An Electronic Countermeasures Methodology Based on Monte Carlo Tree Search and Self-Play

被引:0
作者
Hu, Ziran [1 ]
Jiang, Xiaofeng [1 ]
Wang, Changlong [2 ]
Zhou, Chenhao [1 ]
Zeng, Weizhi [1 ]
Wang, Yibo [1 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei, Peoples R China
[2] Xidian Univ, Sch Elect Engn, Xian, Peoples R China
来源
2024 IEEE 7TH INTERNATIONAL CONFERENCE ON AUTOMATION, ELECTRONICS AND ELECTRICAL ENGINEERING, AUTEEE | 2024年
基金
中国博士后科学基金;
关键词
electronic countermeasures; countermeasures effectiveness evaluation; MCTS;
D O I
10.1109/AUTEEE62881.2024.10869673
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic countermeasures (ECM) can undermine radar target tracking capabilities through techniques such as suppression and deception, thereby enhancing the battlefield survivability of aircraft. This area has become a focal point of research within the field of electronic warfare. Emerging intelligent ECM methods leverage sophisticated jamming strategies and dynamic task allocation to fully exploit their potential against advanced radar target tracking systems. This paper introduces an effectiveness evaluation method from the perspective of the jammer, based on Monte Carlo Tree Search (MCTS) and self-play. By integrating MCTS with deep neural networks, the proposed method efficiently explores and evaluates countermeasure effectiveness within large state spaces. We conducted simulation experiments on a developed ECM simulation platform, assessing the algorithm's performance using real-world data. The simulation results validate our conclusion that the proposed approach outperforms other existing solutions in the literature.
引用
收藏
页码:322 / 327
页数:6
相关论文
共 20 条
  • [1] Bai Zhonggan, 2017, 2017 13th IEEE International Conference on Electronic Measurement & Instruments (ICEMI), P406, DOI 10.1109/ICEMI.2017.8265834
  • [2] Bakun Zhu, 2021, 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), P1227, DOI 10.1109/IMCEC51613.2021.9482222
  • [3] Swarm Decoys Deployment for Missile Deceive using Multi-Agent Reinforcement Learning
    Bildik, Enver
    Tsourdos, Antonios
    Perrusquia, Adolfo
    Inalhan, Gokhan
    [J]. 2024 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS, ICUAS, 2024, : 256 - 263
  • [4] Carlson Josiah, 2013, Redis in Action
  • [5] Millimeter-Wave Soldier-to-Soldier Communications for Covert Battlefield Operations
    Cotton, Simon L.
    Scanlon, William G.
    Madahar, Bhopinder K.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (10) : 72 - 81
  • [6] Capacity Characterization for Reconfigurable Intelligent Surfaces Assisted Wireless Communications With Interferer
    Du, Linsong
    Ma, Jianhui
    Liang, Qingpeng
    Li, Chenxing
    Tang, Youxi
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (03) : 1546 - 1558
  • [7] Optimal Threshold Policies for Multivariate POMDPs in Radar Resource Management
    Krishnamurthy, Vikram
    Djonin, Dejan V.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (10) : 3954 - 3969
  • [8] Li Lihong, 2010, P 19 INT C WORLD WID, P661, DOI DOI 10.1145/1772690.1772758
  • [9] Liu S., 2020, Journal of China Academy of Electronics and Information Technology, V15, P306
  • [10] Mnih V., 2015, Nature, V518, P529, DOI DOI 10.1038/NATURE14236