Fig. 5From: On robustness of physical layer network coding to pollution attackSER comparison of the three schemes with an intruder with different ASRsBack to article page