Fig. 5From: Secure beamforming design for the UAV-enabled transmission over NOMA networksSecrecy unicasting rate versus the target rate of multicasting with K=5Back to article page