Fig. 9
From: Detecting malicious accounts in permissionless blockchains using temporal graph properties

Cosine similarity between malicious accounts identified on different dates
From: Detecting malicious accounts in permissionless blockchains using temporal graph properties
Cosine similarity between malicious accounts identified on different dates