Research Article  Open Access
Zijian Wang, Wenbo Yu, Zhongjun Yu, Yunhua Luo, Jiamu Li, "Neural NetworkGuided Sparse Recovery for InterruptedSampling Repeater Jamming Suppression", International Journal of Antennas and Propagation, vol. 2021, Article ID 5368600, 13 pages, 2021. https://doi.org/10.1155/2021/5368600
Neural NetworkGuided Sparse Recovery for InterruptedSampling Repeater Jamming Suppression
Abstract
Interruptedsampling repeater jamming (ISRJ) is a new type of DRFMbased jamming designed for linear frequency modulation (LFM) signals. By intercepting the radar signal slice and retransmitting it many times, ISRJ can obtain radar coherent processing gain so that multiple false target groups can be formed after pulse compression (PC). According to the distribution characteristic of the echo signal and the coherence of ISRJ to radar signal, a new method for ISRJ suppression is proposed in this study. In this method, the position of the real target is determined using a gated recurrent unit neural network (GRUNet), and the real target can be, therefore, reconstructed by adaptive filtering in the sparse representation of the echo signal based on the target locating result. The reconstruction result contains only the real target, and the false target groups formed by ISRJ are suppressed completely. The target locating accuracy of the proposed GRUNet can reach 92.75%. Simulations have proved the effectiveness of the proposed method.
1. Introduction
Linear frequency modulation (LFM) signal is widely used in wideband radar systems for its large timebandwidth product and high Doppler tolerance [1, 2]. By coherent processing of LFM, noise jamming and other noncoherent jammings can be greatly suppressed. However, with the widespread application of digital radio frequency memory (DRFM) technology, a number of new types of radar jamming have been developed. DRFM has the ability to sample, store, modulate, and forward radar signals. By coherently replicating the radar signal, the generated jamming signal can retain the intrapulse modulation characteristic of the radar signal and can thus obtain the coherent processing gain at the radar receiver. Therefore, the application of DRFM has greatly reduced the transmission power requirement of the jammer, making it light enough to be loaded onto the target to flexibly interfere with the radar system.
Interruptedsampling repeater jamming (ISRJ) is a newly proposed radar coherent jamming model based on DRFM [3]. By intercepting, delaying, and repeatedly forwarding the transmitted radar signal within a signal pulse width, a series of realistic coherent false target groups can be formed after range pulse compression (PC) [4]. The mathematical principle and performance of ISRJ are analyzed in [5]. On this basis, many researchers have analyzed and improved the jamming performance of ISRJ and have gradually applied ISRJ to jamming radar of various systems including synthetic aperture radar (SAR) and inverse synthetic aperture radar (ISAR) [6–11]. ISRJ can be adapted to both receivetransmit timesharing antenna system and antenna system with two antennas working asynchronously [12]. Moreover, the instant sampling and forwarding process of ISRJ does not need to receive signals of complete signal duration, so the jammer can adjust parameters at any time to flexibly change the jamming mode, which poses a great threat to the radar system [13].
Nevertheless, the research studies on countering ISRJ are still lacking so far. The research study of ISRJ countermeasures mainly focuses on signal processing and waveform design. In terms of signal processing, for dechirping radar, a bandpass filter is designed [14] by using the discontinuity characteristic of ISRJ in the timefrequency (TF) domain. However, this method damages the continuity of the target signal in the frequency domain, resulting in strong sidelobe components of the PC result. In [15], the PC result of the echo signal is transformed into TF domain, and an adaptive filter is constructed to filter out ISRJ based on the discontinuity of false target in TF domain. A parameter estimation method using TF analysis and deconvolution of ISRJ is proposed in [16], and ISRJ is suppressed by interference cancellation through the reconstruction of the jamming signal. Based on signal sparse recovery, [17, 18] propose new ideas for jamming suppression. A wideband jamming suppression method based on TF domain filtering and sparse recovery is verified in [17]. In [18], the energy function is first used to extract the signal part not disturbed by ISRJ; then, the target reconstruction is completed based on the sparsity of the signal in the frequency domain after dechirping. In the aspect of waveform design, intrapulse frequency random coded signal is used in [19] to suppress the false target ahead of the real target generated by improved ISRJ through frequency modulation. In [20], a hybrid modulated signal is adapted to make the subpulses of the signal orthogonal to each other, and the real target is distinguished from the false target by subpulse compression.
