- Wang, Bichai, et al. "Comparison study of non-orthogonal multiple access schemes for 5G." 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. IEEE, 2015.
- Wu, K. Lu, C. Jiang and X. Shao, "Comprehensive Study and Comparison on 5G NOMA Schemes," in IEEE Access, vol. 6, pp. 18511-18519, 2018.
- Chen, Z. Ding, X. Dai and R. Zhang, "An Optimization Perspective of the Superiority of NOMA Compared to Conventional OMA," in IEEE Transactions on Signal Processing, vol. 65, no. 19, pp. 5191-5202, 1 Oct.1, 2017.
- Liu, G. Pan, H. Zhang and M. Song, "On the Capacity Comparison Between MIMO-NOMA and MIMO-OMA," in IEEE Access, vol. 4, pp. 2123-2129, 2016.
- El-Sayed, Mohamed M., Ahmed S. Ibrahim, and Mohamed M. Khairy. "Power allocation strategies for non-orthogonal multiple access." 2016 international conference on selected topics in mobile & wireless networking (MoWNeT). IEEE, 2016.
- U. Khan, F. Jameel, M.A. Jamshed, H. Pervaiz, S. Khan, J. Liu “Efficient power allocation for noma-enabled iot networks in 6g era” Phys. Commun., 39 (2020), p. 101043.
- Wu, A. Khisti, C. Xiao, G. Caire, K. -K. Wong and X. Gao, "A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead," in IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 679-695, April 2018.
- Zhang, H. -M. Wang, Q. Yang and Z. Ding, "Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access," in IEEE Communications Letters, vol. 20, no. 5, pp. 930-933, May 2016.
- Zhang, H. -M. Wang, Q. Yang and Z. Ding, "Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access," in IEEE Communications Letters, vol. 20, no. 5, pp. 930-933, May 2016.
- Cao et al., "Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems," in IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1978-1983, Feb. 2021.
- Zhang, F. Jia, Z. Zhang, J. Ge and F. Gong, "Physical Layer Security Designs for 5G NOMA Systems with a Stronger Near-End Internal Eavesdropper," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13005-13017, Nov. 2020.
- R. Ghadi and G. A. Hodtani, "Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 431-440, 2021.
- Nelson, R.B. ’An introduction to copulas’ (Springer Science & Business Media, New York, NY, 2007.
- Shemyakin A., Kniazev A.: ‘Introduction to Bayesian estimation and copula models of dependence’, John Wiley & Sons., 2017.
- M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey,” IEEE Commun. Surveys Tuts., pp. 1–1, 2018.
- Geller, E.W. Ng, A table of integrals of the exponential integral, J. Res. Natl. Bur. Stand. 71(1969) 1-20.
|