Abstract

Multipath interference in radar signals caused by sea, ground, and other environments poses significant challenges to the target detection, tracking, and classification capabilities of radar systems. Existing methods for radar signal identification require labeled samples and focus mainly on the classification of normal signals. However, in practice, anomalous samples (multipath interference signals) may be scarce and highly imbalanced (i.e., mostly normal samples). To address this problem, we propose a deep anomaly detection with attention (DADA) for semisupervised detection of multipath radar signals. The method transforms radar signals into time–frequency images and is trained exclusively on normal samples. The autoencoder architecture is extended with a feature extractor network to capture latent sample features. CBAM attention is introduced to improve feature extraction. By learning the distribution of normal samples in high-dimensional image space and low-dimensional feature space, a two-dimensional feature space representing normal samples is constructed. A one-class SVM then learns the boundary of normal samples for anomaly detection. Extensive experiments on radar signal datasets validate the effectiveness of the proposed approach.

1. Introduction

Multipath interference is a common problem in radar systems due to the reflections and diffraction of radar signals from the ground, sea, and other environments. As a result, the transmitted signal travels along multiple paths before arriving at the receiver [1]. The superposition of these delayed versions of the original signal causes distortion, resulting in the interference that can degrade the radar’s performance in detecting, tracking, and classifying targets. In particular, this interference can affect the radar’s ability to distinguish the true target signal from noise and clutter. For example, in the operation of shipboard radar reconnaissance equipment, signals may encounter multiple reflections from the sea surface, nearby islands, and the ship’s own surface structures. In such situations, the radar system receives signals not only from the direct transmission path, but also from the various reflected paths, creating a multifaceted interference field. From a technical point of view, this affects not only the accuracy of the radar’s measurement of signal amplitude and pulse width, but also the directional estimation of the signal. In the real-world electromagnetic environment of the battlefield, the complex multipath effects can lead to a spike in false readings in the signal processing of the radar reconnaissance equipment. This can lead to tactical false alarms and missed targets. In extreme cases, it can even lead to a blockage of the radar’s receive channels, critically affecting its tactical performance. Therefore, detection and identification of multipath induced spurious signals have become an essential task in the radar signal processing to mitigate these effects.

Traditional radar signal identification techniques typically extract features from signals in the time domain, frequency domain, and time–frequency domain to identify different radar modulation signals. For example, the studies by Yibing et al. [24] mainly focus on a complexity feature extraction in the time domain, while the study by Lunden and Koivunen [5] uses power spectral density in the frequency domain for feature extraction. However, with the increasing complexity of the radar signals, methods based solely on the time or frequency domain often fail to achieve the desired identification results. As a result, time–frequency domain feature extraction has become a research hotspot in the field, as it can reveal more abundant properties of the radar signals. Several time–frequency transform methods, such as short-time Fourier transform (STFT) [6], fractional Fourier transform (FrFT) [7], Choi-Williams Distribution (CWD) [8], and smoothed pseudo Wigner–Ville distribution (SPWVD) [9, 10], have been widely used for radar signal feature extraction. The core idea of these methods is to convert radar signals into time–frequency images and use deep learning image processing techniques for signal identification. Although these methods are effective in classifying various normal radar signals that are received, they do not consider how to detect anomalous multipath signals. However, these methods provide a valuable insight that different types of radar signals demonstrate distinguishable differences in the time–frequency structure after time–frequency transformation. Specifically, if analysis shows that the time–frequency representations of multipath and normal signals have significant detectable differences, then such differences can be utilized to identify and detect multipath signals. In summary, time–frequency domain features have the potential to differentiate types of radar signals in complex electromagnetic environments, thus providing a viable new approach to the detection and identification of multipath signals.

Anomaly detection is a prominent research area, commonly confronted with the challenge of highly imbalanced data samples, where normal samples significantly outnumber the anomalous ones. In this scenario, traditional supervised deep learning classification models often underperform. Semisupervised anomaly detection methods have emerged as essential tools to address this problem. Schlegl et al. [11] employs the generator of the generative adversarial networks (GAN) learn the distribution of normal images. During testing, new images are inversely mapped to the latent space and the difference in latent space is assumed to reflect anomalies. This method requires iterative optimization to find the best matching representation in the latent space, resulting in low-computational efficiency. Zenati et al. [12] introduces an anomaly detection framework based on BiGAN, which learns the encoder simultaneously during the GAN training process. This achieves an end-to-end joint training procedure, eliminating the need for computationally expensive inverse latent space mapping during the testing phase. Akcay et al. [13, 14] adopt an anomaly detection strategy based on an adversarial training. This approach is trained using only normal samples and employs a reconstruction strategy to enable the network to learn the distribution of normal image samples in the latent space. However, the design of the model tends to lead to overfitting. Sabokrou et al. [15] also employs an adversarial training approach. This method reconstructs input data by learning latent space of normal data, and uses adversarial training to enhance model performance. When encountering anomalous data that differs significantly from the normal data, the reconstruction error of the model increases markedly, thereby achieving anomaly detection.

