Research Article

Security Analysis of Intelligent System Based on Edge Computing

Figure 12

Time consumption in privacy preserving scheme.