2023
DOI: 10.3390/rs15112762
|View full text |Cite
|
Sign up to set email alerts
|

An ISAR Shape Deception Jamming Method Based on Template Multiplication and Time Delay

Abstract: The deception jamming method based on Digital Radio Frequency Memory (DRFM) for Inverse Synthetic Aperture Radar (ISAR) has been a widely studied topic in recent decades. Typically, jamming signals generated using two-dimensional or three-dimensional false target models can create realistic false targets on the ISAR image. However, existing deception jamming methods cannot eliminate or revise the original echo, which can be retained by multiple anti-jamming methods once the radar judges out receiving the jammi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…the critic network are optimized by Equation (10). The θ Q 1 and θ Q 1 of the critic network are optimized by Equation (11).…”
Section: Agent1 Of Outer Ddpgmentioning
confidence: 99%
See 1 more Smart Citation
“…the critic network are optimized by Equation (10). The θ Q 1 and θ Q 1 of the critic network are optimized by Equation (11).…”
Section: Agent1 Of Outer Ddpgmentioning
confidence: 99%
“…When there are only a few ECCMs in the radar knowledge base, using the multi-attribute decision-making method [6] or the fuzzy analytic hierarchy process [7] can also solve the decision-making problem. However, with the rapid development of jamming [8], there are more and more modes of radar ECCMs [9][10][11][12][13]. Traditional decision-making methods cannot meet the need for intelligent anti-jamming for cognitive radar [14].…”
Section: Introductionmentioning
confidence: 99%
“…For the phase terms of cubic and above orders, we only consider constructing the azimuth space-variant part of the cubic phase. Therefore, the construction of the azimuth modulation term can be approximated as Equation (22).…”
Section: Construction Of Azimuth Modulation Term Based On Non-linear ...mentioning
confidence: 99%
“…Consequently, electronic countermeasures technology (ECM) designed to counter SAR has experienced rapid development [2][3][4][5]. The low power consumption and high fidelity advantages of SAR deceptive jamming have garnered significant attention [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…By generating different shapes of false targets, the radar operator will be confused and misdirected by the false target. The commonly used methods are convolutional modulation jamming [23], electromagnetic model jamming [24][25][26], and template-modulated jamming [27,28]. In [23], a simple real-time jamming method was proposed, which reduces the computation structure by parallel convolution of the intercepted radar pulse and the real target HRRP.…”
Section: Introductionmentioning
confidence: 99%