Deep learning has recently shown excellent performance and broad application prospects in computer vision, speech recognition, natural language processing, and other fields. In terms of radar jamming suppression, due to the wide variety of radar signals and jamming models, how to make better use of deep learning methods has become the focus of research studies of scholars. Jamming suppression is regarded as an image processing problem in [21, 22]. First, the shorttime Fourier transform (STFT) is applied to obtain the TF spectrum of the signal as the input of the convolutional network, and then, the jammingfree signal is output directly through the convolutional network. In [23], combined with the method of target detection, the author uses a single shot multibox detector (SSD) to detect the jamming signal in the TF domain and performs adaptive filtering according to the detected jamming types and jamming parameters to complete jamming suppression. For the dechirping radar system, a bidirectional gated recurrent unit (GRU) is used in [24] to classify signal segments in the time domain and filter out the part interfered by ISRJ. It can be seen that the current deep learning countermeasures against radar jamming are basically independent of traditional research studies, and the prior knowledge that may help the network understand the jamming model better is not fully utilized.
In this study, a method against ISRJ is proposed based on the coherence of ISRJ with respect to the real target signal and the different TF distribution characteristics between real target and false target groups. This method can reconstruct the real target through adaptive sparse filtering using the target locating result of the proposed GRU neural network (GRUNet). The rest of this study is arranged as follows. Section 2 first introduces the signal model of the target signal and ISRJ and then analyzes the amplitude response and TF characteristics of the ISRJ PC result. Section 3 proposes the antiISRJ method based on GRUNet target locating and sparse recovery. The process of real target locating using GRUNet, sparse representation of the echo signal, and real target reconstruction is introduced. Section 4 conducts some simulations to validate the effectiveness of this method against ISRJ and studies the factors affecting the real target locating. Finally, the main conclusions are drawn in Section 5.
2. Principle of ISRJ
2.1. Signal Model
The LFM pulse radar transmits the LFM signal pulse by pulse and receives an echo signal from the target. Suppose that the target is equipped with an ISRJ jammer, the received echo signal will be polluted by ISRJ, which will seriously damage the imaging quality of the target and the subsequent detection.
Assume that the normalized LFM signal transmitted by radar iswhererepresents a rectangular window of width , is the pulse width of LFM signal, represents the chirp rate, and is the bandwidth of the LFM signal. The carrier frequency of the signal is omitted because it does not affect the derivation.
Assume that the distance between the target and the radar is , the target echo signal received by the radar can be expressed bywhere represents the time delay of the target echo signal, is the speed of light, and is the amplitude of target echo signal, which can be calculated by radar equation.
The ISRJ jammer first intercepts and samples a slice of radar signal and then retransmits it many times. This process is repeated until the end of the radar pulse. Figure 1 shows the principle of ISRJ. is the repeat sampling interval, is the sampling pulse width, is the retransmission times of a single slice sampling, , is the number of radar signal slices that can be intercepted by the jammer within the duration of a radar signal pulse, and .
The sampling equation is a rectangular envelope pulse sequence with pulse width and pulse repetition interval , where denotes convolution operator.
Therefore, radar signals intercepted and sampled by jammers can be described by
After intercepting and sampling the radar signal, the jammer retransmits the intercepted signal slice several times, and the resulting jamming signal can be obtained as follows:where is the amplitude of the jamming signal, which can also be calculated by radar equation.
Finally, the echo signal received by radar includes target echo signal, jamming signal, and noise signal , which obeys a Gaussian distribution. The echo signal can be expressed by
2.2. PC Result of ISRJ
The matched filter of LFM radar can be expressed as . Taking the first retransmission of the th jamming slice as an example (for convenience, the time delay is set at zero, which does not affect the results), the PC process can be regarded as the convolution between the matched filter and the jamming slice. With , the PC result of that jamming slice iswhere . Equation (7) indicates that the PC result of that jamming slice is a “sinc” function with the peak value at . Therefore, for the first retransmission of all jamming slices, the amplitude response of the PC result can be expressed by
The PC result of the same intercepted radar signal slice with different retransmission times only differs at time delay, so the amplitude response of the whole ISRJ PC result can be represented by
The above analysis shows that the amplitude response of the ISRJ PC result delay is a series of false target groups in the form of “sinc” with different delays. It mainly depends on some key parameters, such as , , , and .
