Fig. 8From: A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computingComparison of the privacy entropyBack to article page