{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:31:08Z","timestamp":1764937868553,"version":"3.40.4"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["SBK2023041256"],"award-info":[{"award-number":["SBK2023041256"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302097"],"award-info":[{"award-number":["62302097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnsm.2025.3538895","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:23:58Z","timestamp":1740083038000},"page":"1955-1971","source":"Crossref","is-referenced-by-count":1,"title":["Class Incremental Website Fingerprinting Attack Based on Dynamic Expansion Architecture"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9258-9929","authenticated-orcid":false,"given":"Yali","family":"Yuan","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7586-4575","authenticated-orcid":false,"given":"Yangyang","family":"Du","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8642-4362","authenticated-orcid":false,"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"12","article-title":"ToR: The second-generation onion router","volume-title":"Proc. USENIX Security Symp.","author":"Dingledine"},{"volume-title":"Users\u2014ToR metrics.","year":"2023","key":"ref2"},{"key":"ref3","first-page":"227","article-title":"A systematic approach to developing and evaluating website fingerprinting defenses","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Cai"},{"key":"ref4","first-page":"253","article-title":"Characterization of ToR traffic using time based features","volume-title":"Proc. Int. Conf. Inf. Syst. Security Privacy","author":"Lashkari"},{"key":"ref5","first-page":"191","article-title":"Side-channel leaks in Web applications: A reality today, a challenge tomorrow","volume-title":"Proc. IEEE Symp. Security Privacy","author":"Chen"},{"key":"ref6","first-page":"287","article-title":"Circuit fingerprinting attacks: Passive deanonymization of ToR hidden services","volume-title":"Proc. USENIX Security Symp.","author":"Kwon"},{"key":"ref7","first-page":"328","article-title":"Revisiting assumptions for website fingerprinting attacks","volume-title":"Proc. ACM Asia Conf. Comput. Commun. Security","author":"Cui"},{"key":"ref8","first-page":"605","article-title":"Touching from a distance: Website fingerprinting attacks and defenses","volume-title":"Proc. ACM Conf. Comput. Commun. Security","author":"Cai"},{"key":"ref9","first-page":"201","article-title":"Improved website fingerprinting on ToR","volume-title":"Proc. 12th ACM Workshop Privacy Electron. Soc.","author":"Wang"},{"key":"ref10","first-page":"200","article-title":"Feature selection for website fingerprinting","volume-title":"Proc. Privacy Enhanc. Technol.","author":"Yan"},{"key":"ref11","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","volume-title":"Proc. USENIX Security Symp.","author":"Wang"},{"volume-title":"Automated website fingerprinting through deep learning.","year":"2017","author":"Rimmer","key":"ref12"},{"key":"ref13","first-page":"1928","article-title":"Deep fingerprinting: Undermining website fingerprinting defenses with deep learning","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Sirinam"},{"key":"ref14","first-page":"191","article-title":"p1-FP: Extraction, classification, and prediction of website fingerprints with deep learning","volume-title":"Proc. Privacy Enhanc. Technol.","author":"Oh"},{"key":"ref15","first-page":"5","article-title":"TIK-TOK: The utility of packet timing in website fingerprinting attacks","volume-title":"Proc. Privacy Enhanc. Technol.","author":"Rahman"},{"key":"ref16","first-page":"21","article-title":"On realistically attacking ToR with website fingerprinting","volume-title":"Proc. Privacy Enhanc. Technol.","author":"Wang"},{"key":"ref17","first-page":"263","article-title":"A critical evaluation of website fingerprinting attacks","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Ju\u00e1rez"},{"key":"ref18","first-page":"753","article-title":"Online website fingerprinting: Evaluating website fingerprinting attacks on ToR in the real world","volume-title":"Proc. USENIX Security Symp.","author":"Cherubin"},{"key":"ref19","first-page":"1005","article-title":"Robust multi-tab website fingerprinting attacks in the wild","volume-title":"Proc. IEEE Symp. Security Privacy (SP)","author":"Deng"},{"issue":"6","key":"ref20","doi-asserted-by":"crossref","first-page":"3656","DOI":"10.1109\/TDSC.2021.3104869","article-title":"An automated multi-tab website fingerprinting attack","volume":"19","author":"Yin","year":"2022","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"ref21","first-page":"1131","article-title":"Triplet fingerprinting: More practical and portable website fingerprinting with N-shot learning","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Sirinam"},{"key":"ref22","article-title":"Few-shot website fingerprinting attack with data augmentation","volume":"2021","author":"Chen","year":"2021","journal-title":"Security Commun. Netw."},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109780","article-title":"Few-shot website fingerprinting attack with cluster adaptation","volume":"229","author":"Zhou","year":"2023","journal-title":"Comput. Netw."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TIFS.2022.3158086","article-title":"SNWF: Website fingerprinting attack by ensembling the snapshot of deep learning","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref25","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","volume-title":"Proc. USENIX Security Symp.","author":"Shen"},{"volume-title":"Servers\u2014ToR metrics.","year":"2023","key":"ref26"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.neunet.2019.01.012","article-title":"Continual lifelong learning with neural networks: A review","volume":"113","author":"Parisi","year":"2019","journal-title":"J. Int. Neural Netw. Soc."