Fig. 6From: Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionArchitecture of the deep domain adaptation modelBack to article page