The core idea of these methods is that abnormal samples exhibit significant differences from normal samples in both the high-dimensional image space and the encoded low-dimensional latent space. Motivated by the results of such research, we develop a deep anomaly detection with attention (DADA) model for detecting multipath interference in radar signals. The method takes the time–frequency image of radar signals as input and trains the model using only normal radar signals. We extend the structure of autoencoders by incorporating a feature extractor to capture the latent feature space of normal samples. By simultaneously considering the high-dimensional image space and the encoded low-dimensional feature space, the feature distribution of normal samples can be more accurately captured. Then, by employing a one-class SVM to learn the boundary of the normal sample feature space, we can achieve efficient anomaly detection. In addition, to better capture the time–frequency characteristics of radar signals, especially the line portions representing the main structural features, we introduce the CBAM attention mechanism to enhance model performance. This mechanism allows the network to adaptively focus on the feature regions with the most structural differences in the signal. Therefore, the main innovations and contributions of this paper are summarized as follows:(1)This paper proposes a semisupervised anomaly detection model for detecting multipath interference in the radar signals.(2)Our model extends the typical autoencoder structure by incorporating a feature extractor to capture the latent feature space of time–frequency images. In addition, we employ the CBAM attention mechanism to focus on the key high-frequency structural components within the time–frequency images, thereby enhancing the model’s representational capability.(3)By jointly considering the high-dimensional space of images and the latent space, we construct a two-dimensional feature space describing normal samples. Then, one-class SVM is utilized to learn the boundary of the feature space for anomaly detection.

2. Radar Multipath Effects

Radar multipath effect refers to the phenomenon wherein a wave, during its propagation from the transmitter to the target, traverses through multiple propagation paths. This effect captures scenarios where both a primary direct wave and several secondary indirect waves coexist at the receiving point. The received signal exhibits amplitude variations due to interference arising from the relative phase alignments between the direct and indirect waves. Specifically, different phase alignments lead to constructive or destructive summation of these waves at the receiver, thereby shaping the final observed amplitude variation of the signal.

Figure 1 presents a schematic diagram illustrating the multipath interference effects on radar signals propagating over the sea surface [16]. The direct propagation path A → D and the reflected paths A → Bi → D contribute to the multipath interference, where i indicates the multiple reflected paths. In the figure, h1 and h2 represent the antenna heights of the radar and the receiver, respectively. Moreover, the path length of AD is denoted as Rd, while the path lengths of ABi and BiD are expressed as R1i and R2i, respectively. Under the multipath effect, signals arriving at the receiver through different propagation paths exhibit relative time delays due to the path length differences. Signals from various paths are superimposed at the receiver, and the resultant interference depends on the phases and amplitudes of each path signal. In addition, due to varying propagation paths, the signals undergo distinct levels of amplitude attenuation, phase shift, and Doppler frequency shift during propagation (especially when the reflecting surfaces or receiver are in motion). The composite signal at the receiving antenna can be expressed as follows:where represents the direct path signal, N represents the total number of reflected paths. and are the attenuation and distortion models for the direct and i-th reflected signals, respectively. Ai represents the amplitude attenuation of the i-th reflected path, represents the time delay caused by the longer path length compared to the direct path, is the initial phase shift of the i-th reflected path, and refers to the frequency shift due to the Doppler effect, which is related to the relative motion between reflecting objects and the receiver. Figure 2 presents the SPWVD time–frequency representations of four radar signal types, including linear frequency modulation (LFM), nonlinear frequency modulation (NLFM), binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK), in both normal and multipath scenarios. Evident structural discrepancies exist between the time–frequency signatures of the normal and multipath signals, which could facilitate detection of the multipath interference.

