Next Article in Journal
Research on Fingerprint Map Construction and Real-Time Update Method Based on Indoor Landmark Points
Previous Article in Journal
Dynamic Vision-Based Non-Contact Rotating Machine Fault Diagnosis with EViT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Frequency-Agility-Based Neural Network with Variable-Length Processing for Deceptive Jamming Discrimination

by
Wei Gong
,
Renting Liu
,
Yusheng Fu
,
Deyu Li
and
Jian Yan
*
University of Electronic Science and Technology of China, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(17), 5471; https://doi.org/10.3390/s25175471
Submission received: 4 July 2025 / Revised: 25 July 2025 / Accepted: 31 July 2025 / Published: 3 September 2025

Abstract

With the booming development of the low-altitude economy and the widespread application of Unmanned Aerial Vehicles (UAVs), integrated sensing and communication (ISAC) technology plays an increasingly pivotal role in intelligent communication networks. However, low-altitude platforms supporting ISAC, such as UAV swarms, are highly vulnerable to deception jamming in complex electromagnetic environments. Existing multistatic radar systems face challenges in processing slowly fluctuating targets (like low-altitude UAVs) and adapting to complex electromagnetic environments when fusing multiple pulse echoes. To address this issue, targeting the protection needs of low-altitude targets like UAVs, this paper leverages the characteristic of rapid amplitude fluctuation in frequency-agile radar echoes to analyze the differences between true and false targets in multistatic frequency-agile radar systems, particularly for slowly fluctuating UAV targets, demonstrating the feasibility of discrimination. Building on this, we introduce a neural network approach to deeply extract discriminative features from true and false target echoes and propose a neural network-based variable-length processing method for deception jamming discrimination in multistatic frequency-agile radar. The simulation results show that the proposed method effectively exploits deep-level echo features, significantly improving the discrimination probability between true and false targets, especially for slowly fluctuating UAV targets. Crucially, even when trained on a fixed number of pulses, the model can process input data with varying pulse counts, greatly enhancing its practical deployment capability in dynamic UAV mission scenarios.

1. Introduction

The rapid evolution of modern warfare and the low-altitude economy has spurred the extensive deployment of UAV platforms. Concurrently, electronic warfare equipment, particularly active deception jamming generated by Digital Radio Frequency Memory (DRFM), has been widely employed due to its low cost and high effectiveness, posing significant threats in combat and to low-altitude ISAC systems through malicious interference [1,2]. Recent studies have further demonstrated its adaptability to complex low-altitude environments [3]. DRFM techniques can precisely replicate, modulate, and retransmit intercepted radar signals, generating highly deceptive false targets in multiple dimensions such as range [4] and velocity [5]. These false targets severely threaten the collaborative sensing of UAV swarms, the security of communication links, and the detection and tracking capabilities of low-altitude defense systems against genuine UAV targets [6].
Current deception electronic countermeasure strategies can be classified into monostatic radar and multistatic radar systems. For monostatic radar countermeasures, extensive research has emerged in areas such as transmitted signal optimization [7], waveform agility [8], resource scheduling [9], and intelligent anti-jamming techniques [10,11]. However, monostatic radars suffer from limited perspectives and constrained observation resources, resulting in restricted Electronic Counter-Countermeasures (ECCM) capabilities. Especially in low-altitude ISAC systems, deceptive jamming simultaneously disrupts both sensing and communication link functionalities [12]. Consequently, multistatic radar strategies that leverage networked radars to acquire multi-perspective and multi-dimensional resources represent a key developmental trend for enhancing ECCM capabilities [13,14], especially in safeguarding low-altitude airspace (e.g., UAV traffic management and border surveillance) and ensuring the robustness of ISAC networks [15,16]. This trend is further amplified by the evolving landscape of 6G communications [17,18], which emphasizes ubiquitous connectivity, integrated sensing and communication (ISAC), and the integration of terrestrial and non-terrestrial networks, creating a critical need for resilient and adaptive anti-jamming solutions within such complex, heterogeneous environments [19,20].
Within networked radar systems targeting low-altitude ISAC applications, signal-level fusion methods extract and integrate subtle echo signal characteristics from multiple receiving stations, significantly improving information utilization compared to data-level fusion [21,22] with recent advances in multi-dimensional processing [3,23]. Existing techniques primarily exploit differences in spatial scattering characteristics between targets and jamming. Reference [24] achieved rapid-fluctuating target discrimination using multi-echo correlations under spatial independence, but their performance degrades for slow-fluctuating targets (e.g., hovering or low-speed UAVs). Addressing this, [25] proposed a single-Pulse Repetition Interval (PRI) discrimination scheme using spatial instead of temporal information. Furthermore, energy distribution disparity was incorporated for multi-dimensional discrimination [26].
These approaches typically assume impractical 100% target detection probability [27]. Reference [28] introduced a jamming feature matrix to overcome this, but its dependence on precise matrix estimation limits utility in dynamic UAV jamming scenarios. Ref. [29] incorporated polarization scattering without resolving the estimation challenge. To reduce manual feature extraction uncertainties, reference [30] utilized convolutional neural networks (CNNs) to extract detailed features, improving accuracy. Critically, however, the method in [30] requires repeated training for different Pulse Repetition Interval (PRI) counts, rendering it infeasible to adapt to the potentially dynamic pulse number variations inherent in UAV missions, thus severely hindering practical deployment. While recent advances in attention-enhanced networks have shown promise in improving robustness for low-SNR signal recognition [31,32], they remain constrained by fixed-length input requirements.
Low-altitude UAV targets are susceptible to complex clutter interference, with their echoes exhibiting typical slowly fluctuating characteristics [33]. Traditional discrimination algorithms based on spatial independence suffer from significant performance degradation for such targets, while existing neural network approaches struggle to adapt to dynamic pulse variations. To enhance multistatic radar discrimination against slow-fluctuating UAV targets under deception jamming in complex low-altitude environments and improve applicability in dynamic ISAC contexts, this paper first incorporates frequency agility [23]. We investigate target correlation characteristic variations in a multistatic frequency-agile radar system, validating the technology’s effectiveness in improving existing multi-pulse correlation-based algorithms, particularly for slow-fluctuating UAV targets. Addressing the practical challenges of UAV networked anti-jamming, we then propose a neural network-based variable-length processing method for jamming discrimination, integrating segmentation and data padding mechanisms. The core advantage of this approach is that a single training instance with a fixed pulse count enables flexible processing of inputs with varying PRI numbers. This effectively resolves the critical bottleneck of repeated training required by existing neural methods like [24] in the context of variable UAV mission profiles, significantly enhancing the deployment feasibility of neural network-based anti-jamming techniques in real-world low-altitude ISAC systems.
Recent variable-length architectures for radar deception discrimination face several critical limitations [34,35]. Attention models [31,32], while offering sequence-length adaptability, suffer from prohibitively high O ( Q 2 ) memory complexity, making them impractical for long pulse sequences. RNNs and LSTMs [36] maintain temporal coherence but struggle with vanishing gradients when processing slow-fluctuating targets over extended coherent processing intervals (CPIs). The spatial correlation method mentioned in reference [24] also fails for slowly fluctuating targets. Transformers [37], despite enabling global feature extraction, rely heavily on precise positional encoding, which can be significantly distorted by radar phase noise.
In contrast, our proposed segmentation-and-masking approach addresses these challenges effectively. By processing fixed-length segments, it achieves linear complexity ( O ( Q ) ) , drastically reducing computational overhead. By integrating frequency-agility-induced RCS fluctuations with a segmentation-based neural architecture, we resolve the core conflict between pulse-length adaptability and slow-fluctuating target discrimination. Additionally, our method enhances phase-noise robustness through amplitude-centric feature learning, as detailed in Section 3.2. This combination of efficiency and resilience makes our solution particularly well-suited for real-world radar deception discrimination tasks.
The structure of the remaining sections is as follows: In Section 2, we establish the signal model for detecting active false targets in a multiple station frequency-agile radar system. In Section 3, we discuss the processing flow of the proposed variable-length neural network-based method. In Section 4, we present the simulation results and analyses to validate the effectiveness and superiority of the proposed approach. In Section 5, we comprehensively examine methodological novelty, practical implications, and robustness guarantees through theoretical and comparative discussion. Finally, Section 6 concludes the paper.

