Fig. 4From: A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computingAn example of mutation operationBack to article page