{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:18:44Z","timestamp":1773314324840,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2025,2,1]]},"DOI":"10.1587\/transinf.2024edp7129","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T22:18:20Z","timestamp":1726179500000},"page":"124-136","source":"Crossref","is-referenced-by-count":4,"title":["Incremental Learning for Network Traffic Classification Using Generative Adversarial Networks"],"prefix":"10.1587","volume":"E108.D","author":[{"given":"Guangjin","family":"OUYANG","sequence":"first","affiliation":[{"name":"School of Computer and Information Technology, Qiannan Normal University for Nationalities"},{"name":"Experimental Training Centre, Qiannan Normal University for Nationalities"}]},{"given":"Yong","family":"GUO","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Qiannan Normal University for Nationalities"},{"name":"Experimental Training Centre, Qiannan Normal University for Nationalities"}]},{"given":"Yu","family":"LU","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Qiannan Normal University for Nationalities"}]},{"given":"Fang","family":"HE","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Qiannan Normal University for Nationalities"},{"name":"Experimental Training Centre, Qiannan Normal University for Nationalities"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Q. Wang, W. Li, H. Bao, Z. Tang, W. Wang, F. Liu, and L. Ying, \u201cHigh-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree,\u201d IEEE Military Communications Conference, Rockville, MD, USA, pp.458-463, 2022. 10.1109\/milcom55135.2022.10017968","DOI":"10.1109\/MILCOM55135.2022.10017968"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] A.R. Khesal and M. Teimouri, \u201cThe Effect of Network Environment on Traffic Classification,\u201d International Conference on Computer and Knowledge Engineering, Wuhan, China, pp.059-064, 2022. 10.1109\/iccke57176.2022.9960138","DOI":"10.1109\/ICCKE57176.2022.9960138"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] Y. Dhote, S. Agrawal, and A.J. Deen, \u201cA survey on feature selection techniques for internet traffic classification,\u201d International Conference on Computational Intelligence and Communication Networks, Jabalpur, India, pp.1375-1380, 2015. 10.1109\/cicn.2015.267","DOI":"10.1109\/CICN.2015.267"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] Z. Chen, K. He, J. Li, and Y. Geng, \u201cSeq2img: A sequence-to-image based approach towards ip traffic classification using convolutional neural networks,\u201d IEEE International conference on big data, Boston, Ma, USA, pp.1271-1276, 2017. 10.1109\/bigdata.2017.8258054","DOI":"10.1109\/BigData.2017.8258054"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] W. Wang, M. Zhu, X. Zeng, X. Ye, and Y. Sheng, \u201cMalware traffic classification using convolutional neural network for representation learning,\u201d International conference on information networking, Da Nang, Vietnam, pp.712-717, 2017. 10.1109\/icoin.2017.7899588","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] H. Dahmouni, S. Vaton, and D. Ross\u00e9, \u201cA markovian signature-based approach to IP traffic classification,\u201d Proc. 3rd annual ACM workshop on Mining network data, San Diego, California, USA, pp.29-34, 2007. 10.1145\/1269880.1269889","DOI":"10.1145\/1269880.1269889"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] C. Thay, V. Visoottiviseth, and S. Mongkolluksamee, \u201cP2P traffic classification for residential network,\u201d International Computer Science and Engineering Conference, Chiang Mai, Thailand, pp.1-6, 2015. 10.1109\/icsec.2015.7401433","DOI":"10.1109\/ICSEC.2015.7401433"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] T. Bujlow, V. Carela-Espa\u00f1ol, and P. Barlet-Ros, \u201cIndependent comparison of popular DPI tools for traffic classification,\u201d Computer Networks, vol.76, pp.75-89, Jan. 2015. doi: 10.1016\/j.comnet.2014.11.001. 10.1016\/j.comnet.2014.11.001","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] P. Khandait, N. Hubballi, and B. Mazumdar, \u201cEfficient keyword matching for deep packet inspection based network traffic classification,\u201d International Conference on COMmunication Systems &amp; NETworkS, Online, pp.567-570, 2020. 