3. Proposed Approach

3.1. Anomaly Detection Definition

Anomaly detection refers to the identification of abnormal samples that deviate significantly from the expected pattern of normal data distribution. In this paper, normal and abnormal samples are denoted by x and , respectively. Let and represent the probability distributions of the normal and abnormal samples, respectively.

Our model is trained exclusively on the data set of normal samples according to . During testing, the test set contains both normal (x) and abnormal () samples, where the distribution of the abnormal samples differs from the normal distribution .

The goal of our anomaly detection model is to assign each test sample an anomaly score that reflects its probability of belonging to the anomalous distribution . A higher score indicates a higher probability that the sample is abnormal (). By setting a threshold for the anomaly score, normal and abnormal samples can be effectively distinguished. The anomaly detection task can be formulated as finding a function , where x is the input sample and s is the anomaly score. The decision rule for classifying a sample as anomalous is:

The threshold depends on the desired tradeoff between true positive and false positive rates in detecting anomalies.

3.2. Model Architecture

Figure 3 presents the overall architecture of the proposed model, which comprises two modules: an autoencoder network with an attention mechanism and a feature extractor. In this structure, the input sample is first encoded and reconstructed by the autoencoder network, followed by the feature extractor learning the latent space of the samples.

The first subnetwork is an autoencoder network consisting of an encoder (En) and a decoder (De). The primary task of the autoencoder is to learn and reconstruct the input image. The primary task of the autoencoder is to learn and reconstruct the input image. Given an input image x, the encoder generates a latent vector z through downsampling, formulated as , where (). The latent vector z is assumed to be the optimal low-dimensional representation of the input x. The encoder comprises convolutional layers, batch normalization, and leaky ReLU activation functions. To enhance the model’s sensitivity to key high-energy line features and reduce attention on less significant background regions in the time–frequency images of Figure 2, we introduce the CBAM attention mechanism after each convolutional layer. The CBAM integrates both a channel attention submodule and a spatial attention submodule to strengthen the representational capability of convolutional neural networks (CNNs). This allows the model to focus more on the relevant channels and spatial features.

3.2.1. Channel Attention Submodule

Given an input feature map , where h and w denote the height and width, respectively, and c represents the number of channels, this submodule aims to identify the more salient channels. The channel attention coefficients are computed as follows:

Here, AvgPool and MaxPool refer to global average pooling and max pooling operations, respectively. MLP denotes multilayer perceptron, and is the sigmoid activation function. This results in the final channel-wise enhanced feature map:where denotes element-wise multiplication. provides a scalar coefficient for each channel to multiply with all the spatial positions of the corresponding input channel.

3.2.2. Spatial Attention Submodule

This module aims to identify the more pertinent spatial regions. Taking the channel-wise feature map as input, the spatial attention coefficients are computed as follows:where Conv represents the convolution operation. The resulting spatial attention enhanced feature map is as follows:

By integrating channel and spatial attention, the CBAM module can effectively focus on the salient channels and spatial regions in the input feature. This allows the model to concentrate more precisely on task-relevant features, thus enhancing its representation capability.

Subsequently, through the upsampling process of the decoder (De), the input image x is reconstructed from the latent vector z, yielding the reconstructed image . The architecture of the decoder comprises deconvolutional layers, ReLU activations, and batch normalization, with a tanh layer applied to generate the final output.

The second subnetwork is the feature extractor (FE), which is inspired by the design of Siamese networks [17]. It shares the same architecture as En while having different parameterization. This network is designed to extract meaningful feature representations for the input image x and its reconstructed counterpart . Through FE, we can obtain and , representing the latent features of the input and reconstructed images, respectively. These feature representations are used to evaluate the similarity between the input and reconstructed images. During testing, they can also be employed for anomaly detection.

3.3. Model Training

In this study, we train the model using only normal samples, aiming to enable the model to learn and reconstruct normal samples and capture their characteristics in the latent vector space. For the abnormal samples in the test set, as they are never trained on the model, the model struggles to achieve effective reconstruction. As a result, the feature extractor network computes the latent vectors and for the input and reconstructed images, respectively, leading to a significant reduction in their similarity. To validate this process, we devise two objective functions to independently optimize each subnetwork to capture the key features of normal samples.

The first loss function is reconstruction loss. Similar to autoencoders, the reconstruction loss aims to minimize the discrepancy between the input sample x and its reconstructed counterpart . This serves as a measure of the model’s capability in learning and recovering the original normal sample characteristics. Formally, it is defined as follows:

By minimizing , the model is enabled to generate images closely resembling the normal samples.

