高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

融合注意力机制的雷达欺骗干扰域适应识别方法

孙闽红 陈鑫伟 仇兆炀 滕旭阳

孙闽红, 陈鑫伟, 仇兆炀, 滕旭阳. 融合注意力机制的雷达欺骗干扰域适应识别方法[J]. 电子与信息学报, 2022, 44(11): 3891-3899. doi: 10.11999/JEIT210871
引用本文: 孙闽红, 陈鑫伟, 仇兆炀, 滕旭阳. 融合注意力机制的雷达欺骗干扰域适应识别方法[J]. 电子与信息学报, 2022, 44(11): 3891-3899. doi: 10.11999/JEIT210871
SUN Minhong, CHEN Xinwei, QIU Zhaoyang, TENG Xuyang. Radar Deception Jamming Recognition Method Based on Domain Adaptation and Attention Mechanism[J]. Journal of Electronics & Information Technology, 2022, 44(11): 3891-3899. doi: 10.11999/JEIT210871
Citation: SUN Minhong, CHEN Xinwei, QIU Zhaoyang, TENG Xuyang. Radar Deception Jamming Recognition Method Based on Domain Adaptation and Attention Mechanism[J]. Journal of Electronics & Information Technology, 2022, 44(11): 3891-3899. doi: 10.11999/JEIT210871

融合注意力机制的雷达欺骗干扰域适应识别方法

doi: 10.11999/JEIT210871
基金项目: 国防特色学科发展项目(JCKY2019415D002)
详细信息
    作者简介:

    孙闽红:男,博士,教授,研究方向为雷达通信信号处理及抗干扰

    陈鑫伟:男, 硕士生,研究方向为信号与信息处理

    仇兆炀:男, 博士,讲师,研究方向为信号与信息处理

    滕旭阳:男, 博士,讲师,研究方向为人工智能及机器学习

    通讯作者:

    陈鑫伟 779577409@qq.com

  • 中图分类号: TN974

Radar Deception Jamming Recognition Method Based on Domain Adaptation and Attention Mechanism

Funds: The Characteristic Discipline Program of National Defense (JCKY2019415D002)
  • 摘要: 针对目前雷达欺骗干扰识别中常规特征识别方法应用受限和训练高性能深度学习模型需要的大量标注样本难以高效获取的问题,该文提出一种基于对抗域适应网络的雷达欺骗干扰识别方法,以改善标签限制;并融合注意力机制残差模块进一步提升识别精度。首先,对雷达接收信号进行时频变换后,应用基于对抗网络思想的域适应技术实现从标注源域样本到未标注目标域样本的迁移识别。其次,通过所设计的空间通道注意力残差模块使网络训练聚焦于时频图全局空间特征和高响应通道,以忽略时频图像中可迁移性低的区域抑制负迁移的产生。在不同源域与目标域雷达欺骗干扰数据集上的实验结果表明了该方法的可行性和有效性。
  • 图  1  算法流程图

    图  2  DANN网络

    图  3  残差块结构

    图  4  注意力机制残差块结构

    图  5  Attention-RDANN网络结构

    图  6  Source_only的T-SNE降维可视化

    图  7  本文方法的T-SNE降维可视化

    图  8  不同条件下的欺骗干扰识别性能对比

    表  1  Hammerstein非线性模型参数表

    非线性系统参数r线性系统参数u
    r1r2r3r4u1u2u3
    真实发射机1–0.0695–0.0979–0.05530.98980.06240.0080
    欺骗干扰机0.9870–0.0690–0.0973–0.05490.98420.06190.0077
    下载: 导出CSV

    表  2  仿真参数设置

    信号参数参数值信号参数参数值
    调制类型LFM载频10 GHz
    脉宽20 μs信号带宽10 MHz
    采样频率40 MHz脉冲重复间隔100 μs
    距离欺骗时延2 μs速度欺骗多普勒频率偏2 kHz
    SMSP采样倍数4C&I子脉冲个数5
    C&I时隙数4
    下载: 导出CSV

