Radar transmitting signal generation method for modulation recognition network stealth

被引:0
作者
Zhang R. [1 ]
Zhu M. [1 ,2 ,3 ]
Li Y. [1 ,2 ,3 ]
机构
[1] School of Information and Electronic, Beijing Institute of Technology, Beijing
[2] State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, Luoyang
[3] Laboratory of Electromagnetic Space Cognition and Intelligent Control, Beijing
来源
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | 2024年 / 46卷 / 07期
关键词
automatic modulation classification; deep neural network (D N N); radar transmitting signal; radio frequency stealth; time-frequency analysis;
D O I
10.12305/j.issn.1001-506X.2024.07.09
中图分类号
学科分类号
摘要
The electronic reconnaissance system in radar countermeasure scenarios greatly improves the recognition accuracy of radar signals by introducing an intelligent pulse modulation recognition network based on deep learning methods. In order to improve the modulation stealth and anti-recognition ability of radar signals, a radar transmission signal generation method that can make the deep recognition network make incorrect predictions is proposed. Firstly, the time-frequency spectrum of the signal is obtained through short-time Fourier transform (S T F T). Then, a time-frequency spectrum carrying modulated stealth information is generated iteratively. Finally, the improved inverse STFT is used to obtain the time-domain modulated stealth transmission signal. The radar signal generated by the proposed method is invisible to the modulation recognition network input from the time-frequency map, and can achieve pulse compression processing of the echo signal. The simulation results verified the effectiveness of the generated signal in resisting recognition, noise robustness, and pulse compression feasibility. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2256 / 2268
页数:12
相关论文
共 40 条
  • [21] PAN Z S, WANG S F, LI Y J., Residual attention aided U-net GAN and multi-instance multi-label classifier for automatic waveform recognition of overlapping LPI radar signals, IEEE Trans. on Aerospace and Electronic Systems, 58, 5, pp. 4377-4395, (2022)
  • [22] HE K M, ZHANG X Y, REN S Q, Et al., Deep residual learning for image recognition, Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, (2016)
  • [23] SIMONYAN K, ZISSERMAN A., Very deep convolutional networks for large-scale image recognition
  • [24] SZEGEDY C, ZAREMBA W, SUTSKEVER I, Et al., Intriguing properties of neural networks
  • [25] GOODFELLOW I J, SHLENS J, SZEGEDY C., Explaining and harnessing adversarial examples
  • [26] DU C, CONG Y L, ZHANG L, Et al., A practical deceptive jamming method based on vulnerable location awareness adversarial attack for radar HRRP target recognition [J], IEEE Trans. on Information Forensics and Security, 17, 5, pp. 2410-2424, (2022)
  • [27] TANG S T, TAO M L, SU J, Et al., Radio signal smart deception based on adversarial learning, Proc. of the CIE International Conference on Radar, pp. 2259-2262, (2021)
  • [28] YUAN X J, CHEN Y X, ZHAO Y, Et al., CommanderSong: a systematic approach for practical adversarial voice recognition, Proc. of the 27th USENIX Security Symposium, pp. 49-64, (2018)
  • [29] SADEGHH M, LARSSON E G., Adversarial attacks on deep-learning based radio signal classification, IEEE Wireless Communications Letters, 8, 1, pp. 213-216, (2018)
  • [30] XIE Y, SIH C, LI Z H, Et al., Real-time, universal, and robust adversarial attacks against speaker recognition systems, Proc. of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1738-1742, (2020)