[1] Ding Z G,Liu Y W,Choi J H,et al.Application of non-orthogonal multiple access in LTE and 5G networks[J].IEEE Communications Magazine,2017,55(2):185-191.
[2] Yue X W,Qin Z J,Liu Y W,et al.A unified framework for non-orthogonal multiple access[J].IEEE Transactions on Communications,2018,66(11):5346-5359.
[3] Yue X W,Liu Y W,Kang S L,et al.Modeling and analysis of two-way relay non-orthogonal multiple access systems[J].IEEE Transactions on Communications,2018,66(09):3784-3796.
[4] Toka M,Kucur O.Non-orthogonal multiple access with alamouti space-time block coding[J].IEEE Communications Letters,2018,22(09):1954-1957.
[5] Kader M,Shin S Y.Cooperativerelaying using space-time block coded non-orthogonal multiple access[J].IEEE Transactions on Vehicular Technology,2017,66(07):5894-5903.
[6] Liu Y,Ding Z,Elkashlan M,et al.Non-orthogonal multiple access in large-scale underlay cognitive radio networks[J].IEEE Transactions on Vehicular Technology,2016,65(12):10152-10157.
[7] Lv L,Chen J,Ni Q.Cooperative non-orthogonal multiple access in cognitive radio[J].IEEE Communications Letters,2016,20(10):2059-2062.
[8] Feng Y,Yan S,Yang Z,et al.Beamforming design and power allocation for secure transmission with NOMA[J].IEEE Transactions on Communications,2019,18(05):2639-2651.
[9] F H Zhou,Z Chu and H J Sun et al.Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT[J].IEEE Journal on Selected Areas in Communications,2018,36(4):918-931.
[10] Zou Y,Wang G.Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack[J].IEEE Transactions on Industrial Informatics,2015,12(2):780-787.
[11] Lei H,Zhang J,Park K H,et al.On secure NOMA systems with transmit antenna selection schemes[J].IEEE Access,2017,5:17450-17464. |