2. Signal Model

As illustrated in Figure 1, this chapter considers a heterogeneous multiple station radar system consisting of one inter-pulse frequency-agile transmitter station and M inter-pulse frequency-agile receiver stations, The transmitter station is located at x t , y t , while the receiver stations are positioned at x m r , y m r , where m = 1 , 2 , , M . Multiple radars will simultaneously focus on the joint detection area. The system contains K real targets (including stealth targets). It is assumed that the self-defense jammers carried by these real targets will deploy deceptive jamming against all receiver stations. Each receiver station receives D different false target measurements. Consequently, the total number of targets becomes W = K + L , where L = D K .
This article assumes that the time synchronization and spatial synchronization of the multi-base radar system have been completed [38]. At the q-th pulse moment, the actual echo signal received by the m-th radar receiving station can be expressed as
r m ( t , q ) = k = 1 K e m , k ( t , q ) + k = 1 K d = 1 D j m , k , d ( t , q ) + n m ( t )
In the formula, q = 1 , 2 , , Q denotes the number of pulses within a coherent processing interval (CPI). e m , k ( t , q ) represents the echo signal of the k-th true target received by the m-th receiving station. j m , k , d ( t , q ) denotes the interfering echo signal of the d-th false target received by the m-th receiving station in the direction of the k-th true target. n m ( t ) corresponds to the Gaussian-distributed noise signal.
The echo signal e m , k ( t , q ) of the true target can be expressed as
e m , k ( t , q ) = α m , k q s ( t τ m , k ) exp { j 2 π f q ( t τ m , k ) }
where α m , k q = λ q σ m , k q P T q G T G R m / ( 4 π 4 π R T R m , k ) denotes the complex amplitude of the echo signal from the k-th true target received by the m-th receiving station. λ q = c / f q denotes the wavelength of the carrier signal for the q-th inter-pulse frequency-agile pulse. c denotes the speed of light. f q = f 0 + ( q 1 ) Δ f denotes the carrier frequency of the q-th inter-pulse frequency-agile signal. f 0 denotes the initial carrier frequency. Δ f denotes the frequency step between adjacent carrier frequencies. σ m , k q denotes the radar cross-section (RCS). Due to frequency agility of the signal, it can be assumed that σ m , k q follows a complex Gaussian distribution σ m , k q CN ( 0 , ζ m , k , q 2 ) . P T q = P T λ Q 2 / λ q 2 denotes the transmit power of the q-th inter-pulse frequency-agile signal at the transmitting station. P T denotes the initial transmit power of the transmitting station. During the transmission phase, power compensation is applied to the amplitudes of different frequency-agile pulses to counteract the amplitude variations induced by frequency agility. G T denotes the transmit antenna gain, while it represents the receive gain of the m-th receiving station. R T denotes the distance from the transmitting station to the k-th true target. R m , k denotes the distance from the k-th true target to the m-th receiving station. s ( t ) denotes the baseband signal. τ m , k = R m , k / c denotes the echo time delay from transmission to the m-th receiving station for the k-th true target.
The deceptive jamming signal j m , k , d ( t , q ) can be expressed as
j m , k , d ( t , q ) = β m , k , d q s ( t t m , k , d ) exp { j 2 π f q ( t t m , k , d ) }
where β m , k , d q = γ d λ q P J G R m / ( 4 π R m , k ) denotes the complex amplitude of the d-th false target echo signal received by the m-th receiving station in the direction of the k-th true target. γ d represents the random complex amplitude modulation introduced by the jammer. Following Reference [39], γ d can be assumed to follow a Gaussian distribution. P J indicates the signal power of the jammer. t m , k , d = τ m , k + d Δ τ corresponds to the actual time delay of the active false target. Δ τ represents the time delay interval between active false targets, where the corresponding range interval defines the false target density.
The internal noise of the radar receiver is complex Gaussian white noise, and the noise signals at different receiving stations can be considered mutually independent. Given the noise power as σ m 2 , the noise signal n m ( t ) can be expressed as
n m ( t ) CN ( 0 , σ m 2 )