2.3. TF Analysis of PC Result
The TF analysis can show the joint distribution of signal energy both in time and frequency domains. Generally, TF transformation is realized by STFT, which can be expressed as follows:where is a sliding window function, and is the input signal.
For the PC result of the echo signal, when a rectangular window is used, the TF distribution can be represented bywhere is the PC result of the echo signal, is the sliding time, and is the width of the sliding window. The TF distribution of is shown in Figure 2.
As can be seen from Figure 2, the real target signal after PC presents a long and concentrated stripshaped distribution in the TF domain, while the TF distribution of a certain jamming slice of ISRJ after PC is discontinuous in the TF domain and presents the form of “sinc” in the time domain and frequency domain, respectively. For jamming slices with the same retransmission time, the TF distribution is a series of “sinc” functions of the same time unit and different frequency units. For jamming slices intercepted from the same signal slice but with different retransmission times, the TF distribution can be expressed as multiple regularly distributed “sinc” functions of the same frequency unit and different time units.
To sum up, the ISRJ jammer intercepts and retransmits slices of the target echo signal, and each jamming slice corresponds to a single fragment that discontinuously distributes in the TF domain after PC, while the real target signal after PC presents a continuous strip distribution in the TF domain. Therefore, the real echo target and the false target groups formed by ISRJ can be well distinguished after PC according to different distribution characteristics in the TF domain.
3. The Proposed Method
3.1. Main Steps of the Proposed Method
The TF distribution of ISRJ after PC is relatively short and discontinuous compared to the real echo target signal. Additionally, the distribution of different false target groups in the time domain is correlated among each other. In view of these characteristics, combined with GRUNet, a new method against ISRJ is proposed in this study, the detailed process of which is listed in Algorithm 1.

3.2. Real Target Locating Based on GRUNet
In order to accurately determine the time unit of the real target in the TF domain after PC, a gated recurrent unit neural network is proposed in this study. Stacked with two bidirectional GRU layers, GRUNet can process the input data in both forward and backward directions along the time axis. Therefore, for the target locating task in this study, bidirectional GRU layers can make better use of distribution information of PC results and the correlation information between different time units compared with monodirectional GRU layers, thus locating the real target with less error probability.
The input of the GRUNet is a normalized TF image of the echo signal after PC. The size of TF image is , where is the number of range sampling points. As the recurrent neural network is especially suitable for processing serialized data and further discovers the relationship among the internal elements of the sequence, the input TF image is regarded as a sequence signal along the time axis, where every column of the image , a vector of length , is one element of the sequence. The length of the sequence is accordingly. As shown in Figure 3, by extracting the features of these elements, GRUNet can map the th element to a single value , which indicates the probability of column containing a target.
As shown in Table 1, an adaptive average pooling layer is applied at the beginning to reduce the dimension of input elements to a fixed size. Bidirectional GRU contains two independent GRUs working along with the opposite temporal directions, which are separately shown with blue and orange parts in Figure 3, so the output size is doubled compared to a single GRU. The output of GRU at the th time unit depends both on the input at the th time unit and the last hidden state , so we input the downsampled element step by step. After two GRU layers, a linear layer takes the output vector of GRU2 as input and outputs a single value at each time unit. In the end, softmax is applied along the time axis to normalize , and the final target location can be obtained bywhere is the normalized .

