Fig. 12From: Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computingAverage system latency per user requestBack to article page