Fig. 6From: A CNN-based automatic vulnerability detectionPerformance comparison by dataset ratioBack to article page