Sign in

Effective Secrecy Rate for a Downlink NOMA Network.

Wenjuan YuArsenia ChortiLeila MusavianH. Vincent PoorQiang Ni
Published in: IEEE Trans. Wirel. Commun. (2019)
Keyphrases
  • traffic load
  • network architecture
  • anomaly detection
  • network traffic
  • computer networks
  • cellular networks
  • network resources
  • transmission rate