2022
DOI: 10.3390/electronics11203280
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Multi-Node Jamming Recognition Method Based on Deep Residual Network

Abstract: Anti-jamming is the core issue of wireless communication viability in complex electromagnetic environments, where jamming recognition is the precondition and foundation of cognitive anti-jamming. In the current jamming recognition methods, the existing convolutional networks are limited by the small number of layers and the extracted feature information. Simultaneously, simple stacking of layers will lead to the disappearance of gradients and the decrease in correct recognition rate. Meanwhile, most of the jam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…To evaluate the accuracy and potential of the proposed AFUCR-SNRSN model, an ablation experiment is applied to SNRSN to check each module’s performance in recognizing interference. Then, the classic SVM, 1D-CNN in [ 13 ], LRN in [ 14 ], Res-soft in [ 20 ] and SNRSN are used to compare their performance in terms of interference signal recognition on a close set. Lastly, each method above is compared with the AFUCR-SNRSN model on an open set.…”
Section: Performancementioning
confidence: 99%
See 2 more Smart Citations
“…To evaluate the accuracy and potential of the proposed AFUCR-SNRSN model, an ablation experiment is applied to SNRSN to check each module’s performance in recognizing interference. Then, the classic SVM, 1D-CNN in [ 13 ], LRN in [ 14 ], Res-soft in [ 20 ] and SNRSN are used to compare their performance in terms of interference signal recognition on a close set. Lastly, each method above is compared with the AFUCR-SNRSN model on an open set.…”
Section: Performancementioning
confidence: 99%
“…In this situation, the dual problem of ( 15) can be represented as in (20), where k(x i , x j ) represents the kernel function used to project raw data to a high-dimensional space. This kernel function can be represented as ϕ(x i ), ϕ(x j ) .…”
Section: Afucrmentioning
confidence: 99%
See 1 more Smart Citation
“…Machine learning algorithms are also trained using spectrogram images [30], IQ samples [31], time-domain signal samples [32], and FFT samples [33,34] for jamming detection. Although machine learning algorithms are becoming increasingly popular, the issues of training these algorithms, collecting sufficient data for training, adapting to varying jamming strategies, and integrating them into the system architecture with minimal overhead must be considered.…”
Section: Introductionmentioning
confidence: 99%
“…Thanks to the development of artificial intelligence technology, deep learning has been successfully applied to ISAR jamming pattern recognition [ 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 ]. For instance, Wang et al [ 27 ] implemented the recognition of jamming patterns by CNN for three kinds of jamming, including suppression jamming, multiple false targets jamming, and narrow-pulse jamming.…”
Section: Introductionmentioning
confidence: 99%