Figure3
![Graph neural network based function call graph embedding for malware classification](https://image.oaes.cc/3c90c2f1-8cd2-4e69-aba9-f03b99c22e09/JSSS-2022-26-3.jpg)
Figure 3. Architecture of SAFE (cited from[4]). i2v converts instructions to vectors, and Self-Attentive Network obtains a vector
Figure 3. Architecture of SAFE (cited from[4]). i2v converts instructions to vectors, and Self-Attentive Network obtains a vector
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/