Fig. 5From: A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computingComparison of the time consumptionBack to article page