Fig. 15From: An active and verifiable trust evaluation approach for edge computingRatio of data collection rate with different schemes under different ratio of malicious nodesBack to article page