Fig. 13From: An active and verifiable trust evaluation approach for edge computingData collection rate (α > β)Back to article page