Fig. 8From: Categorizing Malware via A Word2Vec-based Temporal Convolutional Network SchemeThe accuracy comparison between TCN-based methodsBack to article page