The second loss function is the feature similarity loss. The inputs to this loss are from the original sample and reconstructed sample. During training with normal samples, the FE network extracts features from both the original samples x and the reconstructed samples . Considering the reconstructed sample closely resembles the normal sample, the latent feature space, extracted by the FE network, is expected to exhibit minimal discrepancy. Therefore, we employ the feature similarity loss to optimize the model by minimizing the difference between the latent representations of the original input and the reconstructed image . is formally defined as follows:

3.4. Anomaly Detection with One-Class SVM

To enable effective anomaly detection, we incorporate the features extracted by the DADA model with a one-class SVM. For this purpose, two metrics are constructed to characterize normal sample patterns.

Reconstruction Similarity: This is defined by calculating the Euclidean distance between the original input and its reconstructed counterpart , reflecting the discrepancy between the input and reconstructed images. It is formulated as follows:

3.4.1. Latent Vector Similarity

This metric calculates the Euclidean distance between the latent vector of the original input and of the reconstructed image, indicating the deviation between original and reconstructed inputs in the latent space. It is formulated as follows:

Based on the two metrics and , a two-dimensional feature space can be constructed, where each training sample is represented as a two-dimensional vector . This two-dimensional feature space serves as the input to the one-class SVM.

One-class SVM has been extensively utilized and demonstrated to be effective in anomaly detection tasks [1820]. Its fundamental concept involves identifying a hyperplane that maximizes the margin between the classes of normal and anomalous samples. Specifically, the feature space for normal samples is constructed to form the training dataset: . Given this data set, one-class SVM seeks to address the following optimization problem:

Here, and parameterize the separating hyperplane, transforms the data into a higher dimensional feature space, signifies the training error, and governs the ratio of outliers.

Solving this optimization problem yields the decision function as follows:

In this context, a test sample is categorized as normal if ; otherwise, it is considered an anomaly.

Following the detailed discussion above, the complete process of the DADA model is presented in Algorithm 1.

Train Set: Normal radar signal dataset, transformed using SPWVD.
1: for a set number of training iterations
2:  Minimize the reconstruction loss in Equation (7) to align with x.
3:  Minimize the feature similarity loss in Equation (8) to reduce the latent representation differences between x and .
4: End for
5: Construct a two-dimensional feature space from R(X) and L(V) using Equations (9) and (10).
6: Employ one-class SVM to learn the decision boundary for normal samples.

4. Experimental Results and Evaluation

4.1. Dataset: Details and Specifications

The dataset used in our experiments is derived from the “Radar Signal Simulation Platform under Complex Electromagnetic Environment” at the Southwest China Research Institute of Electronic Equipment. This platform employs a parabolic equation method to generate synthetic radar signal data. The parabolic equation technique serves as the foundation of radar signal processing by aligning and filtering the received echo signals with a reference signal identical to the transmitted one. This procedure yields a complex signal with a parabolic trajectory in the time domain. The simulated echo signals incorporate noise and Doppler effects to mimic real-world radar returns.

Figure 4 displays a representation of the simulated scenario incorporating multipath effects from sea surface reflections. These effects distort the received signal as it follows different propagation paths before arriving at the receiver. In the simulation, the receiver representing an aircraft at 8,000 m altitude follows a circular trajectory, while the transmitter at 3,000 m altitude moves along a linear path directing toward the circle’s center. Both the transmitter and receiver are simulated using vertical polarization dipole antennas. The transmitter power is set to 100 W with a gain of 20 dB and the receiver has a gain of 13 dB. Four signal types are generated in the simulation: LFM, NLFM, BPSK, and QPSK. The carrier frequency is uniformly fixed at 2,000 MHz for all signals. For LFM, the pulse width (PW) ranges from 5 to 15 μs and the bandwidth (BW) from 10 to 20 MHz. NLFM uses the same PW of 5–15 µs and BW of 10–20 MHz. For BPSK and QPSK, the number of subpulses ranges from 16 to 32, and the BW is from 2 to 5 MHz. To meet the requirements of the model, the training dataset contains 2,000 samples for each normal signal type. The test dataset comprises 200 samples per signal type, including both normal and multipath interference cases.

