Fig. 2From: A CNN-based automatic vulnerability detectionLearning flow of V-CNN modelBack to article page