Fig. 1From: Successive optimization Tomlinson-Harashima precoding strategies for physical-layer security in wireless networksSystem model of a MU-MIMO system with T users and K eavesdroppersBack to article page