3. Interference Detection Method Based on Variable-Length Neural Network Processing

3.1. Frequency-Agile Radar Echo Signal Analysis

Compared with conventional multiple station radar signals, the frequency-agile characteristics of multiple station frequency-agile radar signals will introduce inter-pulse echo phase variations, with the modulation effect being target-position-dependent. To maximize the correlation between false target signals, phase compensation of echo signals becomes essential. While the existing literature [40,41] has thoroughly investigated phase compensation for frequency-agile signals, this paper primarily focuses on discrimination methods. Therefore, we assume the signals have been properly compensated.
Each receiving station can extract the measurement information of the same target and the collection of slow-time sampling sequences within one CPI after performing complex mixing, low-pass filtering, angle estimation, pulse compression, and constant false alarm rate (CFAR) detection on the received echo signals. After range-phase compensation, the coherent slow-time complex envelope sequence of the w-th target received by the m-th receiving station within one CPI is given by
S ˜ m , w = S m , w + Z m w = 1 , 2 , , W
where S m , w denotes the noise-free multiple station radar complex envelope sequence. Z m CN ( 0 , σ m 2 I Q × Q ) represents the noise signal sequence. I Q × Q is an identity matrix of dimension Q × Q . Given the noise independence across receiving stations, we have
E [ ( Z m 1 ) H Z m 2 ] = 0 ( m 1 m 2 )
The backscattering cross-section of a real target at different times is related to Δ f , the frequency step between adjacent carrier frequencies of the transmitting station. To enhance the variation in the target’s RCS across pulses, the frequency step Δ f between adjacent transmitted carrier frequencies should be sufficiently large. According to the frequency independence condition of echoes [42], the complex amplitudes S m , w q of the real target’s echo signals at different pulse times within one CPI are mutually independent. This results in rapid fluctuation of the multi-pulse echo complex amplitudes, denoted as E [ S m , k q 1 S m , k q 2 ] = 0 ( q 1 q 2 ) . Assuming the real target’s echo power is σ m , w 2 , the compensated complex amplitude signal S m , w q can be modeled as following a complex Gaussian distribution:
S m , w q CN ( 0 , σ m , w 2 )
After the aforementioned processing, the actual slow-time complex envelope sequences S ˜ m , w from each receiving station are transmitted to the fusion center for joint detection, where a discrimination algorithm is applied to distinguish between true and false targets.
To verify the feasibility of the discrimination method for slow-fluctuating targets using frequency-agility technology, this paper conducts simulation experiments on the actual acquired slow-time complex envelope sequences S ˜ m , w under two scenarios: without frequency-agility (using the multi-pulse correlation-based jamming discrimination method from reference [39] for non-fluctuating single-frequency true targets) and with frequency-agility technology, with the results shown in Figure 2.
As can be observed, the FAMC method demonstrates superior true target discrimination performance compared to the MC method in Reference [39]. This validates that frequency-agility technology significantly enhances the discrimination capability for non-fluctuating targets.

3.2. Neural Network Input Data Preprocessing

The actual target echo signals contain abundant hidden deep-level features that were not fully exploited. The correlation-based discrimination method in Reference [39] only provides a partial solution for distinguishing true target echoes from jamming signals. To better extract the intrinsic differences between genuine and false targets, the application of neural networks offers a new feasible approach with superior feature extraction capabilities.
To simplify pulse quantity control, this study constructs time–space 2D sample matrix data S ˜ m a t r i x by aggregating slow-time envelope sequences from multiple radar stations observing either the same true target or the same false target, as formulated in Equation (5).
Let S ˜ m , w C Q × 1 denote the column vector of slow-time complex envelopes for target w at station m:
S ˜ m , w = S ˜ m , w 1 , S ˜ m , w 2 , , S ˜ m , w Q T
S ˜ matrix = S ˜ 1 , w S ˜ 2 , w S ˜ M , w = S ˜ 1 , w 1 S ˜ 2 , w 1 S ˜ M , w 1 S ˜ 1 , w 2 S ˜ 2 , w 2 S ˜ M , w 2 S ˜ 1 , w Q S ˜ 2 , w Q S ˜ M , w Q T
Since the signal amplitudes at different receiving stations are affected by various factors such as distance and power, we perform station-wise normalization on the original time–space 2D sample matrix to enhance the generalization capability of the neural network model. The normalized sample data is denoted as S ^ m a t r i x :
S ^ m a t r i x = S ^ 1 , w S ^ 2 , w S ^ 3 , w S ^ 4 , w
In slow-time envelope sequence data, the variable pulse count Q in practical scenarios leads to input 2D sample matrices with varying widths. To enhance the model’s discrimination capability for slow-time sequences of different lengths, this section introduces a data padding method to standardize all sequences to a uniform processing length.
The network architecture employing data padding demonstrates inherent capability for variable-length input processing, effectively handling slow-time sequences of diverse lengths. However, two critical limitations emerge when processing exceptionally long sequences: the optimal padding length becomes difficult to determine empirically, and excessive padding dilutes the effective feature concentration in input data, potentially obscuring crucial discriminative patterns. These constraints motivate the introduction of a data segmentation preprocessing mechanism to simultaneously address the padding length determination challenge and enhance the method’s generalization across varying data lengths.
Data segmentation divides continuous sample data with different pulse counts into fixed-length input samples. Based on whether the samples overlap, it is classified into overlapping segmentation and non-overlapping segmentation. As shown in Figure 3, to reduce the number of segmentation operations while effectively improving classification accuracy, this section first performs non-overlapping segmentation and pads the final insufficient segment with data from the end of the previous segment to reach the preset fixed length.
Under the data segmentation preprocessing operation, each model independently predicts the segmented data, generating multiple labels. To integrate the prediction results from segmented data and achieve final discrimination between true and false targets, this section adopts a voting strategy from ensemble learning, where the class with the majority votes among the model predictions is selected as the final result.
Additionally, since the original sample data is complex-valued, the real and imaginary parts of the segmented input data are concatenated row-wise (as shown in Figure 4) to both simplify the neural network processing mechanism and preserve the characteristics of the complex data.

