Research Article

Image-Based Insider Threat Detection via Geometric Transformation

Figure 2

Wide residual network architecture.