Fig. 11From: An active and verifiable trust evaluation approach for edge computingData collection rate (different γ)Back to article page