Fig. 6From: On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detectionThe process of crafting training set and test setBack to article page