Research Article

Security Analysis of Intelligent System Based on Edge Computing

Figure 1

Edge computing model.