The radar signals are transformed into two-dimensional time–frequency images using the SPWVD technique to capture their dynamic spectral characteristics. SPWVD, an advanced time–frequency analysis method, jointly represents nonstationary signals in both time and frequency domains. Derived from the Wigner–Ville Distribution (WVD), SPWVD incorporates a smoothing kernel to mitigate the issues of cross-term interference and noise sensitivity associated with WVD. SPWVD achieves high-resolution signal representations, accurately capturing time-varying frequency content more than traditional techniques such as STFT and wavelet transform. This superior resolution is highly advantageous for analyzing and characterizing radar signals, where time–frequency features are vital for precise representation and detection. Figure 2 depicts the SPWVD-generated time–frequency images for both the normal and multipath interference signals across the four radar signal types.

4.2. Model Parameter Settings

In this work, we develop the model using the PyTorch deep learning framework. The experiments are implemented on a computer equipped with an RTX 3080 GPU and CUDA 11.7, running the Windows 10 operating system. The Adam optimizer is utilized to optimize the model with the following hyperparameter settings: learning rate lr = 0.0002, first momentum exponential decay rate β1 = 0.9, second momentum exponential decay rate β2 = 0.999, and numerical stability term ε = 1e−8.

4.3. Performance Analysis with Varying Multipath Interference Signals

In this study, we employ various evaluation metrics to assess the performance of the anomaly detection model. These metrics include:(1)Precision (P): Precision measures the proportion of true positive (TP) instances among the instances classified as positive by the model, calculated as P = TP/(TP + FP), where FP represents false positives.(2)Recall (R): Recall quantifies the proportion of true positive instances correctly identified by the model out of all true positive instances, calculated as R = TP/(TP + FN), where FN represents false negatives.(3)F1-score (F1): The F1-score is the harmonic mean of precision and recall, providing a single metric that combines both aspects. It is calculated as F1 = 2 ×(P ×R)/(P + R).

These evaluation metrics allow for a comprehensive assessment of the anomaly detection model’s performance, ensuring its effectiveness and reliability across various scenarios.

We assess the performance of our proposed method by analyzing test sets containing varying numbers of multipath interference signals. Specifically, we conduct four experiments, each involving a test set with an incrementally increasing number of multipath signals. To validate the effectiveness of the DADA model, this study conducts a comprehensive comparison between traditional radar signal feature extraction algorithms and deep learning models. For traditional algorithms, features are extracted from the time, frequency, and time–frequency domains. In the time domain, complexity features (CC) of the signals are extracted, including box dimension, information dimension, multiscale entropy, and sparsity. These features can effectively characterize the temporal dynamics of the signals [24]. In the frequency domain, key features based on spectral correlation (SC) are extracted, including the cyclic frequency peaks and core statistical parameters of the power spectral density (PSD), such as total power in the bandwidth, average power, variance of power, skewness, and kurtosis of the power distribution [21]. These frequency domain features aim to fully capture and describe the energy distribution and intrinsic nonstationarity of radar signals in the frequency domain. In the time–frequency domain, the wavelet ridge frequency cascade features (WRFCCF) of signals based on wavelet transform are extracted to depict statistical characteristics on the time–frequency plane by capturing instantaneous frequency information [22]. One-class SVM is utilized on the above extracted features for anomaly detection. For deep learning models, mainstream algorithms including AnoGAN [11], EGBAD [12], and GANomaly [13] are selected for comparison.

4.3.1. Experiment 1: Test Set with Single Multipath Signal

In this experiment, we evaluate the performance of our proposed method on a test set containing a multipath interference signal to assess its ability to detect and handle a single interference source. The results are shown in Table 1.

4.3.2. Experiment 2: Test Set with Two Multipath Signals

In the second experiment, we increase the number of multipath interference signals in the test set to two to evaluate the robustness of our method when dealing with multiple sources of interference. The experimental results are shown in Tables 2 and 3.

4.3.3. Experiment 3: Test Set with Three Multipath Signals

The third experiment expands the test set to three multipath interference signals and evaluates the performance of our method in more complex scenarios with higher interference levels. The experimental results are shown in Table 4.

4.3.4. Experiment 4: Test Set with Four Multipath Signals

Finally, the fourth experiment evaluates our proposed method on a test set containing all four multipath interference signals, aiming to demonstrate its effectiveness in handling the most challenging cases under high interference levels. The results are shown in Table 5.

