Fig. 2From: Transfer learning for detecting unknown network attacksBox plot of accuracy of transfer learning approaches and baselines on three main tasksBack to article page