Fig. 4From: On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access systemThe EST of users m, n and p versus \(P_I\)Back to article page