Fig. 2From: A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computingAn example of encoding operationBack to article page