues.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"I declare that the authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Yes, we agree.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"65"}}