    表  3  不同雷达欺骗干扰类型迁移效果对比

    源域→目标域本文方法仅源域训练源域→目标域本文方法仅源域训练
    Rd→Vd0.9600.502Vd→Rd0.9850.507
    Rd→R_Vd0.9950.991R_Vd→Rd0.9950.996
    Rd→SMSP0.9870.786SMSP→Rd0.9940.505
    Rd→C&I0.9860.759C&I→Rd0.9910.523
    Vd→R_Vd0.9810.506R_Vd→Vd0.9950.989
    Vd→SMSP0.9880.971SMSP→Vd0.9750.988
    Vd→C&I0.9870.969C&I→Vd0.9770.982
    R_Vd→SMSP0.9860.752SMSP→R_Vd0.9250.763
    R_Vd→C&I0.9850.785C&I→R_Vd0.9820.758
    C&I→SMSP0.9910.814SMSP→C&I0.9840.856
    下载: 导出CSV

    表  4  不同方法识别效果对比

    算法JNR(dB)单次平均识别时间(s)
    20→1010→20
    Zernike[20]0.7030.7013.20
    Zernike_TCA[21]0.6820.6843.51
    DAN[12]0.8010.7875.12
    JAN[13]0.9320.9254.98
    Source_only0.7970.7954.72
    DANN0.9490.9404.74
    Attention-RDANN0.9680.9624.89
    下载: 导出CSV
  • [1] ZHOU Chao, LIU Quanhua, and CHEN Xinliang. Parameter estimation and suppression for DRFM-based interrupted sampling repeater jammer[J]. IET Radar, Sonar & Navigation, 2018, 12(1): 56–63. doi: 10.1049/iet-rsn.2017.0114
    [2] LIU Zhen, SUI Jinping, WEI Zhenhua, et al. A sparse-driven anti-velocity deception jamming strategy based on pulse-Doppler radar with random pulse initial phases[J]. Sensors, 2018, 18(4): 1249. doi: 10.3390/s18041249
    [3] LIU Jieyi, ZHANG Linrang, ZHAO Shanshan, et al. Correlation characteristic analysis in diversity multiple-input multiple-output radar[J]. Electronics Letters, 2017, 53(5): 349–351. doi: 10.1049/el.2016.3535
    [4] ZHANG Zhaojian, XIE Junwei, SHENG Chuan, et al. Deceptive jamming discrimination based on range-angle localization of a frequency diverse array[J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18(9): 1437–1446. doi: 10.1631/FITEE.1601577
    [5] 王文益, 李文静, 卢丹, 等. 利用TDOA相关系数的ADS-B欺骗式干扰检测[J]. 信号处理, 2019, 35(11): 1784–1790. doi: 10.16798/j.issn.1003-0530.2019.11.002

    WANG Wenyi, LI Wenjing, LU Dan, et al. ADS-B spoofing detection method using TDOA correlation coefficient[J]. Journal of Signal Processing, 2019, 35(11): 1784–1790. doi: 10.16798/j.issn.1003-0530.2019.11.002
    [6] 王晓戈, 陈辉, 倪萌钰, 等. 基于相位调制的雷达抗假目标干扰方法[J]. 系统工程与电子技术, 2021, 43(9): 2476–2483. doi: 10.12305/j.issn.1001-506X.2021.09.14

    WANG Xiaoge, CHEN Hui, NI Mengyu, et al. Radar anti-false target jamming method based on phase modulation[J]. Systems Engineering and Electronics, 2021, 43(9): 2476–2483. doi: 10.12305/j.issn.1001-506X.2021.09.14
    [7] 阮怀林, 杨兴宇. 基于栈式稀疏自编码器的有源欺骗干扰识别[J]. 探测与控制学报, 2018, 40(4): 62–67.