3.3. Sparse Recovery of Target Echo Signal
Since the generation process of ISRJ is intercepting, sampling, and delayed forwarding of the radar target signal, each ISRJ slice is equivalent to a target echo signal with smaller pulse width. Therefore, based on the coherence of ISRJ relative to the target echo signal, the echo signal can be represented by the dictionary, which is constructed by the target echo signal.where is the dictionary of sparse representation, which is a matrix, is the number of sampling points in range direction, and is the number of range gates. Each column of the dictionary is a delayed form of transmitting signal, and different column corresponds to different time delay. The specific form of the dictionary can be expressed aswhere is the time delay between two adjacent columns, and the range resolution of sparse representation is . is a vector representing the energy factor of the real target and the false targets generated by ISRJ. When the real target distributes sparsely in the range domain, the false target groups formed by intercepting and retransmitting the real target signal can also be considered as sparsely distributed in the range domain. has only several nonzero coefficients on the corresponding range gate of the real target and main false targets generated by ISRJ. The echo signal, therefore, has a sparse representation using the above dictionary.
The sparse representation can be obtained by solving the following convex optimization equation:where is the norm, and the nonnegative coefficient is used as a tradeoff factor to compromise the sparsity and residual of the optimization solution of this equation. The larger the is, the sparser the , but the residual will also be correspondingly larger. The sparse representation of the echo signal is shown in Figure 4.
As can be seen from Figure 5, noise is greatly suppressed in the process of solving Equation (15). Because the real target echo signal and ISRJ are consistent with the dictionary, peaks can be generated at the positions corresponding to the real target and the main false target groups, and the height of the peaks represents the corresponding energy.
According to the sparse representation of the echo signal and the target locating result of GRUNet, an adaptive filter can be constructed in the sparse representation domain to filter out the peaks of false targets and retain the peak of the real target, which can be represented bywhere
Then, the reconstructed target echo signal can be expressed bywhere is the amplitude compensation factor, which is the ratio of the target amplitude before jamming suppression to the reconstructed target amplitude. Through multiplying the PC result of the reconstructed signal by , the final signal reconstruction result where ISRJ and noise are greatly suppressed can be obtained.
4. Simulations
4.1. Data Training
The proposed method can accurately reconstruct the target signal if the real target position is correctly located, which is regarded as successful antijamming. Therefore, the performance of the proposed method depends on the target locating precision of GRUNet, which can be expressed bywhere is the number of correct locating samples, and is the total number of samples.
The proposed GRUNet is trained by supervised learning. In order to obtain an accurate target position, 4,000 groups of simulated echo signals with random parameters are generated, which are divided into the training set, validation set, and test set in accordance with the ratio of 8 : 1 : 1. The parameter ranges of training samples are listed in Table 2.

Since the task for GRUNet is more like a multiclassification problem, we choose onehot encoding as our training label, which can be denoted aswhere is the position of the real target.
The network is optimized by the stochastic gradient descent (SGD) optimization algorithm based on a weighted crossentropy loss, i.e., as follows:where is the corresponding target label. Weight is a hyperparameter designed to balance the importance of positive/negative examples, which is set to 0.001 in our experiments.
In the optimization process, the network is trained for 100 epochs with a total of 128 samples per minibatch. The initial learning rate is set to 0.0001, with momentum of 0.9 and weight decay of 0.0005. To check the convergence property of the proposed GRUNet, the curve of loss value and target locating precision versus the number of training epochs is shown in Figure 5 by a red line and a green line, respectively. It can be seen that the training loss decreases rapidly with the increase in training rounds while the detection accuracy of the real target position continues to rise, and they both remain stable in the end. After training for 100 epochs, the final target locating precision stays at 92.75%.
In order to prove the advantages of the proposed GRUNet, we construct a LSTMNet by replacing the GRU layers of GRUNet with LSTM layers under the condition that the network structure and training hyperparameter remain unchanged, and a contrast experiment is carried out to compare the target locating precision between the two networks. Experimental result shows that after training for 100 epochs, the target locating precision of both neural networks is maintained at 92.75%. However, the model size of LSTMNet is 206 kB, while the model size of GRUNet is 155 kB, which means that GRUNet has a lower computational burden compared to LSTMNet, while the target locating performance of the two neural networks is very close to each other.
A hypothesis test can verify the stability and excellence of the proposed network [25]. To further prove the advantage of GRUNet in the target locating task, we perform a onetailed ttest on the generated dataset, and the intermediate result of the statistical hypothesis calculation process is listed in Table 3. The target locating precision is taken as an evaluation matrix in the ttest. It can be seen from Table 3 that the average test value of GRUNet is , and the variance is .

