Fig. 5From: Deep learning approach to security enforcement in cloud workflow orchestrationAverage loss versus embedding dimensionsBack to article page