Research Article

Security Analysis of Intelligent System Based on Edge Computing

Figure 8

Curve of face verification accuracy with threshold.