Fig. 4From: A large-scale data security detection method based on continuous time graph embedding frameworkImpact of embedding dimension on node classification taskBack to article page