Fig. 5From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionInput data representationBack to article page