Fig. 12From: An active and verifiable trust evaluation approach for edge computingData collection rate (different ω)Back to article page