Fig. 2From: On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detectionThe process of convolution and pooling in the image CNN modelBack to article page