Finally, the critical value can be obtained by (where is the assumed minimum value, and ). The critical value is larger than the given value of 3.365 by the onetailed ttest table, which means that the test value of GRUNet is larger than the assumed test value (0.915) with a confidence degree of .
4.2. Factors Affecting Target Locating Precision
Since the target locating precision is highly correlated with the input TF data, we consider that the target locating precision may be related to the signaltonoise ratio (SNR), jammingtosignal ratio (JSR), and of the echo signal. Among them, SNR and JSR represent the power ratio of signal to noise and interference to signal, respectively, which can be defined aswhere denotes noise power.
In order to study the effect of SNR and JNR on target locating precision, a series of Monte Carlo simulations are carried out in this study. The generated test sets are divided into 8 modes with different retransmission times and a number of jamming slices . The settings of these eight modes are shown below in Figure 6. In the Monte Carlo simulations, the test sets are generated from 5 dB to 20 dB at 3 dB JSR intervals and from 10 dB to 10 dB at 5 dB SNR intervals, respectively. This results in 30 test groups per mode, and 100 Monte Carlo simulations are conducted in every test group.
In consideration of controlling variables, the bandwidth and the pulse width of the target echo signal are set at 9 MHz and 26 μs, respectively. The repeated sampling interval is separately set at 0.26 and 0.39 , corresponding to two different numbers of jamming slices . Other parameters remain the same as those listed in Table 1.
When , it means that the jammer intercepts a slice of the radar signal and directly retransmits the intercepted slice once. At this time, the jamming signal is called interruptedsampling direct jamming (ISDJ), which differs from ISRJ only in the retransmission time of jamming slices. According to Section 2, the TF distribution of false target groups after PC is discontinuous compared with the real target, but there are only few correlations in the range domain because there is only one false target group.
The changing trend of target locating precision in 8 modes of ISRJ and ISDJ versus JSR and SNR is shown in Figure 7. Some key conclusions can be drawn from Figure 7, which are shown in the following:(1)In the case of fixed JSR, increases with the increase in SNR in the same mode.(2)When SNR is small, target locating is relatively prone to error, but the changing trend of is not obvious versus JSR. In general, a larger JSR has a greater negative impact on .(3)When the retransmission time is fixed, the more the sampling numbers of the signal, the more chaotic the TF distribution of the echo after PC, and the , in general, is relatively low.(4)The TF distribution of the echo after PC is chaotic when the sampling number and the retransmission time M are large (see mode 4 and mode 8), which is, in general, unfavorable for target locating.(5)It can be seen that GRUNet not only has an excellent performance in target locating in the case of ISRJ but also can realize target locating based only on the distribution difference in the TF domain between real target and false target groups in the case of ISDJ, which means that the proposed method has the ability to suppress not only ISRJ but also ISDJ.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
According to Equation (9), when the sampling number and retransmission time are fixed, the TF distribution of ISRJ after PC is mainly related to . For the purpose of learning the specific impact of on , 1,000 test data are generated with and fixed at 4, and is uniformly distributed in the interval of . The mislocated data are statistically analyzed, and the statistical result is shown in Figure 8. It can be seen that when is smaller, despite that the amplitude of false targets is smaller, the false target groups are more densely distributed in the range domain, which may result in lower target locating precision.
4.3. The Jamming Suppression Performance of the Proposed Method
In view of the fact that the proposed GRUNet can achieve high target locating precision under ISRJ, the jamming suppression performance of the proposed method is, therefore, tested. The bandwidth and the pulse width of the target echo signal are set at 9 MHz and 30 μs, respectively. The repeated sampling interval is set at 0.38 , and the intercepted radar signal slice is retransmitted three times. The real target position is at 1,300 m. Under the condition that SNR is 5 dB and JSR is 15 dB, the TF data of the echo signal are first input into the proposed GRUNet, and the actual position of the real target can be acquired, which is shown in Figure 9.
On the other hand, this echo signal is sparsely represented, and the result is shown in Figure 10. It can be seen from the result of sparse representation that there are three false target groups formed by retransmission, and the amplitude of main false targets in each false target decreases rapidly from the middle to the two sides.
