Fig. 4From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionASL-guided disassemblyBack to article page