Fig. 4From: Ensuring security in edge computing through effective blockchain node detectionPerformance comparison of different random walk strategies under different embedding dimensionsBack to article page