3.3. Network Architecture

As shown in Figure 5, the constructed neural network model consists of an input layer, a mask layer, convolutional and max-pooling layers, a dot-product self-attention mechanism with residual connections, a flatten layer, global average pooling and fully connected layers, and an output layer.
The signal processing pipeline is rigorously defined as seven cascaded transformations:
Input Representation: Let the preprocessed sample be X R M × Q × 2 (real/imaginary concatenated), where M is the number of radar stations, and Q is the processed pulse count: X [ i , j , : ] = [ ( S ˜ i , w j ) , ( S ˜ i , w j ) ] T
Masking Operation: Define the binary mask M { 0 , 1 } M × Q :
M [ i , j ] = 1 if j Q actual 0 ( padded )
Masked Output: X masked = X ( M 1 1 × 2 ) .
Convolutional Feature Extraction: For layer l with kernel W ( l ) R k h × k w × C i n × C o u t ,
Z ( l ) [ x , y , c ] = σ i = 1 k h j = 1 k w d = 1 C i n W ( l ) [ i , j , d , c ] · X masked [ x + i 1 , y + j 1 , d ] + b c ( l )
where σ is ELU activation.
Physical Justification for 2D CNN: The architecture exploits two radar-specific properties: Spatial Invariance: Scattering patterns are translationally invariant across stations → CNN weight sharing. Pulse Independence: E [ X : j X : k H ] = 0 ( j k ) → no temporal coherence needed.
This renders RNNs/LSTMs suboptimal due to the following:
h t = f ( h t 1 , X t ) Unnecessary for   radar vs max ( W X ) Optimal invariance
Output Decision: The final discrimination probability is
P ( true ) = sigmoid w T · GAP Z ( L )
where GAP is global average pooling.
Section 3.2’s data preprocessing converts slow-time envelope sequences with varying pulse counts into fixed-length samples through segmentation and padding. The neural network constructed in this section employs a mask layer to ignore padded portions, extracts discriminative features via convolutional operations, and ultimately compresses them into fixed-length feature vectors through pooling layers, enabling classification of variable-pulse-count samples.

3.4. CNN vs. Sequential Architectures

We formally prove CNN superiority for radar deception discrimination:
For pulse-wise independent signals ( X : j X : k j k ), the minimum Bayes error is achieved by convolutional filters over recurrent units.
Proof: Likelihood factorization:
p ( X | y ) = j = 1 Q p ( X : j | y )
CNN log-likelihood:
log p CNN = c max i W c X ( sufficient statistic )
RNN introduces false dependence:
log p RNN = t f ( h t 1 , X t ) ( over - parameterized )
Thus,
R CNN R RNN O log Q Q
From the theoretical point of view, a CNN using spatial invariance will have higher accuracy than the LSTM algorithm, and the computational efficiency will be faster than Transformers. It can still maintain performance in the presence of phase noise and is more stable.

4. Simulation Experiments

This section validates the feasibility and effectiveness of the proposed neural network-based variable-length processing method for jamming discrimination through simulations while also analyzing and discussing key factors influencing its performance.
For comparison with the method in Reference [30], this study conducts simulations using a 1-transmitter–4-receiver frequency-agile multiple station radar system. Additionally, the simulation assumes one true target equipped with a self-defense jammer that generates one false target.
The specific parameters of the neural network implemented in this study are listed in Table 1, where M.P. is max pooling and F.C. is fully connected. Without loss of generality, this section sets the fixed pulse count Q within one CPI to 12, with a target-to-noise ratio (TNR) range of -3 to 20 dB in 1 dB increments. For each TNR value, 1000 training samples are generated for both targets and jammers under identical parameters, resulting in a total of 48,000 training samples (1000 × 24 × 2). These preprocessed samples form the neural network’s training dataset, with the padded sequence length standardized to 12.

4.1. Effectiveness Verification

In this subsection, to validate the effectiveness of the proposed neural network-based variable-length processing method for discriminating true and false targets, tests were conducted with the TNR fixed at 3 dB while varying the pulse count Q from 2 to 20 in steps of 2, keeping the other parameters at their initial settings. For each pulse count Q, both the proposed variable-length neural network method and the conventional multi-pulse correlation-based discrimination method were evaluated using newly generated test data through 1000 Monte Carlo trials. The resulting variation curves of the overall target discrimination probability are presented in Figure 6.
As shown in Figure 6, the discrimination performance of the proposed neural network-based variable-length jamming discrimination method improves with increasing pulse count Q and gradually stabilizes, indicating that additional pulses help enrich data features. Moreover, across different Q values, the proposed method consistently outperforms the multi-pulse correlation method in overall true/false target discrimination. This verifies that the variable-length neural network approach can more effectively extract hidden target features and achieve superior discrimination performance. Furthermore, compared to the fixed convolutional neural network method in Reference [30], our proposed method can handle input data with varying pulse counts even when trained only on fixed-Q data, significantly enhancing the practicality of neural network-based multiple station radar discrimination techniques.
Comparative Insight: Qualitative comparisons with mainstream neural architectures reveal consistent advantages. Compared to Transformers, it offers significant computation reduction (FLOPs) while maintaining comparable accuracy; compared to RNNs/LSTMs, it offers superior pulse-length adaptability and faster convergence; and compared to Fixed-CNNs, it eliminates repeated training requirements for varying pulse counts. These align with known efficiency–accuracy tradeoffs in radar signal processing.