According to Equation (17), an adaptive filter is constructed based on the target locating result by GRUNet. After sparse domain filtering and amplitude compensation, the target signal is reconstructed, and the final jamming suppression result is obtained, which is shown in Figure 11. It can be seen that the proposed method successfully suppressed ISRJ and noise after signal reconstruction.
5. Conclusions
Based on the distribution characteristic of the echo signal and the coherence of ISRJ with respect to the radar signal, an ISRJ suppression method using sparse representation and deep learning target locating is innovatively proposed in this study. First, the TF domain data of the echo signal after PC are input into the proposed GRUNet, and the location of the real target can be acquired according to the different TF distribution characteristics and the correlation information between the false target groups formed by ISRJ and the real target. Then, the coherence of the target signal and ISRJ relative to the constructed dictionary is used to sparsely represent the received echo signal. As a result, there are peaks at the exact range position of the real target and the strong false target groups, and the real target is, therefore, reconstructed after filtering in the sparse domain to achieve ISRJ suppression. Simulation results have demonstrated the effectiveness of the proposed method.
Because of the noncoherence between the noise signal and the constructed dictionary, the noise signal is also greatly suppressed besides ISRJ. The method proposed in this study is not limited to the suppression of ISRJ. For other kinds of sliced forwarding jammings with different forwarding modes or different modulation modes, they forward or modulate slices of radar signal so that the generated jamming signal is discontinuous both in the time domain and frequency domain compared with radar signal. Based on this characteristic, the proposed method can also be used to distinguish the real targets from the false targets in the TF domain under these types of jammings. Therefore, the proposed method also has great reference significance for the suppression of other DRFMbased slice forwarding jammings.
Data Availability
The data of Monte Carlo simulations used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
References
 S. Baher Safa Hanbali, “Technique to counter improved active echo cancellation based on ISRJ with frequency shifting,” IEEE Sensors Journal, vol. 19, no. 20, pp. 9194–9199, 2019. View at: Publisher Site  Google Scholar
 C. Liu, S. Liu, C. Zhang, Y. Huang, and H. Wang, “Multipath propagation analysis and ghost target removal for FMCW automotive radars,” in Proceedings of the 2020 IET International Radar Conference (IRC), pp. 1–5, Chongqing, China, November 2020. View at: Google Scholar
 M. J. Sparrow and J. Cikalo, “ECM techniques to counter pulse compression radar,” 2006, United States Patent, 7081846. View at: Google Scholar
 D. C. Schleher, Electronic Warfare in the Information Age, Artech House, Boston, MA, USA, 1999.
 X. Wang, J. Liu, and W. Zhang, “Mathematic principles of interruptedsampling repeater jamming (ISRJ),” Electronic Warfare in the Information Age Science in China Series F: Information Sciences, vol. 50, no. 1, pp. 113–123, 2007. View at: Publisher Site  Google Scholar
 D. Feng, L. Xu, X. Pan, and X. Wang, “Jamming wideband radar using interruptedsampling repeater,” IEEE Transactions on Aerospace and Electronic Systems, vol. 53, no. 3, pp. 1341–1354, 2017. View at: Publisher Site  Google Scholar
 D. Feng, H. Tao, Y. Yang, and Z. Liu, “Jamming dechirping radar using interruptedsampling repeater,” Science in China Series F: information Science, vol. 54, no. 10, pp. 2138–2146, 2011. View at: Publisher Site  Google Scholar
 X. Pan, W. Wang, D. Feng, and Y. Liu, “On deception jamming for countering bistatic ISAR based on subNyquist sampling,” Radar Sonar & Navigation, vol. 8, no. 3, pp. 173–179, 2014. View at: Publisher Site  Google Scholar
 G. Liu, K. Zheng, and M. Gao, “Design and implementation of deception jamming signal generator against SAR,” Transactions of Beijing Institute of Technology, vol. 32, no. 2, pp. 184–188, 2012, Chinese. View at: Google Scholar