    RUAN Huailin and YANG Xingyu. Radar active deception identification method based on stacked sparse autoencoder[J]. Journal of Detection &Control, 2018, 40(4): 62–67.
    [8] 黄国策, 王桂胜, 任清华, 等. 基于Hilbert信号空间的未知干扰自适应识别方法[J]. 电子与信息学报, 2019, 41(8): 1916–1923. doi: 10.11999/JEIT180891

    HUANG Guoce, WANG Guisheng, REN Qinghua, et al. Adaptive recognition method for unknown interference based on Hilbert signal space[J]. Journal of Electronics &Information Technology, 2019, 41(8): 1916–1923. doi: 10.11999/JEIT180891
    [9] 王文益, 吴庆. 利用改进型AlexNet的ADS-B欺骗式干扰检测[J]. 信号处理, 2020, 36(5): 741–747. doi: 10.16798/j.issn.1003-0530.2020.05.013

    WANG Wenyi and WU Qing. ADS-B spoofing interference detection using improved AlexNet[J]. Journal of Signal Processing, 2020, 36(5): 741–747. doi: 10.16798/j.issn.1003-0530.2020.05.013
    [10] 冯熳, 王梓楠. 基于奇异值分解与神经网络的干扰识别[J]. 电子与信息学报, 2020, 42(11): 2573–2578. doi: 10.11999/JEIT190228

    FENG Man and WANG Zi’nan. Interference recognition based on singular value decomposition and neural network[J]. Journal of Electronics &Information Technology, 2020, 42(11): 2573–2578. doi: 10.11999/JEIT190228
    [11] 范苍宁, 刘鹏, 肖婷, 等. 深度域适应综述: 一般情况与复杂情况[J]. 自动化学报, 2021, 47(3): 515–548. doi: 10.16383/j.aas.c200238

    FAN Cangning, LIU Peng, XIAO Ting, et al. A review of deep domain adaptation: General situation and complex situation[J]. Acta Automatica Sinica, 2021, 47(3): 515–548. doi: 10.16383/j.aas.c200238
    [12] LONG Mingsheng, CAO Yue, WANG Jianmin, et al. Learning transferable features with deep adaptation networks[C]. The 32nd International Conference on Machine Learning, Lille, France, 2015: 97–105.
    [13] LONG Mingsheng, ZHU Han, WANG Jianmin, et al. Deep transfer learning with joint adaptation networks[C]. The 34th International Conference on Machine Learning, Sydney, Australia, 2017: 2208–2217.
    [14] GANIN Y, USTINOVA E, AJAKAN H, et al. Domain-adversarial training of neural networks[J]. The Journal of Machine Learning Research, 2016, 17(1): 2096–2030.
    [15] SPARROW M J and CIKALO J. ECM techniques to counter pulse compression radar[P]. US, 7081846, 2006.
    [16] HE Kaiming, ZHANG Xiangyu, REN Shaoqing, et al. Deep residual learning for image recognition[C]. The IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, USA, 2016: 770–778.
    [17] WOO S, PARK J, LEE J Y, et al. CBAM: Convolutional block attention module[C]. 15th European Conference on Computer Vision, Munich, Germany, 2018: 3–19.
    [18] BEN-DAVID S, BLITZER J, CRAMMER K, et al. A theory of learning from different domains[J]. Machine Learning, 2010, 79(1-2): 151–175. doi: 10.1007/s10994-009-5152-4
    [19] GOODFELLOW I J, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial nets[C]. The 27th International Conference on Neural Information Processing Systems, Montreal, Canada, 2014: 2672–2680.
    [20] 杨兴宇, 阮怀林. 基于时频图像Zernike矩特征的欺骗干扰识别[J]. 现代雷达, 2018, 40(2): 91–95. doi: 10.16592/j.cnki.1004-7859.2018.02.018

    YANG Xingyu and RUAN Huailin. A recognition method of deception jamming based on image Zernike moment feature of time-frequency distribution[J]. Modern Radar, 2018, 40(2): 91–95. doi: 10.16592/j.cnki.1004-7859.2018.02.018
    [21] PAN S J, TSANG I W, KWOK J T, et al. Domain adaptation via transfer component analysis[J]. IEEE Transactions on Neural Networks, 2011, 22(2): 199–210. doi: 10.1109/TNN.2010.2091281
  • 加载中
图(8) / 表(4)
计量
  • 文章访问数:  899
  • HTML全文浏览量:  353
  • PDF下载量:  158
  • 被引次数: 0
出版历程
  • 收稿日期:  2021-08-24
  • 修回日期:  2022-02-21
  • 录用日期:  2022-03-03
  • 网络出版日期:  2022-03-09
  • 刊出日期:  2022-11-14

目录

    /

    返回文章
    返回