Advances, Systems and Applications
From: Ensuring security in edge computing through effective blockchain node detection
Method | \(D_1\) | \(D_2\) | \(D_3\) | ||||||
---|---|---|---|---|---|---|---|---|---|
 | Pre. | Recall | F1 | Pre. | Recall | F1 | Pre. | Recall | F1 |
Naïve Bayes | 72.72 | 71.55 | 72.13 | 72.72 | 71.63 | 72.17 | 73.81 | 72.64 | 73.22 |
SVM | 78.59 | 78.50 | 78.54 | 79.82 | 79.70 | 79.75 | 79.81 | 79.92 | 79.86 |
Logistic regression | 85.76 | 85.57 | 85.66 | 86.21 | 86.27 | 86.23 | 87.06 | 87.12 | 87.08 |
Decision tree | 80.67 | 80.76 | 80.71 | 83.26 | 83.23 | 83.24 | 82.44 | 82.55 | 82.49 |
Random forest | 87.23 | 89.33 | 88.27 | 93.21 | 92.93 | 93.08 | 90.45 | 91.20 | 90.83 |