4.2. Performance Under Different TNR

To examine the discrimination performance variation in the proposed neural network-based variable-length jamming discrimination method under different TNRs, experiments were conducted with the TNR set at 0 dB, 3 dB, and 6 dB while varying the test pulse count Q from 2 to 20 in increments of 2, keeping the other parameters at their initial configurations. For each specific combination of pulse count Q and the TNR value, 1000 Monte Carlo trials were performed using newly generated test data with the proposed method, producing the variation curves of the overall target discrimination probability shown in Figure 7.
As shown in Figure 7, the discrimination performance of the proposed method progressively improves with an increasing TNR, which aligns with conclusions drawn from conventional signal-level anti-spoofing techniques. Furthermore, this trend indicates that the target’s hidden features become more extractable at higher TNR levels, thereby providing empirical validation for the feasibility of our proposed approach.
Previous experiments assumed the slow-time complex envelope sequences of true targets were mutually independent across receiving stations. However, in practical environments, the echo correlation of true targets between different receiving stations depends on their spatial positions relative to the radar stations [24]. Therefore, it is necessary to further investigate the discrimination performance of the proposed method under varying echo correlation conditions.
To examine the performance variation in the proposed neural network-based variable-length jamming discrimination method under different true target correlation coefficients ρ , tests were conducted with ρ = 0, 0.1, 0.3, and 0.5 while varying the pulse count Q from 2 to 20 in steps of 2, keeping the other parameters at their initial settings. For each specific combination of pulse count Q and correlation coefficient ρ , 1000 Monte Carlo trials were performed using newly generated test data with the proposed method, yielding the variation curves of the overall target discrimination probability shown in Figure 8.
As shown in Figure 8, the model trained exclusively with correlation coefficient ρ = 0 data still maintains the discrimination capability for true/false targets under varying correlation conditions, verifying the superiority of the proposed method. However, as the true target correlation coefficient ρ increases, the overall target discrimination probability gradually declines. This occurs because the discrimination between true and false targets primarily relies on the echo independence of true targets versus the echo correlation of false targets. As the echo correlation of true targets increases, the discriminative features between true and false targets diminish, leading to increased misclassification of true targets.

4.3. Effectiveness Verification Using Amplitude Data

Considering that phase errors may exhibit significant fluctuations in certain scenarios, which can easily lead to deviations in phase compensation and increase errors in slow-time complex envelope sequence samples, this section conducts experiments using uncompensated slow-time amplitude data S m , w q to investigate the effectiveness of the proposed method in amplitude-only scenarios.
For this purpose, this section first extracts the amplitude data from the previously generated 48,000 training samples and processes the original dataset using similar preprocessing methods to create the neural network’s training dataset. Based on this, experiments are conducted with the TNR fixed at 3 dB while varying the pulse count Q from 2 to 20 in steps of 2, keeping the other parameters at their initial settings. For each pulse count Q, 1000 Monte Carlo trials are performed on the test set using the proposed neural network-based variable-length jamming discrimination method, yielding the variation curves of the overall target discrimination probability shown in Figure 9.
As shown in Figure 9, the discrimination probability of the proposed method progressively increases with the pulse count Q, demonstrating robust performance at higher pulse counts. This verifies that the neural network-based variable-length processing approach remains viable and effective even without phase compensation.

4.4. Computational Complexity Analysis

To validate the real-time feasibility in low-altitude ISAC systems, we analyze computational costs through theoretical derivation and hardware benchmarking. The total floating-point operations (FLOPs) are calculated as
FLOPs total = l = 1 L ( 2 · K h , l · K w , l · C i n , l · C o u t , l · H o u t , l · W o u t , l ) + f c = 1 N f c 2 · I f c · O f c
where K h , l × K w , l is the kernel size of the l-th convolutional layer, C i n , l / C o u t , l denote input/output channels, and H o u t , l × W o u t , l are output feature dimensions. For fully connected layers, I f c and O f c represent input/output neurons.
Substituting parameters from Table 1: Convolutional layers: 0.72 GFLOPs; fully connected layers: 0.10 GFLOPs; and total FLOPs = 0.82 GFLOPs
On the middle computing power-level device (computing throughput around 32TOPS), the inference latency is
t inf = FLOPs Compute Throughput = 0.82 × 10 9 32 TOPS 1.35 ms
This satisfies the real-time requirement, proving deployment viability in dynamic ISAC scenarios.

5. Discussions

5.1. Value and Meaning

This work establishes fundamental advances in radar deception discrimination through physics-constrained neural co-design and embedded-specific optimization. By integrating frequency-agility-induced RCS fluctuations with a segmentation-based neural architecture, we resolve the core conflict between pulse-length adaptability and slow-fluctuating target discrimination. Unlike conventional attention/RNN models that impose temporal coherence on inherently independent pulses, our approach leverages radar-specific pulse-wise independence to achieve single-training adaptability (reduction in retraining cost vs. fixed-CNN) and phase-noise immunity through amplitude-only processing, overcoming the positional encoding failures of Transformers. Furthermore, our co-optimization of algorithm complexity and hardware constraints ensures real-time performance, with inference latency (1.35 ms), a compact memory footprint (1.7 MB) suitable for resource-limited ISAC nodes, and an optimized Δ f range (80–120 MHz) balancing performance and RF feasibility.
The practical implications of this work are transformative for low-altitude ISAC systems. Our method enhances UAV swarm protection by reliably discriminating stealth jammers during cooperative sensing, improves spectrum efficiency through shared radar/communication bands enabled by frequency-agile waveforms, and reduces operational costs compared to multi-model solutions. These advancements position our approach as a robust and scalable solution for next-generation radar deception mitigation in dynamic environments.

5.2. Terrain Impact Analysis

The proposed method maintains discrimination capability in complex terrain through physical resilience mechanisms.
Consider a mountainous rescue scenario with the following: *Terrain curvature: Radius R c = 500 m; *Obstacles: Ridge height h obs = 100 m; and *Signal path: UAV-to-radar distance d = 3 km.
Using the diffraction model [43], the additional path loss is
Δ L diff = 20 ln 10 π R c λ θ = 19.6 d B ( λ = 0.03 m , θ = 0.1 rad )
CNN robustness mechanisms: *Amplitude-domain processing ignores phase distortion from terrain; *Multi-station diversity ensures 98% probability of ≥1 unobstructed path ( M = 4 stations):
P survive = 1 ( 0.35 ) 4 = 0.98 ( 35 % per - path blockage )
The error-bound guarantee limits performance degradation within a certain range.
While precise quantification requires future field trials, the architectural design ensures operational viability in realistic electromagnetic environments. Now, the idea is pending integration with industry-standard UAV platforms and planned OTA testing in certified frequency bands.