},{"key":"ref28","first-page":"3013","article-title":"DER: Dynamically expandable representation for class incremental learning","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Yan"},{"key":"ref29","first-page":"908","article-title":"Resolving task confusion in dynamic expansion architectures for class incremental learning","volume-title":"Proc. AAAI Conf. Artif. Intell.","author":"Huang"},{"key":"ref30","first-page":"9286","article-title":"Self-sustaining representation expansion for non-exemplar class-incremental learning","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Zhu"},{"key":"ref31","article-title":"Preserving earlier knowledge in continual learning with the help of all previous feature extractors","volume-title":"arxiv.abs\/2104.13614","author":"Li","year":"2021"},{"key":"ref32","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","volume-title":"Proc. USENIX Security Symp.","author":"Hayes"},{"key":"ref33","first-page":"1","article-title":"Website fingerprinting at Internet scale","volume-title":"Proc. Netw. Distrib. Syst. Security Symp.","author":"Panchenko"},{"key":"ref34","first-page":"1","article-title":"Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial Na\u00efve Bayes classifier","volume-title":"Proc. Cloud Comput. Security Workshop","author":"Herrmann"},{"key":"ref35","article-title":"WTF-PAD: Toward an efficient website fingerprinting defense for ToR","volume-title":"arxiv.abs\/1512.00524","author":"Ju\u00e1rez","year":"2015"},{"key":"ref36","first-page":"292","article-title":"Var-CNN: A data-efficient website fingerprinting attack based on deep learning","volume-title":"Proc. Privacy Enhanc. Technol.","author":"Bhat"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670272"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109811","article-title":"Effective website fingerprinting attack based on the first packet direction only","volume":"231","author":"Attarian","year":"2023","journal-title":"Comput. Netw."},{"key":"ref39","first-page":"1035","article-title":"Realistic website fingerprinting by augmenting network traces","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Bahramali"},{"key":"ref40","first-page":"169","article-title":"TForm-RF: An efficient data augmentation for website fingerprinting attack","volume-title":"Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)","author":"Chen"},{"key":"ref41","first-page":"1050","article-title":"Transformer-based model for multi-tab website fingerprinting attack","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Jin"},{"key":"ref42","first-page":"248","article-title":"BAPM: Block attention profiling model for multi-tab website fingerprinting attacks on ToR","volume-title":"Proc. 37th Annu. Comput. Security Appl. Conf.","author":"Guan"},{"key":"ref43","first-page":"2459","article-title":"DFD: Adversarial learning-based approach to defend against website fingerprinting","volume-title":"Proc. IEEE Conf. Comput. Commun. (IEEE INFOCOM)","author":"Abusnaina"},{"issue":"2","key":"ref44","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1109\/TDSC.2019.2907240","article-title":"BiMorphing: A bi-directional bursting defense against website fingerprinting attacks","volume":"18","author":"Al-Naami","year":"2021","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"ref45","first-page":"12","article-title":"Defeating DNN-based traffic analysis systems in real-time with blind adversarial perturbations","volume-title":"Proc. USENIX Security Symp.","author":"Nasr"},{"key":"ref46","first-page":"121","article-title":"CS-BuFLO: A congestion sensitive website fingerprinting defense","volume-title":"Proc. 13th Workshop Privacy Electron. Soc.","author":"Cai"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3360082"},{"key":"ref48","first-page":"332","article-title":"Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail","volume-title":"Proc. IEEE Symp. Security Privacy","author":"Dyer"},{"key":"ref49","first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","volume-title":"Proc. USENIX Security Symp.","author":"Gong"},{"key":"ref50","first-page":"1375","article-title":"Walkie\u2013talkie: An efficient defense against passive website fingerprinting attacks","volume-title":"Proc. USENIX Security Symp.","author":"Wang"},{"key":"ref51","first-page":"344","article-title":"RegulaTor: A straightforward website fingerprinting defense","volume-title":"Proc. Privacy Enhanc. Technol.","author":"Holland"},{"key":"ref52","first-page":"1971","article-title":"TrafficSliver: Fighting website fingerprinting attacks with traffic splitting","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"la Cadena"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833722"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00247"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"7794","DOI":"10.1109\/TIFS.2024.3436818","article-title":"RUDOLF: An efficient and adaptive defense approach against website fingerprinting attacks based on soft actor\u2013critic algorithm","volume":"19","author":"Jiang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"2437","DOI":"10.1109\/TIFS.2022.3186743","article-title":"Minipatch: Undermining DNN-based website fingerprinting with adversarial patches","volume":"17","author":"Li","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref57","first-page":"310","article-title":"Towards an efficient defense against deep learning based website fingerprinting","volume-title":"Proc. IEEE Conf. Comput. Commun. (IEEE INFOCOM)","author":"Ling"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/TIFS.2020.3039691","article-title":"MockingBird: Defending against deep-learning-based website fingerprinting attacks with adversarial traces","volume":"16","author":"Rahman","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"3109","DOI":"10.1109\/TIFS.2021.3074295","article-title":"AWA: Adversarial website adaptation","volume":"16","author":"Sadeghzadeh","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref60","first-page":"969","article-title":"SoK: A critical evaluation of efficient website fingerprinting defenses","volume-title":"Proc. IEEE Symp. Security Privacy (SP)","author":"Mathews"},{"key":"ref61","article-title":"A comprehensive, application-oriented study of catastrophic forgetting in DNNs","volume-title":"arxiv.abs\/1905.08101","author":"Pf\u00fclb","year":"2019"},{"key":"ref62","first-page":"13843","article-title":"Incremental few-shot object detection","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"P\u00e9rez-R\u00faa"},{"key":"ref63","first-page":"9230","article-title":"Modeling the background for incremental learning in semantic segmentation","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Cermelli"},{"key":"ref64","first-page":"1","article-title":"LAMOL: Language modeling for lifelong language learning","volume-title":"Proc. Int. Conf. Learn. Rep.","author":"Sun"},{"key":"ref65","first-page":"9","article-title":"Neural topic modeling with continual lifelong learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gupta"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.004"},{"key":"ref67","article-title":"Efficient adaptation for end-to-end vision-based robotic manipulation","volume-title":"arxiv.2004.10190","author":"Julian","year":"2020"},{"key":"ref68","first-page":"524","article-title":"GDumb: A simple approach that questions our progress in continual learning","volume-title":"Proc. Eur. Conf. Comput. Vis.","author":"Prabhu"},{"key":"ref69","first-page":"3521","article-title":"Overcoming catastrophic forgetting in neural networks","volume-title":"Proc. Nat. Acad. Sci. USA","volume":"114","author":"Kirkpatrick"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19806-9_23"},{"issue":"12","key":"ref71","doi-asserted-by":"crossref","first-page":"2935","DOI":"10.1109\/TPAMI.2017.2773081","article-title":"Learning without forgetting","volume":"40","author":"Li","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref72","first-page":"831","article-title":"Learning a unified classifier incrementally via rebalancing","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Hou"},{"key":"ref73","article-title":"Dark experience for general continual learning: A strong, simple baseline","volume-title":"arxiv.abs\/2004.07211","author":"Buzzega","year":"2020"},{"key":"ref74","article-title":"Continual learning: A comparative study on how to defy forgetting in classification tasks","volume-title":"arxiv.abs\/1909.08383","author":"Lange","year":"2019"},{"key":"ref75","first-page":"5133","article-title":"Learning without memorizing","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Dhar"},{"issue":"5","key":"ref76","doi-asserted-by":"crossref","first-page":"2030","DOI":"10.1109\/TNNLS.2020.2995884","article-title":"Probabilistic knowledge transfer for lightweight deep representation learning","volume":"32","author":"Passalis","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref77","first-page":"7132","article-title":"Squeeze-and-excitation networks","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Hu"},{"key":"ref78","first-page":"13205","article-title":"Maintaining discrimination and fairness in class incremental learning","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Zhao"},{"key":"ref79","article-title":"Network in network","volume-title":"arxiv.abs\/1312.4400","author":"Lin","year":"2013"},{"key":"ref80","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108739","article-title":"Few-shot website fingerprinting attack with Meta-bias learning","volume":"130","author":"Chen","year":"2022","journal-title":"Pattern Recognit."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1_79"},{"key":"ref82","article-title":"How does mixup help with robustness and generalization?","volume-title":"arxiv.abs\/2010.04819","author":"Zhang","year":"2020"},{"volume-title":"Sulla determinazione emp\u00edrica di uma legge di distribuzione.","year":"1933","author":"Kolmogorov-Smirnov","key":"ref83"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1214\/aoms\/1177730256","article-title":"Table for estimating the goodness of fit of empirical distributions","volume":"19","author":"Smirnov","year":"1948","journal-title":"Ann. Math. Stat."},{"issue":"6","key":"ref85","doi-asserted-by":"crossref","first-page":"4039","DOI":"10.1109\/TDSC.2021.3117145","article-title":"XAI-based microarchitectural side-channel analysis for website fingerprinting attacks and defenses","volume":"19","author":"Gulmezoglu","year":"2022","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"ref86","first-page":"149","article-title":"Adaptive fingerprinting: Website fingerprinting over few encrypted traffic","volume-title":"Proc. 11th ACM Conf. Data Appl. Security Privacy","author":"Wang"},{"key":"ref87","first-page":"86","article-title":"PODNet: Pooled outputs distillation for small-tasks incremental learning","volume-title":"Proc. Eur. Conf. Comput. Vis.","author":"Douillard"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10973774\/10897326.pdf?arnumber=10897326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:56:35Z","timestamp":1745430995000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10897326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":87,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3538895","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}