Fig. 14From: An active and verifiable trust evaluation approach for edge computingThe data collection rate of the three schemesBack to article page