A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY(2022)

引用 10|浏览14
暂无评分
摘要
In recent years, deep neural networks are increasingly popular in the field of radar high-resolution range profiles (HRRPs) target recognition. Unfortunately, recent researches have revealed that a deep-learning classifier can be easily fooled by adding small perturbations to the input, named adversarial attack. This provides us an inspiration for radar deceptive jamming signal generation in electronic countermeasures (ECMs). However, the perturbations generated by these adversarial attacks are usually of complex envelopes and quite low power, making it challenging for jammers to generate such actual jamming signals. To solve that issue, we propose a practical deceptive jamming generation method that learns the vulnerable range cells in an HRRP sample and injects several jamming pulses with specific amplitudes into these range cells. Such jamming signals are easy to generate and can deceive the radar automatic target recognition (RATR) model to output the wrong target category prediction with high confidence. To avoid the requirement of the recognition network structure information, we leverage the differential evolution optimization algorithm (non-gradientbased). Further, to provide the potential of real-time jamming signal generation during the test, an encoder is constructed not only to learn the separable features but also to find the vulnerable range cells and the specific amplitudes of the jamming pulses. In the experiments, we apply the proposed attack algorithms to fool the one-dimensional convolutional neural network-based HRRPRATR models. The extensive experimental results on measured aircraft HRRP dataset prove that the proposed algorithms achieve a promising attack performance and serve as a practical and fast deceptive jamming generation method.
更多
查看译文
关键词
Jamming,Radar,Target recognition,Perturbation methods,Radar imaging,Signal processing algorithms,Real-time systems,Adversarial attack,high-resolution range profiles,radar automatic target recognition,electronic countermeasures,deceptive jamming,black-box attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要