 W. Yang, J. Lin, and T. Wang, “Intermittent sampling scatterwave jamming against SAR,” Journal of Astronautics, vol. 3, no. 33, pp. 367–373, 2012, Chinese. View at: Google Scholar
 C. Li, W. Su, G. Hong, C. Ma, and J. Chen, “Improved interrupted sampling repeater jamming based on DRFM,” in Proceedings of the 2014 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 254–257, Guilin, China, August 2014. View at: Google Scholar
 H. Yuan, C. Wang, X. Li, and L. An, “A method against interruptedsampling repeater jamming based on energy function detection and bandpass filtering,” International Journal of Antennas and Propagations, vol. 2017, no. 1, pp. 1–9, 2017. View at: Publisher Site  Google Scholar
 S. Gong, X. Wei, and X. Li, “ECCM scheme against interrupted sampling repeater jammer based on timefrequency analysis,” Journal of Systems Engineering and Electronics, vol. 25, no. 6, pp. 996–1003, 2014. View at: Publisher Site  Google Scholar
 J. Chen, W. Wu, S. Xu, Z. Chen, and J. Zou, “Band pass filter design against interruptedsampling repeater jamming based on timefrequency analysis,” IET Radar, Sonar & Navigation, vol. 13, no. 10, pp. 1646–1654, 2019. View at: Publisher Site  Google Scholar
 C. Zhou, Q. Liu, and C. Hu, “Timefrequency analysis techniques for recognition and suppression of interrupted sampling repeater jamming,” Journal of Radars, vol. 8, no. 1, pp. 100–106, 2019. View at: Google Scholar
 C. Zhou, Q. Liu, and X. Chen, “Parameter estimation and suppression for DRFM based interrupted sampling repeater jammer,” IET Radar, Sonar & Navigation, vol. 12, no. 1, pp. 56–63, 2017. View at: Google Scholar
 X. Lu, J. Yang, C. Ma, H. Gu, and W. Su, “Wideband interference mitigation algorithm for SAR based on timevarying filtering and sparse recovery,” Electronics Letters, vol. 54, no. 3, pp. 165–167, 2018. View at: Publisher Site  Google Scholar
 H. Yuan, C. Wang, X. Li, and L. An, “ECCM scheme against interruptedsampling repeater jamming based on compressed sensing signal reconstruction,” Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, vol. 40, no. 4, pp. 717–725, 2018, Chinese. View at: Google Scholar
 R. Shen, Z. Liu, J. Sui, and X. Wei, “Study on interruptedsampling repeater jamming performance based on intrapulse frequency coded signal,” in Proceedings of the Ninth International Conference on Digital Image Processing (ICDIP 2017), Hongkong, China, July 2017. View at: Google Scholar
 J. Zhang and C. Zhou, “Interrupted sampling repeater jamming suppression method based on hybrid modulated radar signal,” in Proceedings of the 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), pp. 1–4, Chongqing, China, December 2019. View at: Google Scholar
 W. Fan, F. Zhou, P. Rong, and X. Yao, “Interference mitigation for synthetic aperture radar based on deep residual network,” Remote Sensing, vol. 11, no. 14, p. 1654, 2019. View at: Publisher Site  Google Scholar
 J. Rock, M. Toth, E. Messner, P. Meissner, and F. Pernkopf, “Complex signal denoising and interference mitigation for automotive radar using convolutional neural networks,” in Proceedings of the 2019 22th International Conference on Information Fusion (FUSION), pp. 1–8, Ottawa, Canada, July 2019. View at: Google Scholar
 J. Yu, J. Li, B. Sun, J. Chen, and C. Li, “Multiclass radio frequency interference detection and suppression for SAR based on the single shot multibox detector,” Sensors, vol. 18, no. 11, p. 4034, 2018. View at: Publisher Site  Google Scholar
 J. Chen, S. Xu, J. Zou, and Z. Chen, “Interruptedsampling repeater jamming suppression based on stacked bidirectional gated recurrent unit network and infinite training,” IEEE Access, vol. 7, pp. 107428–107437, 2019. View at: Publisher Site  Google Scholar
 J. Hu and W. Zheng, “A deep learning model to effectively capture mutation information in multivariate time series prediction,” KnowledgeBased Systems, vol. 203, Article ID 106139, 2020. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2021 Zijian Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.