5.3. Generalization Guarantee

To rigorously validate robustness beyond simulations, we establish theoretical guarantees:
Mathematical Robustness Proof: The segmentation-voting mechanism ensures stability under data distribution shift. For input segments X i with true distribution D , empirical distribution D ^ , and hypothesis h, the generalization error satisfies
L D ( h ) L D ^ ( h ) + log | H | 2 L + log ( 2 / δ ) 2 N
where L = the segmentation count (Section 3.2), N = the training sample size, δ = the confidence level, and H = the hypothesis space
This PAC-learning bound [44] proves the following: *A. error decay: O ( 1 / L ) convergence as segments increase; *B. data independence: performance preserved under distribution shift.
Phase-Space Equivalence Theorem: Radar echo signals obey the wave equation:
2 E 1 c 2 2 E t 2 = 0
Our amplitude-domain processing induces equivalence: For any real radar signal s real ( t ) , it simulated s sim ( t ) such that
| s real ( t ) | | s sim ( t ) | < ϵ
Under Lipschitz continuity, this fundamental physics principle ensures simulation validity.

5.4. Frequency Step Optimization

The frequency step Δ f critically governs the target discrimination capability through two physical effects: RCS decorrelation and hardware constraints. The complex amplitude independence condition for the former is as follows.
Δ f > c 2 L target
where L target is the target spatial coherence length (2 m for UAVs). This gives Δ f min > 75 MHz.
For the hardware constraints, DRFM jammers exhibit a limited response bandwidth B DRFM (typically 200 MHz). To ensure the jamming correlation,
Δ f < Δ f max = B DRFM B sig = 180 MHz
where B sig = 20 MHz is the radar signal bandwidth.
The discrimination probability saturates when
Δ f > Δ f sat = 120 MHz
The recommended practical range is 80 MHz Δ f 120 MHz . This ensures Δ f > 75 MHz (guarantees RCS independence) and Δ f 120 MHz (avoids unnecessary hardware cost).

6. Conclusions

This study addresses the significant performance degradation of conventional multi-pulse correlation methods in slow-fluctuating target scenarios by establishing a multiple station frequency-agile radar signal processing framework and proposing a neural network-based variable-length processing method for jamming discrimination. The proposed method fully exploits the amplitude characteristics of frequency-agile radar echo signals, providing a novel solution for multiple station radar systems using multi-pulse echo data to discriminate slow-fluctuating targets. Furthermore, simulation results demonstrate that compared to traditional methods, the proposed approach can extract deeper data features and maintain robust discrimination performance across varying pulse counts Q even when trained on a single pulse count, significantly enhancing the practicality of neural network-based jamming discrimination in multiple station radar systems.

