Fig. 9From: Categorizing Malware via A Word2Vec-based Temporal Convolutional Network SchemeThe loss comparison between TCN-based methodsBack to article page