K Cao, B Wang, H Ding,
L Lv, R Dong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… We consider a wireless network consisting of one base station (BS), one malicious
eavesdropper (E), M NOMA users denoted by U = {U1,...,UM }, and N trusted energy harvesting …