Author Contributions

Methodology, W.G.; Software, W.G.; Formal analysis, D.L.; Investigation, R.L.; Writing—original draft, W.G.; Writing—review & editing, W.G. and D.L.; Supervision, Y.F.; Project administration, J.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are unavailable due to privacy restrictions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Özdil, Ö.; Serin, M.; İspir, M.; Yıldırım, A. Channelizer structure in DRFM systems for real signals. In Proceedings of the 2013 21st Signal Processing and Communications Applications Conference (SIU), Haspolat, Turkey, 24–26 April 2013; pp. 1–4. [Google Scholar]
  2. Olivier, K.; Cilliers, J.E.; du Plessis, M. Design and performance of wideband drfm for radar test and evaluation. Electron. Lett. 2011, 47, 824–825. [Google Scholar] [CrossRef]
  3. Chen, S.; Liao, Y.; Han, S.; Xing, M. Joint azimuth-velocity estimation for moving targets with 2-D frequency-mode hopping OAM radar. IEEE Sens. J. 2025, 25, 29053–29063. [Google Scholar] [CrossRef]
  4. Kozlov, V.; Vovchuk, D.; Ginzburg, P. Radar range deception with time-modulated scatterers. IEEE Trans. Antennas Propag. 2023, 71, 4486–4491. [Google Scholar] [CrossRef]
  5. Han, X.; He, H.; Zhang, Q.; Yang, L.; He, Y. Suppression of deception-false-target jamming for active/passive netted radar based on position error. IEEE Sens. J. 2022, 22, 7902–7912. [Google Scholar] [CrossRef]
  6. Tan, M.; Wang, C.; Xue, B.; Xu, J. A novel deceptive jamming approach against frequency diverse array radar. IEEE Sens. J. 2021, 21, 8323–8332. [Google Scholar] [CrossRef]
  7. Lu, L.; Gao, M. An improved sliding matched filter method for interrupted sampling repeater jamming suppression based on jamming reconstruction. IEEE Sens. J. 2022, 22, 9675–9684. [Google Scholar] [CrossRef]
  8. Zhang, J.; Xu, N.; Song, H.; Zhang, C. Sequence set design for waveform-agile coherent radar systems. EURASIP J. Adv. Signal Process. 2020, 2020, 31. [Google Scholar] [CrossRef]
  9. Sun, J.; Yuan, Y.; Greco, M.S.; Gini, F.; Yang, X.; Yi, W. Anti-deception jamming resource scheduling for multi-target tracking in distributed radar networks. IEEE Trans. Aerosp. Electron. Syst. 2024, 60, 9111–9128. [Google Scholar] [CrossRef]
  10. Wang, S.; Liu, Z.; Xie, R.; Ran, L. Reinforcement learning for compressed-sensing based frequency agile radar in the presence of active interference. Remote Sens. 2022, 14, 968. [Google Scholar] [CrossRef]
  11. Yao, S.; Fu, Y.; Liao, Y. Information geometry-based discrimination of physical target and active false targets in a multistatic radar system. IEEE Trans. Aerosp. Electron. Syst. 2025, 1–15. [Google Scholar] [CrossRef]
  12. Shu, Y.; Qi, C.; Mao, S. Joint transmit waveform and receive filter design for ISAC system with jamming. IEEE Trans. Veh. Technol. 2025, 1–6. [Google Scholar] [CrossRef]
  13. Liao, Y.; Luo, Z.; Chen, S.; Xing, M. Range ambiguity mitigation in sar with multimode oam beam. IEEE Sensors J. 2024, 24, 21038–21047. [Google Scholar] [CrossRef]
  14. Qi, C.; Zhang, H.; Xie, J.; Liu, W.; Wang, R. Cooperative game theoretic power allocation method to distributed MIMO radar sensor network for multitarget detection in low-altitude. IEEE Sens. J. 2024, 24, 8731–8745. [Google Scholar] [CrossRef]
  15. Xiong, T.; Liao, Y.; Liang, Y.-C. Integrated sensing and communication for intelligent transportation: OTFS-based traffic channel reconstruction and signal detection. IEEE Trans. Veh. Technol. 2025, 1–12. [Google Scholar] [CrossRef]
  16. Han, S.; Liao, Y.; Chen, S.; Liang, Y.-C. Joint channel estimation for RIS-aided mmWave MIMO wireless communication systems with mixed-resolution quantization schemes. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
  17. He, C.; Liao, Y.; Ren, C. Enhanced mode measurement of vortex electromagnetic wave based on aperture symmetry. IEEE Commun. Lett. 2025, 29, 650–654. [Google Scholar] [CrossRef]
  18. He, C.; Liao, Y.; Ren, C. Mode measurement of vortex electromagnetic wave with random receiving array element defects via low rank matrix completion. IEEE Trans. Antennas Propag. 2024, 72, 8501–8510. [Google Scholar] [CrossRef]
  19. Dang, Y.; Li, D.; Fu, Y.; Liao, Y. Orbital angular momentum radar detection characteristics analysis based on ambiguity function. Digit. Signal Process. 2025, 162, 105197. [Google Scholar] [CrossRef]
  20. Chen, S.; Liao, Y.; Tan, H. Beam convergence and 2-D imaging using orthogonal frequency diversity-based synthetic vortex waves. Digit. Signal Process. 2025, 167, 105419. [Google Scholar] [CrossRef]
  21. Li, D.; Yao, S.; Liao, Y.; Yan, J.; Fu, Y. Frequency offset deception velocity-based method for discriminating between physical targets and active false targets. Signal Process. 2025, 234, 109977. [Google Scholar] [CrossRef]
  22. Li, Q.; Guo, Y.; Zhang, P.; Xu, H.; Zhang, L.; Chen, Z.; Huang, Y. Deception velocity-based method to discriminate physical targets and active false targets in a multiple station radar system. Remote Sens. 2024, 16, 382. [Google Scholar] [CrossRef]
  23. Luo, Z.; Liao, Y.; Xing, M. Target imaging and anti-jamming with frequency agile OAM radar. IEEE Geosci. Remote Sens. Lett. 2024, 21, 3506705. [Google Scholar] [CrossRef]
  24. Zhao, S.; Zhang, L.; Zhou, Y.; Liu, N. Signal fusion-based algorithms to discriminate between radar targets and deception jamming in distributed multiple-radar architectures. IEEE Sensors J. 2015, 15, 6697–6706. [Google Scholar] [CrossRef]
  25. Li, Q.; Zhang, L.; Zhou, Y.; Zhao, S.; Liu, N.; Zhang, J. Discrimination of active false targets based on hermitian distance for distributed multiple-radar architectures. IEEE Access 2019, 7, 71872–71883. [Google Scholar] [CrossRef]
  26. Zhang, S.; Zhou, Y.; Zhang, L.; Zhang, Q.; Du, L. Target detection for multiple station radar in the presence of deception jamming. IEEE Sensors J. 2021, 21, 8130–8141. [Google Scholar] [CrossRef]
  27. Luo, Z.; Liao, Y.; Xing, M. Target indication with FMCW-OAM radar. IEEE Geosci. Remote Sens. Lett. 2023, 20, 3508805. [Google Scholar] [CrossRef]
  28. Zhao, S.; Zhou, Y.; Zhang, L.; Guo, Y.; Tang, S. Discrimination between radar targets and deception jamming in distributed multiple-radar architectures. IET Radar, Sonar Navig. 2017, 11, 1124–1131. [Google Scholar] [CrossRef]
  29. Yu, H.; Zhang, J.; Zhang, L.; Li, S. Polarimetric multiple-radar architectures with distributed antennas for discriminating between radar targets and deception jamming. Digit. Signal Process. 2019, 90, 46–53. [Google Scholar] [CrossRef]