10.1109\/comsnets48256.2020.9027353","DOI":"10.1109\/COMSNETS48256.2020.9027353"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] V.F. Taylor, R. Spolaor, M. Conti, and I. Martinovic, \u201cAppscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic,\u201d IEEE European Symposium on Security and Privacy, Saarbrucken, Germany, pp.439-454, 2016. 10.1109\/eurosp.2016.40","DOI":"10.1109\/EuroSP.2016.40"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] N. Hubballi and M. Swarnkar, \u201c<i>Bitcoding<\/i>: Network traffic classification through encoded bit level signatures,\u201d IEEE\/ACM Trans. Netw., vol.26, no.5, pp.2334-2346, Oct. 2018. doi: 10.1109\/TNET.2018.2868816. 10.1109\/tnet.2018.2868816","DOI":"10.1109\/TNET.2018.2868816"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] Z. Wu, Y.-N. Dong, X. Qiu, and J. Jin, \u201cOnline multimedia traffic classification from the QoS perspective using deep learning,\u201d Computer Networks, vol.204, p.108716, Feb. 2022. doi: 10.1016\/j.comnet.2021.108716. 10.1016\/j.comnet.2021.108716","DOI":"10.1016\/j.comnet.2021.108716"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] G. Aceto, D. Ciuonzo, A. Montieri, A. Nascita, and A. Pescap\u00e9, \u201cEncrypted multitask traffic classification via multimodal deep learning,\u201d IEEE International Conference on Communications, Online, pp.1-6, 2021. 10.1109\/icc42927.2021.9500316","DOI":"10.1109\/ICC42927.2021.9500316"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] A. Rasteh, F. Delpech, C. Aguilar-Melchor, R. Zimmer, S.B. Shouraki, and T. Masquelier, \u201cEncrypted internet traffic classification using a supervised spiking neural network,\u201d Neurocomputing, vol.503, pp.272-282, 2022. doi: 10.1016\/j.neucom.2022.06.055 10.1016\/j.neucom.2022.06.055","DOI":"10.1016\/j.neucom.2022.06.055"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] W. Wang, M. Zhu, J. Wang, X. Zeng, and Z. Yang, \u201cEnd-to-end encrypted traffic classification with one-dimensional convolution neural networks,\u201d IEEE international conference on intelligence and security informatics, Beijing, China, pp.43-48, 2017. 10.1109\/isi.2017.8004872","DOI":"10.1109\/ISI.2017.8004872"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and J. Lloret, \u201cNetwork traffic classifier with convolutional and recurrent neural networks for Internet of Things,\u201d IEEE access, vol.5, pp.18042-18050, 2017. doi: 10.1109\/ACCESS.2017.2747560. 10.1109\/access.2017.2747560","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] H. He, Y. Lai, Y. Wang, S. Le, and Z. Zhao, \u201cA data skew-based unknown traffic classification approach for TLS applications,\u201d Future Generation Computer Systems, vol.138, pp.1-12, 2023. doi: 10.1016\/j.future.2022.08.003. 10.1016\/j.future.2022.08.003","DOI":"10.1016\/j.future.2022.08.003"},{"key":"18","unstructured":"[18] H. Zhang, M. Cisse, Y.N. Dauphin, and D. Lopez-Paz, \u201cmixup: Beyond empirical risk minimization,\u201d arxiv preprint arXiv.1710.09412, 2017. doi: 10.48550\/arXiv.1710.09412."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] W. Wei, H. Gu, W. Deng, Z. Xiao, and X. Ren, \u201cABL-TC: A lightweight design for network traffic classification empowered by deep learning,\u201d Neurocomputing, vol.489, pp.333-344, 2022. doi: 10.1016\/j.neucom.2022.03.007. 10.1016\/j.neucom.2022.03.007","DOI":"10.1016\/j.neucom.2022.03.007"},{"key":"20","unstructured":"[20] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, and Y. Bengio, \u201cGenerative adversarial nets,\u201d Advances in Neural Information Processing Systems, Montr\u00e9al, Canada, 2014, vol.27."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] G. Draper-Gil, A.H. Lashkari, M.S.I. Mamun, and A.A. Ghorbani, \u201cCharacterization of encrypted and VPN traffic using time-related features,\u201d Proc. 2nd international conference on information systems security and privacy, Rome, Italy, vol.1, pp.407-414, 2016. 10.5220\/0005740704070414","DOI":"10.5220\/0005740704070414"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] Z. Li and D. Hoiem, \u201cLearning without forgetting,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.40, no.12, pp.2935-2947, 2018. doi: 10.1109\/TPAMI.2017.2773081. 10.1109\/tpami.2017.2773081","DOI":"10.1109\/TPAMI.2017.2773081"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] S. Hou, X. Pan, C.C. Loy, Z. Wang, and D. Lin, \u201cLifelong learning via progressive distillation and retrospection,\u201d Proc. European Conference on Computer Vision, Munich, Germany, pp.437-452, 2018. 