Research Article

An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks

Figure 5

Cross-over operation.