Fig. 5From: A CNN-based automatic vulnerability detectionLoss rate between optimizer and loss function according to the relationshipBack to article page