2009 2nd Asian-Pacific Conference on Synthetic Aperture Radar 2009
DOI: 10.1109/apsar.2009.5374233
|View full text |Cite
|
Sign up to set email alerts
|

Research on deceptive jamming technologies against SAR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…where B a is the Doppler bandwidth. By observing (19), we can reach the following conclusions: Firstly, the jamming only poses impacts on the rangedimensional image. Secondly, the number of false targets is directly related to the number of FDA elements.…”
Section: B Range Cell Migration Correction and Azimuth Compressionmentioning
confidence: 73%
See 2 more Smart Citations
“…where B a is the Doppler bandwidth. By observing (19), we can reach the following conclusions: Firstly, the jamming only poses impacts on the rangedimensional image. Secondly, the number of false targets is directly related to the number of FDA elements.…”
Section: B Range Cell Migration Correction and Azimuth Compressionmentioning
confidence: 73%
“…Several typical deceptive jamming methods have been published, such as inverse range Doppler algorithm [16], segmented modulation [17] and premodulation [18], but they need a reconnaissance system to measure the parameters of the SAR to be jammed at first and are required to provide fast calculation strategies to improve the efficiency of the jamming signal generation. Although the jamming methods proposed in [19] can produce deceptive interference on SAR imaging, and the methods based on 1-bit sampling and timevarying thresholds proposed in [20] can conceal the true target on SAR imaging, multiple false scenes cannot be generated simultaneously. The deception jamming methods proposed in [17], [21], [22], can generate false targets with high fidelity, but they require multiple receivers to work together, which will increase hardware costs and system complexity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…All the pixels in the shadow area can be found using Equation (7). Therefore, the shadow region can be expressed by the following.…”
Section: Characteristics Of the Input Templatementioning
confidence: 99%
“…Synthetic aperture radar (SAR) deception jamming technology is effective in concealing important military facilities and operational equipment [1][2][3], enabling covert military operations [4,5]. The SAR deception jamming technology has the advantage of low power requirements, making it a popular research topic [6][7][8][9]. At present, the schemes for SAR deception jamming at the software level include using a SAR deception jamming template library and electromagnetic scattering models.…”
Section: Introductionmentioning
confidence: 99%