As shown in Tables 15, our proposed method achieves superior F1-scores compared to other methods across all datasets. It is observed that the model finds it relatively easy to process test sets containing only a single multipath interference signal, achieving the best performance on LFM and NLFM with F1-scores of 0.990 and 0.979, respectively. In comparison, the performance on BPSK and QPSK declines slightly, indicating greater challenges in detecting anomalies for these signal types.

As more multipath signal types are included in the test set, the overall performance of all methods decreases, especially when BPSK signals are present. This further highlights the difficulty that BPSK signals pose for anomaly detection. Although the CCF and SC methods achieve 100% recall, their F1-scores are lower. The performance degradation with more signal types is more pronounced for deep learning models such as AnoGAN, EGBAD, and GANomaly, especially on the test set with all four multipath signals. Our method consistently shows better overall performance and is more robust in complex environments.

Figures 5 and 6 illustrate the model’s reconstruction on the test set signals. Figure 5 shows the reconstructed images when the test set contains single multipath signal. For each signal type, the first image represents the normal signal, and the other two are multipath interference signals. It is observed that the model can effectively reconstruct normal signals but struggles with anomalous multipath signals, since it only learns normal signal characteristics. Figure 6 displays the reconstructions when two multipath signal types are present in the test set. As the model performs well on normal signals, all images here contain multipath signals. Compared to Figure 5, slight distortions emerge when reconstructing signals in Figure 6, e.g., LFM features appearing in BPSK multipath signals, possibly due to the inclusion of information from both normal signal types during reconstruction. Nevertheless, the model remains unable to properly reconstruct multipath signals, which facilitates anomaly detection. Experiments 3 and 4 show similar reconstruction performance with more multipath signal types, further demonstrating the correlation between the model’s anomaly detection capability and the number and types of multipath signals in the test set. In summary, the model can reconstruct normal signals well but fails to effectively reconstruct multipath signals. Also, its reconstruction capability declines with more signal types in the test set, yet anomalous signals can still be successfully identified. This validates that the model can effectively detect anomalies by learning the characteristics of normal signals.

To more comprehensively evaluate the model performance, Figures 7(a) and 7(b) present the accuracy (ACC) and false positive rate (FPR) of different methods on all datasets, respectively. The ACC reflects the model’s capability in correctly recognizing all instances. A higher ACC signifies that the model can effectively distinguish between positive and negative samples, demonstrating its overall classification performance. The FPR refers to the proportion of negative samples incorrectly classified as positive, which is especially critical for anomaly detection tasks since it directly correlates to the number of false alarms. A lower FPR denotes that the model excels at avoiding mislabeling normal samples as anomalies. Our method attained higher ACC and lower FPR on most datasets, with FPR being 0 on LFM and NLFM datasets. These results further validate the efficacy of our proposed method.

Figure 8 illustrates the decision boundary delineated by the one-class SVM for normal and abnormal samples within the test data of the LN dataset. The model effectively encapsulates the majority of the normal data points within the decision boundary, which is shown as an elliptical contour. Notably, the normal samples are predominantly inside the ellipse, while the abnormal samples are largely outside the ellipse, indicating a clear separation of the two classes by the model.

Overall, these results demonstrate that the proposed method offers improved anomaly detection performance, surpassing previous advanced techniques.

5. Conclusion

To address the issue of multipath interference detection in radar signals, we have proposed a semisupervised anomaly detection approach called DADA in this study. The method is trained exclusively on normal signals. By extending the autoencoder architecture and incorporating a feature extractor network, it can capture the latent feature space of the samples. To better extract the time–frequency characteristics of radar signals, a CBAM attention mechanism is introduced to enhance feature learning. The method jointly considers the high-dimensional image space and the low-dimensional feature space, constructs a two-dimensional feature space representing normal samples, and performs anomaly detection by learning the feature space boundary using one-class SVM. The effectiveness of the proposed approach is validated through extensive experiments on multiple datasets in each experimental group. Reconstruction analysis shows that DADA can effectively reconstruct normal signals, but fails for multipath signals. Results show that DADA consistently achieves higher accuracy and F1-scores compared to benchmarks, and exhibits greater robustness when more signal types are present in the test set. Our future work will evaluate the generalizability of the method on more datasets.

Data Availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare there are no conflicts of interest.

Acknowledgments

This study is financially supported by the Science and Technology on Electronic Information Control Laboratory, Grant/Award Number: 6142105190312 and the National Natural Science Foundation of China, Grant/Award Number: 62201097.