10.1007\/978-3-030-01219-9_27","DOI":"10.1007\/978-3-030-01219-9_27"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] S. Soleymanpour, H. Sadr, and M. Nazari Soleimandarabi, \u201cCSCNN: cost-sensitive convolutional neural network for encrypted traffic classification,\u201d Neural Processing Letters, vol.53, no.5, pp.3497-3523, 2021. doi: 10.1007\/s11063-021-10534-6. 10.1007\/s11063-021-10534-6","DOI":"10.1007\/s11063-021-10534-6"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] Y. Li, X. Chen, W. Tang, Y. Zhu, Z. Han, and Y. Yue, \u201cInteraction matters: Encrypted traffic classification via status-based interactive behavior graph,\u201d Applied Soft Computing, vol.155, p.111423, 2024. doi: 10.1016\/j.asoc.2024.111423 10.1016\/j.asoc.2024.111423","DOI":"10.1016\/j.asoc.2024.111423"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] A. Mallya and S. Lazebnik, \u201cPacknet: Adding multiple tasks to a single network by iterative pruning,\u201d IEEE conference on Computer Vision and Pattern Recognition, Salt Lake City, USA, pp.7765-7773, 2018. 10.1109\/cvpr.2018.00810","DOI":"10.1109\/CVPR.2018.00810"},{"key":"27","unstructured":"[27] J. Serra, D. Suris, M. Miron, and Karatzoglou, \u201cOvercoming catastrophic forgetting with hard attention to the task,\u201d International Conference on Machine Learning, New York, USA, pp.4548-4557, 2018."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] S.-A. Rebuffi, A. Kolesnikov, G. Sperl, and C.H. Lampert, \u201cicarl: Incremental classifier and representation learning,\u201d IEEE conference on Computer Vision and Pattern Recognition, Hawaii, USA, pp.2001-2010, 2017. 10.1109\/cvpr.2017.587","DOI":"10.1109\/CVPR.2017.587"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] M. McCloskey and N.J. Cohen, \u201cCatastrophic interference in connectionist networks: The sequential learning problem,\u201d Psychology of learning and motivation, vol.24, pp.109-165, 1989. doi: 10.1016\/S0079-7421(08)60536-8. 10.1016\/s0079-7421(08)60536-8","DOI":"10.1016\/S0079-7421(08)60536-8"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] P. Sirinam, M. Imani, M. Juarez, and M. Wright, \u201cDeep fingerprinting: Undermining website fingerprinting defenses with deep learning,\u201d ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, pp.1928-1943, 2018. 10.1145\/3243734.3243768","DOI":"10.1145\/3243734.3243768"},{"key":"31","unstructured":"[31] Y. Wu, Y. Chen, L. Wang, Y. Ye, Z. Liu, Y. Guo, Z. Zhang, and Y. Fu, \u201cIncremental classifier learning with generative adversarial networks,\u201d arxiv preprint arXiv.1802.00853, 2018. doi: 10.48550\/arXiv.1802.00853."},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] Y. Wu, Y. Chen, L. Wang, Y. Ye, Z. Liu, Y. Guo, and Y. Fu, \u201cLarge scale incremental learning,\u201d IEEE\/CVF conference on computer vision and pattern recognition, Long Beach, USA, pp.374-382, 2019. 10.1109\/cvpr.2019.00046","DOI":"10.1109\/CVPR.2019.00046"},{"key":"33","unstructured":"[33] A. Odena, \u201cSemi-supervised learning with generative adversarial networks,\u201d arxiv preprint arXiv.1606.0158, 2016. doi: 10.48550\/arXiv.1606.0158."},{"key":"34","unstructured":"[34] K. Cho, K. Mitsuya, and A. Kato, \u201cTraffic data repository at the WIDE project,\u201d USENIX 2000 Annual Technical Conference: FREENIX Track, pp.263-270, June 2000."},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] A. Habibi Lashkari, G. Draper Gil, M.S.I. Mamun, and A.A. Ghorbani, \u201cCharacterization of Tor Traffic Using Time Based Features,\u201d Proc. 3rd International Conference on Information System Security and Privacy, Porto, Portugal, vol.1, pp.253-262, 2017. 10.5220\/0006105602530262","DOI":"10.5220\/0006105602530262"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E108.D\/2\/E108.D_2024EDP7129\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T03:31:06Z","timestamp":1738380666000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E108.D\/2\/E108.D_2024EDP7129\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,1]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2024edp7129","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,1]]},"article-number":"2024EDP7129"}}