  30. Liu, J.; Gong, M.; Zhang, M.; Li, H.; Zhao, S. An anti-jamming method in multiple station radar system based on convolutional neural network. IET Signal Process. 2022, 16, 220–231. [Google Scholar] [CrossRef]
  31. Ma, H.; Liao, Y.; Ren, C. Low probability of interception radar overlapping signal modulation recognition based on an improved you-only-look-once version 8 network. Eng. Appl. Artif. Intell. 2024, 137, 109150. [Google Scholar] [CrossRef]
  32. Liang, J.; Luo, Z.; Liao, R. Intra-pulse modulation recognition of radar signals based on efficient cross-scale aware network. Sensors 2024, 24, 5344. [Google Scholar] [CrossRef] [PubMed]
  33. He, W.; Luo, Y.; Shang, X. Motion clutter suppression for non-cooperative target identification based on frequency correlation dual-svd reconstruction. Sensors 2024, 24, 5298. [Google Scholar] [CrossRef]
  34. Qu, H.; Zhang, Y.; Ning, L.; Fan, W.; Li, Q. SSD4Rec: A structured state space duality model for efficient sequential recommendation. arXiv 2024, arXiv:2409.01192. [Google Scholar]
  35. Vo, T.; Linh, N.T.M. A novel approach of multi-channel attention mechanism for long-sequential multivariate time-series prediction problem. Soft Comput. 2025, 29, 629–644. [Google Scholar] [CrossRef]
  36. Houdt, G.V.; Mosquera, C.; Nápoles, G. A review on the long short-term memory model. Artif. Intell. Rev. 2020, 53, 5929–5955. [Google Scholar] [CrossRef]
  37. Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, Ł; Polosukhin, I. Attention is all you need. Adv. Neural Inf. Process. Syst. 2017, 30, 5998–6008. [Google Scholar]
  38. Li, Q.; Zhang, L.; Zhou, Y.; Zhao, S.; Liu, N.; Zhang, J.; Yu, H. Hermitian distance-based method to discriminate physical targets and active false targets in a distributed multiple-radar architecture. IEEE Sensors J. 2019, 19, 10432–10442. [Google Scholar] [CrossRef]
  39. Zhao, S.; Zhang, L.; Zhou, Y.; Liu, N.; Liu, J. Discrimination of active false targets in multiple station radar using spatial scattering properties. IET Radar Sonar Navig. 2016, 10, 817–826. [Google Scholar] [CrossRef]
  40. Zhou, R.; Xia, G.; Zhao, Y.; Liu, H. Coherent signal processing method for frequency-agile radar. In Proceedings of the 2015 12th IEEE International Conference on Electronic Measurement & Instruments (ICEMI), Qingdao, China, 16–18 July 2015; Volume 1, pp. 431–434. [Google Scholar]
  41. Tao, Y.; Zhang, G.; Tao, T.; Leng, Y.; Leung, H. Frequency-agile coherent radar target sidelobe suppression based on sparse Bayesian learning. In Proceedings of the 2019 IEEE MTT-S International Microwave Biomedical Conference (IMBioC), Nanjing, China, 6–8 May 2019; Volume 1, pp. 1–4. [Google Scholar]
  42. Zhou, S.; Liu, H.; Zhao, Y.; Hu, L. Target spatial and frequency scattering diversity property for diversity mimo radar. Signal Process. 2011, 91, 269–276. [Google Scholar] [CrossRef]
  43. Deygout, J. Multiple knife-edge diffraction of microwaves. IEEE Trans. Antennas Propag. 1966, 14, 480–489. [Google Scholar] [CrossRef]
  44. Mohri, M.; Rostamizadeh, A.; Talwalkar, A. Foundations of Machine Learning; MIT Press: Cambridge, MA, USA, 2018. [Google Scholar]
Figure 1. A multi-receiver frequency-variant hybrid multi-base radar signal model.
Figure 1. A multi-receiver frequency-variant hybrid multi-base radar signal model.
Sensors 25 05471 g001
Figure 2. Jamming discrimination performance under different TNRs in the single-frequency non-fluctuating target scenario: (a) true target discrimination probability; (b) false target discrimination probability.
Figure 2. Jamming discrimination performance under different TNRs in the single-frequency non-fluctuating target scenario: (a) true target discrimination probability; (b) false target discrimination probability.
Sensors 25 05471 g002
Figure 3. Schematic diagram of sample data segmentation preprocessing.
Figure 3. Schematic diagram of sample data segmentation preprocessing.
Sensors 25 05471 g003
Figure 4. Schematic diagram of complex sample feature concatenation.
Figure 4. Schematic diagram of complex sample feature concatenation.
Sensors 25 05471 g004
Figure 5. Deep learning-based jamming discrimination network.
Figure 5. Deep learning-based jamming discrimination network.
Sensors 25 05471 g005
Figure 6. Effectiveness validation of variable-length processing via neural networks.
Figure 6. Effectiveness validation of variable-length processing via neural networks.
Sensors 25 05471 g006
Figure 7. Discrimination performance variation under different TNRs.
Figure 7. Discrimination performance variation under different TNRs.
Sensors 25 05471 g007
Figure 8. Discrimination performance under different correlation conditions.
Figure 8. Discrimination performance under different correlation conditions.
Sensors 25 05471 g008
Figure 9. Effectiveness evaluation using amplitude-only data.
Figure 9. Effectiveness evaluation using amplitude-only data.
Sensors 25 05471 g009
Table 1. Experimental parameter settings for each layer (ELU activation function used in the network).
Table 1. Experimental parameter settings for each layer (ELU activation function used in the network).
Number
of Layers
TypesPopulating
Data
Number of
Feature Channels
Kernel
Size
Pooling
Window
Number of
Neurons
Neuron
Drop Rate
1Mask0.0
2Conv 1 322×2
3M.P. 1 1×2
4Conv 2 642×2
5M.P. 2 1×2
6Conv 3 1282×2
7M.P. 3 1×2
8Flatten
9F.C. 1 200
10Dropout 1 0.2
11F.C. 2 10
12Dropout 2 0.3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gong, W.; Liu, R.; Fu, Y.; Li, D.; Yan, J. Frequency-Agility-Based Neural Network with Variable-Length Processing for Deceptive Jamming Discrimination. Sensors 2025, 25, 5471. https://doi.org/10.3390/s25175471

AMA Style

Gong W, Liu R, Fu Y, Li D, Yan J. Frequency-Agility-Based Neural Network with Variable-Length Processing for Deceptive Jamming Discrimination. Sensors. 2025; 25(17):5471. https://doi.org/10.3390/s25175471

Chicago/Turabian Style

Gong, Wei, Renting Liu, Yusheng Fu, Deyu Li, and Jian Yan. 2025. "Frequency-Agility-Based Neural Network with Variable-Length Processing for Deceptive Jamming Discrimination" Sensors 25, no. 17: 5471. https://doi.org/10.3390/s25175471

APA Style

Gong, W., Liu, R., Fu, Y., Li, D., & Yan, J. (2025). Frequency-Agility-Based Neural Network with Variable-Length Processing for Deceptive Jamming Discrimination. Sensors, 25(17), 5471. https://doi.org/10.3390/s25175471

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop