Next Article in Journal
Computer Simulation of Whole-Body Vibration in Port Container Handling Machine Operators
Previous Article in Journal
Multimodal Emotion Recognition Using Modality-Wise Knowledge Distillation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Jamming Recognition Based on Time-Frequency Domain Weighted Fusion and Attention Mechanism

School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(20), 6345; https://doi.org/10.3390/s25206345
Submission received: 5 September 2025 / Revised: 9 October 2025 / Accepted: 11 October 2025 / Published: 14 October 2025
(This article belongs to the Section Physical Sensors)

Abstract

The jamming recognition of target detection aims to achieve rapid judgment and effective response to jamming by analyzing the target echo signals. This paper addresses the shortcomings of the existing methods in terms of jamming recognition capabilities and practical effectiveness and conducts research on jamming recognition based on time-frequency domain fusion and attention mechanism. First, by analyzing the principles of target detection and jamming effects, a multi-terrain random fluctuation model for ground detection is established. Second, the time-frequency domain weighted fusion method is proposed. Taking multi-period time domain + time-frequency domain as jamming recognition information, combined with the attention mechanism, the jamming recognition model based on time-frequency domain weighted fusion and the attention mechanism (TFWF-AM) is established. Then, the single jamming and compound jamming sample sets are established by superimposing the beating signals of target echo and multi-jamming. Finally, the accuracy of the TFWF-AM jamming recognition model is compared with that of existing method models, and the effectiveness of multi-period time domain + time-frequency domain information is verified. The results show that the TFWF-AM jamming recognition model has the highest accuracy for both single jamming and compound jamming, reaching 99.92% and 99.56%, respectively, which is 10.42% and 52.81% higher than that of the feature fusion model. This research holds huge significance for the perception and decision-making of target detection systems in complex electromagnetic environments.

1. Introduction

The radio detection system can obtain the target information based on the difference of radio physical field characteristics response, which has the advantages of being simple and reliable, having good range cut-off characteristics, and having low interception rate. However, it is vulnerable to human and natural jamming, which weakens or even destroys the characteristics of the target, affects the stability and reliability of the working process, and makes it impossible for the ammunition to maximize its damage ability [1]. To enhance the reliability of target detection, by identifying different types and parameters of jamming, different jamming suppression and anti-jamming strategies can be adopted to reduce signal distortion and attenuation [2].
The traditional anti-jamming method includes three aspects: selection of physical field and working principle, improvement in signal processing level, and tactical application [3]. Among them, the selection of physical field and working principle is the most effective anti-jamming method. For example, the anti-jamming ability, target resolution, and positioning accuracy are improved by selecting a narrow detection beam. The application of multiple physical fields or principles to detect targets makes it difficult for jammers to effectively interfere with the compound detectors at the same time. Increasing the complexity of the transmitted waveform makes it difficult for the enemy to analyze its characteristics. Improving signal processing level is another effective method for anti-jamming. This method uses the characteristics of target signal amplitude, increase rate, frequency, and signal duration to improve the difference between the target and jamming signals to achieve the purpose of anti-jamming. In addition, the anti-jamming ability is strengthened in tactical application through long-distance power connection and cross-use of detectors with different principles. However, the traditional theoretical calculation method of target detection is prone to failure under the condition of low signal-to-noise ratio and strong jamming [4,5]. Therefore, it is necessary to anticipate the type of jamming in advance and purposefully optimize the detection signal waveform to reduce the negative impact of jamming on target detection accuracy [6,7].
In order to enhance the adaptive perception ability of the target detection system, many experts and scholars use time-frequency domain analysis methods to extract useful information from complex signals for jamming recognition and establish a prior knowledge base based on a deep learning model. Reference [8] and Reference [9] used deep learning methods to identify a variety of single jamming and compound jamming. Gao et al. [10] proposed a target recognition algorithm based on multi-source compound imaging and deep learning to improve the recognition accuracy under smoke, dust, and camouflage jamming. Guo et al. [11] proposed a multi-domain shallow feature-guided radar active jamming multi-modal comparison recognition method, which realized accurate jamming recognition under extremely small sample conditions. Nie et al. [12] proposed an active jamming suppression method for spaceborne SAR images based on region feature refinement perceptual learning, which can effectively identify and suppress a variety of typical active blanket jamming. Guo et al. [13] proposed a lightweight ML-SNet radar compound jamming recognition algorithm with low computational complexity and good recognition performance. Gao et al. [14] proposed a jamming pattern open set recognition method based on hyperspherical 3-tuple coding, which uses a meta-recognition classifier to accurately complete the jamming pattern open set recognition task. Yang et al. [15] proposed a jamming recognition method based on multi-domain features and Transformer to achieve the purpose of jamming recognition from mixed signals. Dai et al. [16] proposed an adaptive target and jamming recognition method for Doppler radar fuze based on time-frequency joint feature and online update. In order to analyze the jamming characteristics, Ping et al. [17] proposed a modulation recognition method based on cyclic spectrum features and high-order cumulant features, which realized the robust recognition of multi-input and multi-output signals under complex channel environments. References [18,19,20] realize automatic modulation classification of signals based on convolutional neural networks. However, the existing methods only rely on point sources or simple planar targets to generate echo signals, and they also fail to consider the superposition of jamming signals and target echo signals, resulting in a significant deviation from the actual situation. Moreover, the jamming recognition model based on multi-source information fusion is a fusion of signal features but lacks research on decision-level fusion. Generally, the differences among various types of jamming are almost indistinguishable. In this paper, the differences are transformed into significant feature distances in a high-dimensional space through the attention mechanism.
Therefore, this paper addresses the problem of jamming recognition in complex electromagnetic environments and establishes a multi-terrain random fluctuation model for target detection systems, determines effective jamming recognition information, and conducts research on jamming recognition based on time-frequency domain fusion and attention mechanisms. The contributions of this paper are fourfold.
  • The multi-terrain random fluctuation model is established.
  • A multi-period “time domain + time-frequency domain” complementary jamming recognition information construction method is proposed.
  • The TFWF-AM jamming recognition model is established by integrating the attention mechanism with the time-frequency fusion method.
  • By superimposing the target echo beating signals and the multi-jamming beating signals, the single jamming and compound jamming recognition sample sets are established, respectively.
The structure of this paper is as follows: Section 1 is the introduction; Section 2 constructs the multi-terrain random fluctuation model; Section 3 establishes the jamming recognition models; Section 4 establishes the jamming recognition sample set; Section 5 compares the performance of the model; and Section 6 presents the conclusion of this paper.

2. Construction of Multi-Terrain Random Fluctuation Model

According to the principle of radio target detection, the jamming signals enter the receiver with the echo signals, undergo frequency mixing with the transmitting signals, pass through the low-pass filter, and extract the target and jamming information through signal processing. This section establishes a multi-terrain random fluctuation model for target detection and derives the effective beating signals of target echo. The output of the model can be directly used at the signal processing end.

2.1. Establishment of Multi-Terrain Detection Model

According to the principle of radio target detection, the establishment process of the ground echo model is shown in Figure 1.
First, the boundary of the ground area at a fixed height is calculated according to the relevant parameters of the detector and the antenna. The ground echo area is divided into multiple scattering units with side length Δl by using the square uniform segmentation method, and the center coordinates (xi, yi, 0) of each scattering unit are calculated. Then, the radar cross-sectional area σi and the corresponding antenna gain Gi (θi, φ) of each scattering unit relative to the detector are determined by combining the Ulaby model [21] and the Swerling fluctuation model [22]. Finally, the echo power Pri of each scattering unit can be calculated.
The Ulaby backscattering characteristic model is an empirical statistical model obtained by collecting and analyzing a large amount of different terrain data. The backscattering coefficients can be obtained from Equation (1).
σ 0 θ = P 1 + P 2 exp P 3 θ + P 4 cos P 5 θ + P 6
where σ0(θ) is the backscattering coefficient, measured in dB; θ is the local incident angle, measured in radians; and P1P6 are the fitting parameters of the Ulaby model.
According to the Swerling ground fluctuation model, the echo region can be regarded as a large number of approximately equal scattering units in this study, so the ground random fluctuation can be regarded as an exponential distribution:
p σ 0 = 1 σ 0 exp σ 0 σ 0 , σ     0
where σ 0 is determined by the Ulaby model and σ 0 is the mean value of the fluctuation process.
For a point target, the time domain waveform of the transmitted signal for the sawtooth frequency modulation can be expressed as follows:
s t , i t = A 0 , i cos 2 π f 0 t + 1 2 β t 2 + ϕ 0 , t 0 , T m
where A0,i is the amplitude of the transmitted signal; ϕ 0 is the initial phase; f0 is the carrier frequency; β = Δ F T m is the frequency modulation slope; Δ F is the frequency modulation offset; and Tm is the period of the modulation signal.
Assuming that the amplitude of the echo signal is attenuated to A1,i, the echo signal sr,i(t) can be expressed as follows:
s r , i t = A 1 , i cos 2 π f 0 t τ + 1 2 β t τ 2 + ϕ 0 + φ 0 , t 0 , T m
where τ = 2 R 0 + v r t / c is the time delay of the target echo signal relative to the transmitted signal, R0 is the initial distance from the target to the detector, vr is the relative velocity of the missile-target, c is the speed of light, and φ 0 is the phase shift caused by the reflection of the target.
The echo signal sr,i(t) and the transmitted signal st,i(t) are mixed and then are filtered by a low-pass filter to obtain the complex form of the point target beating signal sb,i(t):
s b , i t = 1 2 A 0 , i A 1 , i exp 2 π j 1 2 β τ 2 f 0 τ β τ t + φ 0 , t 0 , T m
According to the radar equation [22] and the relationship between the signal power Pt and the amplitude A1,i, the point target echo beating signal of each scattering unit is superimposed to obtain the surface target echo beating signal sEb(t):
s E b t = i = 1 N U P t 2 G i 2 λ 2 σ i 4 π 3   R i 4 t exp 2 π j 1 2 β τ 2 f 0 τ β τ t + φ 0
where NU is the total number of scattering units in the ground echo area, Pt is the power of the transmitted signal, Gi is the antenna gain of the i th scattering unit, σi is the backscattering coefficient of the scattering unit, λ is the working wavelength, and Ri(t) is the distance from the i th scattering unit to the detector at the current moment.

2.2. Construction of Target Echo Signal Model Containing Jamming

By covering the spectrum or time domain energy of the target signals, the blanket jamming JBb(t) makes the receiver unable to detect the real signal, which requires fast power suppression rather than modulating the real signal [23]. The deceptive jamming JDb(t) is generated by the digital radio frequency memory (DRFM) jammer, which modulates and forwards the stored signal. It is necessary to generate a false signal that is highly similar to the target signal [24]. In this paper, noise amplitude modulation (NAM) jamming, noise frequency modulation (NFM) jamming, sine-wave amplitude modulation (SAM) jamming, and sine-wave frequency modulation (SFM) jamming are selected as four types of blanket jamming [25], and range false target (RFT) jamming and velocity false target (VFT) are selected as two types of deceptive jamming [26].
J B b t = J S r t i = 1 N U s t , i t J D b t = J D r t i = 1 N U s t , i t
Similarly, assuming that the deceptive jamming is effective, there will be a certain time delay between the RFT and the true objective, and the VFT will have a certain frequency deviation. The equations of various types of jamming are shown in Table 1.
In the above table, Uj1 is the carrier level of NAM, un(t) is the modulation noise of NAM; Uj2 is the amplitude of NFM; KFM is the slope of frequency modulation; u(t) is the modulation noise of NFM; Uj3 and Uj4, respectively, represent the amplitude of SAM and SFM; Aj is the amplitude of the jamming signal, τ j = 2 D j / c is the time delay after DRFM modulation; Dj is the distance between the detector and the modulated false target; and fj is the Doppler frequency shift modulation frequency. In order to ensure the effectiveness of the jamming, the center frequency and phase of the blanket jamming carrier are kept consistent with the target echo signal.
The target echo signal with single jamming (s1) can be obtained by superimposing the beating signals of different jamming in Table 1 with the beating signal of target echo in Section 2.1. The target echo signal with compound jamming (s2) can be obtained by combining the blanket jamming with the deceptive jamming and superimposing it with the beating signal of the target echo.
s 1 = s E b t + J B b t or   s 1 = s E b t + J D b t
s 2 = s E b t + J B b t + J D b t

3. Establishment of Jamming Recognition Model

3.1. Extraction of Jamming Recognition Information in Multi-Period “Time Domain + Time-Frequency Domain”

Time domain, frequency domain, and time-frequency domain are often used to analyze signal components and trends in signal processing. The linear frequency modulation signal is an unsteady signal whose frequency changes with time, and its transient and structure are analyzed, respectively, in the time domain and frequency domain. FFT is a commonly used spectrum analysis algorithm, which can use periodicity and symmetry to reduce repeated calculations and improve the real-time calculation efficiency of transient systems [27,28]. The short-time Fourier transform (STFT) takes into account both the time-domain and frequency-domain localization analysis capabilities and is suitable for non-stationary signal processing [29,30]. The time domain, frequency domain, and time-frequency domain of the target echo signal with jamming are analyzed, respectively.
The time-domain signals of target echoes with single jamming and compound jamming are shown in Figure 2 and Figure 3, respectively.
As shown in Figure 2a–f and Figure 3a–h, when different types of jamming are superimposed with the target echo signal, due to the dense frequency characteristics of the multi-period signals and the characteristics of the studied jamming, the differences among various types of jamming are almost indistinguishable.
The FFT is used to process the target echo signals with different types of jamming. Based on the symmetry characteristics of the spectrum in a single period, only half of the spectrum is extracted. The spectrum diagrams are shown in Figure 4 and Figure 5.
As shown in Figure 4a–f, the NAM jamming, the NFM jamming, the SAM jamming, and the SFM jamming are all blanket jamming types. When the jamming power is large enough, the target can be completely covered. The RFT jamming has the characteristics of double targets in the frequency domain by changing the echo delay, and other parameters remain unchanged. The VFT jamming is generated by the Doppler frequency shift modulation and forwarding of the intercepted radio signal by the DRFM jammer, which will generate a certain frequency offset in the frequency domain. Because of the limitations of the aircraft speed, the VFT jamming is extremely similar to the echo signal. As shown in Figure 5a–h, the compound jamming manifests as the superposition of the effects of blanket jamming and deceptive jamming.
The STFT is used to process the target echo signals with different types of jamming. Similarly, only half periods of the time-frequency spectrum are extracted. The time-frequency representations of the echo signals with different types of jamming are shown in Figure 6 and Figure 7.
As shown in Figure 6a–f, there are obvious differences in time-frequency representation between the two types of deceptive jamming, as well as between deceptive jamming and blanket jamming. There is only a very insignificant texture difference among NAM, NFM, and SFM. As shown in Figure 7a–h, due to the superposition of blanket jamming and deceptive jamming, the characteristics of blanket jamming cannot be distinguished, and there are obvious characteristic differences between deceptive jamming.
Since the time-frequency spectrum is a three-dimensional tensor with time-frequency-amplitude coordinates, it has both spectral features and time-varying texture features, thus being regarded as one of the recognition information. However, its texture features are not obvious, especially for compound jamming. Meanwhile, as shown in Figure 8, when the jamming is strong enough to mask the target features, the time-frequency spectrum will lose its distinct recognition features. According to the principles of FFT and STFT, the frequency domain and time-frequency spectrum features cannot be complementary to each other. In order to make up for the lack and deficiency of the time variation pattern, the time domain information is introduced to complement the time-frequency information. The uncertainty of the influence of deception jamming on the echo signal leads to the possibility that the echo signal of a single period lacks effective jamming characteristics. Therefore, multiple continuous periods need to be taken.
In this paper, the time dependence of the time domain waveform is fused with the three-dimensional features of the time-frequency spectrum, and the multi-period “time domain + time-frequency domain” is determined as the recognition information.

3.2. Establishment of TFWF-AM Jamming Recognition Models

This model is established based on the CBAM attention mechanism [31,32,33] and the LSTM algorithm [34,35,36]. The spatial attention mechanism is used to extract the features of the time-domain signal matrix at different times, and the channel attention mechanism is employed to extract the features of different channels in the time-frequency spectrum. The bidirectional LSTM is adopted to enable the model to better understand the dependency and patterns of the time series. According to the time domain and time-frequency characteristics of the jamming signal, as well as the principles of different modules of the deep learning network, the jamming recognition model of the time-frequency domain weighted fusion attention mechanism (TFWF-AM) is designed, as shown in Figure 9.
Because of the periodic uncertainty of the jamming affecting the echo signal, a half-period signal of four consecutive periods is processed in this study. First, the four half-period time-domain signals are integrated into a 1000 × 4 time-domain matrix, STFT processing is performed on each half-period signal, and the frequency-domain tensors with four channels are formed by superposition along the channel dimension.
Then, the spatial attention mechanism is utilized to extract the spatial features of the time-domain matrix, and the channel attention mechanism is employed to extract the channel features of the frequency-domain tensor. The principle of the spatial attention module and the channel attention module are Equations (10) and (11), respectively.
M s F = S i g m o i d f 7 × 7 A v g P o o l F , M a x P o o l F
where f 7 × 7 represents a 7 × 7 convolution operation, and [AvgPool(F); MaxPool(F)] indicates the concatenation of the results of average pooling and maximum pooling along the channel axis.
M c F = S i g m o i d M L P A v g P o o l F + M L P M a x P o o l F
where F represents the input feature map, AvgPool and MaxPool, respectively, denote global average pooling and maximum pooling, and MLP is Multilayer Perceptron.
The time-domain spatial features and frequency-domain channel features are input into the bidirectional LSTM, respectively, and the forward hidden layer and the reverse hidden layer are combined to obtain the hidden layer state of the bidirectional LSTM, and the time steps of each channel are weighted and added to generate the fully connected layers, Feature 1 and Feature 2.
h t = L S T M h t 1 , x t
h t = L S T M h t + 1 , x t
h t = α h t + β h t
where x t , h t , and h t represent the input data, the output of the hidden layer of the forward LSTM, and the reverse LSTM at time t, respectively; α and β are constant coefficients, which represent the hidden layer output weight of the bidirectional LSTM, respectively.
The weighted fusion model performs linear transformation on Feature 1 and Feature 2, respectively, and obtains the probability result that the sample is predicted as various types of jamming. The D-S decision is used to weight the two results to determine the final model prediction result. Subsequently, it is determined whether the sample is correctly classified. The weights w1 and w2 are adjusted based on the identifiability of individual time-domain information and time-frequency domain information, and the calculation method is as shown in Equation (17).
P 1 = w 1 P D 11 , P D 12 , P D 13 , P D 14 + w 2 P D 21 , P D 22 , P D 23 , P D 24 = w 1 arg max Feature 1 + w 2 arg max Feature 2
C 1 = MATCH max P 1 , P 1 , 0
w 1 = A 1 A 1 + A 2 w 2 = A 2 A 1 + A 2
where A1 and A2, respectively, represent the training accuracy of the model based on single time domain information and single time-frequency domain information.
In this model, the CBAM module enhances the representation ability of key jamming features by dynamically adjusting feature weights through the channel attention mechanism and spatial attention mechanism. The channel attention mechanism generates channel weights through global pooling, while the spatial attention learns the importance of spatial positions through convolution. The two modules work together to enhance the efficiency of extracting local and global features of jamming signals. The bidirectional LSTM layer is used to capture the temporal dependency of jamming signals. The bidirectional structure can simultaneously utilize past and future context information and is applied to the temporal pattern recognition of periodic or sudden jamming (RFT and SFT). Weight fusion is used to dynamically adjust the weights of the two types of recognition information to enhance the robustness of the model.
The channel attention of CBAM can suppress redundant frequency points to highlight the differences in the frequency domain features, enhance the channel characteristics of single-frequency signals, and thereby distinguish between blanket jamming and deceptive jamming. The spatial attention mechanism locates the nonlinearly modulated frequency change area of the instantaneous frequency, which can identify the burst characteristics of frequency hopping, thereby determining the temporal change pattern within the blanket jamming. Further, the bidirectional LSTM is employed for modeling and tracking the temporal continuity of its modulation patterns, capturing its dynamic frequency offset rules, and achieving temporal decoding of the compound jamming.
In order to verify the performance of the model in this paper, a time-frequency domain feature fusion attention mechanism (TFFF-AM) model was established, as shown in Figure 10. The feature fusion model directly concatenates Feature 1 and Feature 2 to form a new fully connected layer. Through linear transformation, the probability that the sample is predicted to be various types of jamming is output. By comparing whether the predicted category index position is consistent with the index position of the label “1”, it is determined whether the sample is correctly classified.
P 2 = P F 11 , P F 12 , P F 13 , P F 14 , P F 21 , P F 22 , P F 23 , P F 24
C 2 = MATCH max P F 11 : P F 24 , P F 11 : P F 24 , 0
The pseudocodes of the two jamming recognition models of TFWF-AM and TFFF-AM are shown in Algorithm 1 and Algorithm 2, respectively.
Algorithm 1: TFWF-AM jamming recognition model
Sensors 25 06345 i001
Algorithm 2: TFFF-AM jamming recognition model
Sensors 25 06345 i002

4. Establishment of Sample Sets for Jamming Recognition

In Section 2.1, the multi-terrain detection model is established, and then the echo beating signal expression of the surface target is derived. In Section 2.2, the jamming beating signal model is established. Based on the above models, a theoretical echo model will be established using MATLAB R2018b in this section, and the recognition sample sets of different jamming will be generated by superimposing different jamming beating signals into the target echo beating signals. In the process of sample generation, the main parameters of the echo model include carrier frequency, modulation period, etc. The values of the main parameters are shown in Table 2.
The fitting parameters for the backscattering coefficients vary for different terrains. In this study, five terrains of grassland, dry snow, soil and rock surface, short vegetation, and wet snow were adopted. According to the main parameters of the echo model, the fitting parameter values adopted in this paper for the X-band HH polarization mode are shown in Table 3.
Based on the above echo model and parameters, six kinds of single jamming recognition sample sets are generated. The blanket jamming and the deceptive jamming are cross-additively combined to form eight kinds of compound jamming sample sets. The number of recognition sample sets for each type of jamming has been summarized in Table 4.
As shown in Table 4, six kinds of single jamming, namely, NAM, NFM, SAM, SFM, RFT, and VFT, are generated, with 200 samples for each kind of jamming, resulting in a single jamming recognition sample set containing 1200 samples. Eight kinds of compound jamming, NAM + RFT, NAM + VFT, NFM + RFT, NFM + VFT, SAM + RFT, SAM + VFT, SFM + RFT, and SFM + VFT, are generated, and a compound jamming recognition sample set containing 1600 samples is also formed. The sampling time for each sample is 0.001 s. According to the modulation period and the sampling frequency of the beating signal, there are a total of 25 periods, and each period has 2000 sampling points.

5. Model Performance Verification

This section uses K-fold cross-validation to verify the performance of the jamming recognition model. For each fold of cross-validation, 200 sets of samples are used as the test set, and all the remaining samples are used as the training set. There is no intersection among the test sets in the K-fold cross-validation. The performance of TFWF-AM and TFFF-AM jamming recognition models is compared, and the accuracy of “time domain + time-frequency domain” jamming recognition information is analyzed, and the model is compared with the existing algorithm model.

5.1. Analysis of Recognition Ability of TFWF-AM Jamming Recognition Model

Two models, TFWF-AM and TFFF-AM, are used to identify the single jamming sample set and the compound jamming sample set, and three indexes—the number of misclassifications, the average processing time per batch, and the recognition accuracy of the two models—are compared. The two models are used to identify the single jamming sample set and the compound jamming sample set, and a one-fold cross-validation training process is selected, as shown in Figure 11.
Figure 11 shows the training process of the TFWF-AM and TFFF-AM jamming recognition models for single jamming and compound jamming. During the iterative process, there was a significant disparity between the training set accuracy and the test set accuracy of the TFFF-AM model. Although the training set accuracy was nearly 100% and the loss rate dropped to zero, the test set accuracy was unable to be further improved. While the accuracy and loss curve trend of the training set for the TFWF-AM model is consistent with the test set. Therefore, the TFWF-AM model is more stable than the TFFF-AM model.
The results of the TFWF-AM and TFFF-AM jamming recognition models for single jamming sample sets and compound jamming sample sets are shown in Figure 12.
The performance of the TFWF-AM and TFFF-AM jamming recognition models was compared in all aspects. The results are shown in Table 5.
Due to the differences in the computing capabilities of the processor hardware, in this paper, the normalized average processing time (NAPT) is used as the real-time performance indicator of the model.
NAPT = A P T MAPT
where APT represents the average processing time per batch of a certain model and MAPT represents the maximum average processing time per batch for the sample set.
As shown in Figure 12 and Table 5, compared with the TFFF-AM jamming recognition model, the TFWF-AM jamming recognition model reduces the number of misclassifications for single jamming and compound jamming by 125 and 845, respectively. Meanwhile, the TFWF-AM model reduced the NAPT per batch by 47.6% and 53.6% for the two sample sets and improved the recognition accuracy by 10.38% and 52.81%, respectively. Therefore, the comprehensive performance of the TFWF-AM jamming recognition model in this paper is superior to that of the TFFF-AM jamming recognition model.
Table 6 analyzes the embeddability of the model.
In terms of computational complexity, the FLOPs of the TFWF-AM compound jamming recognition model proposed in this paper is 100.83 M, which is at the same order of magnitude as the existing lightweight model (MLCJRN) and is significantly superior to other deep learning-based jamming recognition models (MANet and JRNet). In terms of the number of model parameters, the TFWF-AM jamming recognition model has a parameter size of 2.48 M for the compound jamming, which is comparable to that of MANet and much lower than that of JRNet.
Meanwhile, the activation memory requirement of the TFWF-AM algorithm proposed in this paper is approximately 2.94 MB. Taking XC7A100T FPGA as an example, the model (100.83 M FLOPs) mainly consists of convolutional calculations (80%), and each 3 × 3 convolution kernel requires 9 DSP48E1s to perform multiplication operations. According to the design of “processing 8 feature maps in parallel” (balancing delay and resources), only 80–120 DSPs are needed, which is much lower than the 240 DSPs of XC7A100T. The model activation memory (2.94 M) and the parameters (2.48 M) can be fully stored in the on-chip BRAM without relying on external DDR. Therefore, the algorithm proposed in this paper demonstrates strong deployability and applicability in general.
To present the performance of the model more intuitively, this study uses four indicators—Precision, Recall, F1 score, and Accuracy—to evaluate the recognition effect of the TFWF-AM model on various types of jamming and analyze the performance of the model.
As shown in Table 7 and Table 8, when applying the model in this paper to identify single jamming and compound jamming, the four indicators—Precision, Recall, F1 score, and Accuracy—all demonstrated excellent performance.

5.2. Accuracy Analysis of Different Jamming Information

This section analyzes the accuracy of multi-period “time domain + time-frequency domain” jamming recognition information. According to the recognition results of Section 5.1, the performance of the TFWF-AM jamming recognition model is better than that of the TFFF-AM jamming recognition model. Moreover, compared to single jamming, the recognition difficulty of the compound jamming sample set is higher. Therefore, this section uses the TFWF-AM jamming recognition model to identify the compound jamming sample set and counts the misclassification quantity of 1600 samples under four recognition information categories: time domain, frequency domain, time-frequency domain, and “time domain + time-frequency domain”.
As shown in Table 9 and Figure 13, the number of misclassified instances of the compound jamming sample set using time-domain information and time-frequency domain information are 241 and 11, respectively, while the number of misclassified instances using frequency-domain information is 188. Further, the time domain and time-frequency domain information are fused, and the number of misclassified instances of the compound jamming sample set is reduced to 7. Therefore, the time domain and the time-frequency domain can complement each other in terms of jamming information, which proves the effectiveness of the recognition information.

5.3. Analysis of the Model’s Robustness

At present, there are intelligent and dexterous jammers, which use DRFM to sample and forward radar signals quickly so as to achieve the dual effects of deception and suppression. In this paper, three kinds of intelligent jamming types in this field are selected, including chopping and interleaving (CI) jamming, intermittent sampling repeater (ISR) jamming, and smeared spectrum (SMSP) jamming, and the robustness of the model is studied. Similarly, 200 samples are generated for each type of jamming, and K-fold cross-validation is performed. The recognition results are shown in Table 10.
The results show that the recognition accuracy of the model for three kinds of jamming reaches 100%, which verifies the effectiveness of the model for intelligent jamming.
In order to analyze the model’s sensitivity to noise, this section analyzes the recognition accuracy of the model for eight compound jamming sample sets under different signal-to-noise ratio (SNR) conditions. The recognition accuracy is shown in Table 11.
As shown in Table 11, in the process of increasing SNR, the recognition accuracy of the model for eight kinds of jamming shows an overall upward trend. When SNR is greater than 0, the recognition accuracy of the model for eight kinds of jamming reaches more than 80%. When the SNR is less than 0, the recognition accuracy is reduced to less than 70%, so it needs to be used in combination with the noise reduction algorithm.

5.4. Comparison of This Model with Existing Algorithm Models

In order to further verify the performance of the model, this paper randomly selects two deep learning algorithms, ResNet [40] and AlexNet [41], and selects four machine learning algorithms [42,43,44,45], XGBoost, logistic regression, decision tree, and AdaBoost, to identify the compound jamming sample set. The results are shown in Table 12.
According to Table 12, the recognition accuracy of the compound jamming sample set under four deep learning and four machine learning algorithms is shown in Figure 14.
As shown in Figure 14, the average recognition accuracy of the four deep learning algorithms reaches 63.75%, while the average recognition accuracy of the four machine learning algorithms is only 57.82%. The recognition accuracy of the four deep learning algorithms is compared. The TFWF-AM model proposed in this paper achieved a recognition accuracy of 99.56%, which is much higher than the other three algorithms (ranging from 3.26% to 87.16%).

6. Conclusions

Aiming at the problem of insufficient jamming recognition ability of the target detection model, this paper establishes a multi-terrain random fluctuation model, derives the target echo beating signal and multi-jamming beating signal, and carries out the research on jamming recognition based on time-frequency domain fusion and attention mechanism. This paper mainly draws the following conclusions.
  • By analyzing the time domain, frequency domain, and time-frequency domain of the echo signals, the jamming recognition information of “time domain + time-frequency domain” was determined. Combined with the attention mechanism, the TFWF-AM jamming recognition model was established.
  • The TFWF-AM jamming recognition model and the common feature fusion model were compared and analyzed. The TFWF-AM jamming recognition model demonstrated superior performance in terms of the number of misclassified instances, average processing time per batch, and recognition accuracy, and its recognition accuracy for single jamming and compound jamming reached 99.92% and 99.56%, respectively. And this model has excellent embedding capabilities.
  • The number of misclassified instances of the compound jamming sample set by using time-frequency domain information, time domain information, and frequency domain information is 11, 241, and 188, respectively. By constructing the jamming recognition information of “time domain + time-frequency domain”, the number of misclassified instances of 1600 compound samples is reduced to 7.
  • Compared with other jamming recognition models based on deep learning and machine learning, the recognition accuracy of the TFWF-AM jamming recognition model proposed in this paper has increased by 3.26% to 87.16%.
This paper provides a research foundation for the intelligent radio detection system based on real-time jamming sensing and dynamic spectrum modulation. The research on online adaptation, new jamming types, and deployment in real-time radar systems will be conducted in the future.

Author Contributions

Conceptualization, Y.Z. and X.P.; methodology, Y.Z. and X.P.; software, Y.Z.; validation, S.W. and L.W.; formal analysis, S.W.; investigation, L.W.; writing—original draft preparation, Y.Z. and S.W.; writing—review and editing, L.W. and Y.Y.; visualization, Y.Z.; funding acquisition, X.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (grant number: U1730109). The APC was funded by the National Natural Science Foundation of China.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to confidentiality and security restrictions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhou, Y.; Cao, R.; Li, P. A target spatial location method for fuze detonation point based on deep learning and sensor fusion. Expert Syst. Appl. 2024, 238, 122176. [Google Scholar] [CrossRef]
  2. Jia, J.; Gao, M.; Han, Z.; Liu, L.; Yin, Y. Overview of anti-information interference technology for radio proximity fuze. Syst. Eng. Electron. 2025, 47, 1074–1107. [Google Scholar]
  3. Cui, Z.; Song, S.; Xu, L. Principle of Proximity Fuze; Beijing Institute of Technology Press: Beijing, China, 2009. [Google Scholar]
  4. Zhang, S.; Zhou, Y.; Zhang, L.; Zhang, Q.; Du, L. Target Detection for Multistatic Radar in the Presence of Deception Jamming. IEEE Sens. J. 2021, 21, 8130–8141. [Google Scholar] [CrossRef]
  5. Zhang, Y.; Jiu, B.; Wang, P.; Liu, H.; Liang, S. An End-to-End Anti-Jamming Target Detection Method Based on CNN. IEEE Sens. J. 2021, 21, 21817–21828. [Google Scholar] [CrossRef]
  6. Li, H.; Li, Z.; Liu, K.; Xu, K.; Luo, C.; Lv, Y.; Deng, Y. A Broadband Information Metasurface-Assisted Target Jamming System for Synthetic Aperture Radar. Remote Sens. 2024, 16, 1499. [Google Scholar] [CrossRef]
  7. Ye, Y.; Deng, Z.; Huang, X. A novel detector for range-spread target detection based on HRRP-pursuing. Measurement 2024, 231, 114579. [Google Scholar] [CrossRef]
  8. Wu, Z.; Cui, J.; Cao, Y.; Zhang, Q.; Zhang, L.; Yang, L. Compound Active Jamming Recognition for Zero-memory Incremental Learning. J. Electron. Inf. Technol. 2025, 47, 188–200. [Google Scholar]
  9. Liu, J.; Song, Z.; Li, Y.; Liu, L.; Xia, J.; Wang, B.; Li, X.; Wang, C. Composite interference signal recognition based on deep learning. Syst. Eng. Electron. 2025, 1–11. (In Chinese) [Google Scholar]
  10. Gao, M.; Xu, L.; Shi, X.; Wang, W.; Wang, F.; Hu, S.; Wu, Y.; Chen, H. A Target Recognition Algorithm for Linear Array Compound Imaging Fuze Under Jamming Conditions. Acta Armamentarii 2025, 46, 229–237. [Google Scholar]
  11. Guo, W.; Wu, Z.; Cao, Y.; Zhang, Q.; Zhang, L.; Yang, L. Multidomain Characteristic-guided Multimodal Contrastive Recognition Method for Active Radar Jamming. J. Radars 2024, 13, 1004–1018. [Google Scholar]
  12. Nie, L.; Wei, S.; Li, J.; Zhang, H.; Shi, J.; Wang, M.; Chen, S.; Zhang, X. Active Blanket Jamming Suppression Method for Spaceborne SAR Images Based on Regional Feature Refinement Perceptual Learning. J. Radars 2024, 13, 985–1003. [Google Scholar]
  13. Guo, L.; Huang, W.; Chen, Q.; Wang, J. A lightweight algorithm of ML-SNet radar compound jamming recognition. Syst. Eng. Electron. 2025, 47, 418–427. [Google Scholar]
  14. Gao, Y.; Wang, G.; Wang, G. Jamming Pattern Open Set Recognition Based on Hyperspherical Triplet Coding. J. Electron. Inf. Technol. 2024, 46, 895–905. [Google Scholar]
  15. Yang, P.; He, L.; Wang, Q.; Wang, R.; Zhang, M. Interference identification based on mixed signal multidomain feature and Transformer framework. Syst. Eng. Electron. 2024, 46, 2138–2145. [Google Scholar]
  16. Dai, J.; Hao, X.-H.; Li, Z.; Li, P.; Yan, X.-P. Adaptive target and jamming recognition for the pulse doppler radar fuze based on a time-frequency joint feature and an online-updated naive bayesian classifier with minimal risk. Def. Technol. 2022, 18, 457–466. [Google Scholar] [CrossRef]
  17. Ping, J.; Li, S.; Lin, Y. Modulation recognition of unmanned aerial vehicle swarm MIMO signals under Alpha stable distribution noise and multipath interference. Syst. Eng. Electron. 2024, 46, 3920–3929. [Google Scholar]
  18. Meng, F.; Chen, P.; Wu, L.; Wang, X. Automatic Modulation Classification: A Deep Learning Enabled Approach. IEEE Trans. Veh. Technol. 2018, 67, 10760–10772. [Google Scholar] [CrossRef]
  19. Wang, Y.; Liu, M.; Yang, J.; Gui, G. Data-Driven Deep Learning for Automatic Modulation Recognition in Cognitive Radios. IEEE Trans. Veh. Technol. 2019, 68, 4074–4077. [Google Scholar] [CrossRef]
  20. Ghasemzadeh, P.; Banerjee, S.; Hempel, M.; Sharif, H. A Novel Deep Learning and Polar Transformation Framework for an Adaptive Automatic Modulation Classification. IEEE Trans. Veh. Technol. 2020, 69, 13243–13258. [Google Scholar] [CrossRef]
  21. Ulaby, F.T.; Dobson, M.C. Handbook of Radar Scattering Statistics for Terrain; Aretech House, Inc.: Norwood, MA, USA, 1989. [Google Scholar]
  22. Ding, L.; Geng, F.; Chen, J. Radar Principles: Fourth Edition; Publishing House of Electronics Industry: Beijing, China, 2009. [Google Scholar]
  23. Tan, R.; Bu, Y.; Pan, B.; Yu, X.; Cui, G. Cooperative Waveforms Design for Distributed Sites in Multiple Blanket Jamming. IEEE Sens. J. 2024, 6, 24. [Google Scholar] [CrossRef]
  24. Bu, Y.; Yu, X.; Yang, J.; Cui, G.; Yang, X. Moving target identification under deception jamming circumstance based on radon-Fourier transform. Signal Process. 2025, 226, 109652. [Google Scholar] [CrossRef]
  25. Yuan, Y.; Zhan, C.; Tian, W.; Chen, S.; Zhang, S. Anti-Jamming Imaging Method for Carrier-Free Ultra-Wideband Airborne SAR Based on Variational Modal Decomposition. Remote Sens. 2024, 16, 2128. [Google Scholar] [CrossRef]
  26. Li, Q.; Guo, Y.; Zhang, P.; Xu, H.; Zhang, L.; Chen, Z.; Huang, Y. Deception Velocity-Based Method to Discriminate Physical Targets and Active False Targets in a Multistatic Radar System. Remote Sens. 2024, 16, 17. [Google Scholar] [CrossRef]
  27. Risthaus, L.; Schneider, M. Imposing Dirichlet boundary conditions directly for FFT-based computational micromechanics. Comput. Mech. 2024, 74, 1089–1113. [Google Scholar] [CrossRef]
  28. Guo, Y.; Shen, Q.; Deng, Z.; Zhang, S. Research on a Super-Resolution and Low-Complexity Positioning Algorithm Using FMCW Radar Based on OMP and FFT in 2D Driving Scene. Sensors 2023, 23, 4531. [Google Scholar] [CrossRef]
  29. Liu, Y.; Rao, X.; Hu, J.; Zhu, X.; Yi, H. A Weak Target Detection Algorithm IAR-STFT Based on Correlated K-distribution Sea Clutter Model. Radioengineering 2023, 32, 33–43. [Google Scholar] [CrossRef]
  30. Hussain, A.; Xu, L.; Quan, H.; Chao, Y.; Lian, H.; Zhou, T.; Li, G.; Team, E. Investigation of sawtooth oscillations and quasi-interchange mode in the experimental advanced superconducting tokamak. Phys. Scr. 2025, 5, 100. [Google Scholar] [CrossRef]
  31. Cheng, Y.; Guan, R.; Zhou, S.; Zhou, X.; Xue, J.; Zhai, W. Research on tool wear and breakage state recognition of heavy milling 508III steel based on ResNet-CBAM. Measurement 2025, 242, 116105. [Google Scholar] [CrossRef]
  32. Nidhi; Verma, B. A lightweight convolutional swin transformer with cutmix augmentation and CBAM attention for compound emotion recognition. Appl. Intell. 2024, 54, 7793–7809. [Google Scholar] [CrossRef]
  33. Jiang, K.; Zhang, C.; Wei, B.; Li, Z.; Kochan, O. Fault diagnosis of RV reducer based on denoising time-frequency attention neural network. Expert Syst. Appl. 2024, 238, 121762. [Google Scholar] [CrossRef]
  34. Liu, W.; Bai, Y.; Yue, X.; Wang, R.; Song, Q. A wind speed forcasting model based on rime optimization based VMD and multi-headed self-attention-LSTM. Energy 2024, 294, 130726. [Google Scholar] [CrossRef]
  35. Chen, S.; Xin, M.; Yang, F.; Zhang, X.; Liu, J.; Ren, G.; Kong, S. Error Compensation Method of GNSS/INS Integrated Navigation System Based on AT-LSTM During GNSS Outages. IEEE Sens. J. 2024, 24, 20188–20199. [Google Scholar] [CrossRef]
  36. Yang, J.; Liu, C.; Pan, J. Deformation prediction of arch dams by coupling STL decomposition and LSTM neural network. Appl. Intell. 2024, 54, 10242–10257. [Google Scholar] [CrossRef]
  37. Lv, Q.; Fan, H.; Liu, J.; Zhao, Y.; Xing, M.; Quan, Y. Multilabel deep learning-based lightweight radar compound jamming recognition method. IEEE Trans. Instrum. Meas. 2024, 73, 1–15. [Google Scholar] [CrossRef]
  38. Hou, L.; Zhang, S.; Wang, C.; Li, X.; Chen, S.; Zhu, L.; Zhu, Y. Jamming recognition of carrier-free UWB cognitive radar based on MANet. IEEE Trans. Instrum. Meas. 2023, 72, 8504413. [Google Scholar] [CrossRef]
  39. Qu, Q.; Wei, S.; Liu, S.; Liang, J.; Shi, J. JRNet: Jamming recognition networks for radar compound suppression jamming signals. IEEE Trans. Veh. Technol. 2020, 69, 15035–15045. [Google Scholar] [CrossRef]
  40. Chen, H.; Niu, S.; Shao, Z.; Jian, L. Recognizing Multitype Misalignments in Wireless EV Chargers with Orientation-Sensitive Coils: A Data-Driven Strategy Using Improved ResNet. IEEE Trans. Ind. Inform. 2024, 1, 20. [Google Scholar] [CrossRef]
  41. Shen, J.; Wang, Z.; Wang, Y.; Zhu, H.; Zhang, L.; Tang, Y. AGWO-PSO-VMD-TEFCG-AlexNet bearing fault diagnosis method under strong noise. Measurement 2025, 242, 116259. [Google Scholar] [CrossRef]
  42. Chen, S.; Yin, Z.; Zheng, L.; Yuan, J. Study of an ISSA-XGBoost model for milling tool wear prediction under variable working conditions. Int. J. Adv. Manuf. Technol. 2024, 133, 13811–13815. [Google Scholar] [CrossRef]
  43. Kolukisa, B.; Dedeturk, B.K.; Hacilar, H.; Gungor, V.C. An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm. Comput. Stand. Interfaces 2024, 89, 9. [Google Scholar] [CrossRef]
  44. Chen, Y.; Khandelwal, M.; Onifade, M.; Zhou, J.; Lawal, A.I.; Bada, S.O.; Genc, B. Predicting the hardgrove grindability index using interpretable decision tree-based machine learning models. Fuel 2025, 384, 133953. [Google Scholar] [CrossRef]
  45. Bilban, M.; Nan, O. Comparative Analysis of Machine Learning Methods with Chaotic AdaBoost and Logistic Mapping for Real-Time Sensor Fusion in Autonomous Vehicles: Enhancing Speed and Acceleration Prediction Under Uncertainty. Sensors 2025, 25, 3485. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Establishment of multi-terrain echo model.
Figure 1. Establishment of multi-terrain echo model.
Sensors 25 06345 g001
Figure 2. Time domain signals of target echo with single jamming: (a) NAM, (b) NFM, (c) SAM, (d) SFM, (e) RFT, and (f) VFT.
Figure 2. Time domain signals of target echo with single jamming: (a) NAM, (b) NFM, (c) SAM, (d) SFM, (e) RFT, and (f) VFT.
Sensors 25 06345 g002
Figure 3. Time domain signals of target echo with compound jamming: (a) NAM + RFT, (b) NAM + VFT, (c) NFM + RFT, (d) NFM + VFT, (e) SAM + RFT, (f) SAM + VFT, (g) SFM + RFT, and (h) SFM + VFT.
Figure 3. Time domain signals of target echo with compound jamming: (a) NAM + RFT, (b) NAM + VFT, (c) NFM + RFT, (d) NFM + VFT, (e) SAM + RFT, (f) SAM + VFT, (g) SFM + RFT, and (h) SFM + VFT.
Sensors 25 06345 g003
Figure 4. Spectrum diagram of the target echo with single jamming: (a) NAM, (b) NFM, (c) SAM, (d) SFM, (e) RFT, and (f) VFT.
Figure 4. Spectrum diagram of the target echo with single jamming: (a) NAM, (b) NFM, (c) SAM, (d) SFM, (e) RFT, and (f) VFT.
Sensors 25 06345 g004
Figure 5. Spectrum diagram of the target echo with compound jamming: (a) NAM + RFT, (b) NAM + VFT, (c) NFM + RFT, (d) NFM + VFT, (e) SAM + RFT, (f) SAM + VFT, (g) SFM + RFT, and (h) SFM + VFT.
Figure 5. Spectrum diagram of the target echo with compound jamming: (a) NAM + RFT, (b) NAM + VFT, (c) NFM + RFT, (d) NFM + VFT, (e) SAM + RFT, (f) SAM + VFT, (g) SFM + RFT, and (h) SFM + VFT.
Sensors 25 06345 g005
Figure 6. Time-frequency representations of the target echo with single jamming: (a) NAM, (b) NFM, (c) SAM, (d) SFM, (e) RFT, and (f) VFT.
Figure 6. Time-frequency representations of the target echo with single jamming: (a) NAM, (b) NFM, (c) SAM, (d) SFM, (e) RFT, and (f) VFT.
Sensors 25 06345 g006
Figure 7. Time-frequency representations of the target echo with compound jamming: (a) NAM + RFT, (b) NAM + VFT, (c) NFM + RFT, (d) NFM + VFT, (e) SAM + RFT, (f) SAM + VFT, (g) SFM + RFT, and (h) SFM + VFT.
Figure 7. Time-frequency representations of the target echo with compound jamming: (a) NAM + RFT, (b) NAM + VFT, (c) NFM + RFT, (d) NFM + VFT, (e) SAM + RFT, (f) SAM + VFT, (g) SFM + RFT, and (h) SFM + VFT.
Sensors 25 06345 g007
Figure 8. Determination of jamming recognition information.
Figure 8. Determination of jamming recognition information.
Sensors 25 06345 g008
Figure 9. Schematic diagram of the TFWF-AM jamming recognition model.
Figure 9. Schematic diagram of the TFWF-AM jamming recognition model.
Sensors 25 06345 g009
Figure 10. Schematic diagram of the TFFF-AM jamming recognition model.
Figure 10. Schematic diagram of the TFFF-AM jamming recognition model.
Sensors 25 06345 g010
Figure 11. Accuracy graph of training process: (a) the recognition accuracy and loss rate of the two models for single jamming and (b) the recognition accuracy and loss rate of the two models for compound jamming.
Figure 11. Accuracy graph of training process: (a) the recognition accuracy and loss rate of the two models for single jamming and (b) the recognition accuracy and loss rate of the two models for compound jamming.
Sensors 25 06345 g011aSensors 25 06345 g011b
Figure 12. The recognition results of the time-frequency fusion attention mechanism for different jamming: (a) the recognition results of the TFWF-AM model for single jamming, (b) the recognition results of the TFWF-AM model for compound jamming, (c) the recognition results of the TFFF-AM model for single jamming, and (d) the recognition results of the TFFF-AM model for compound jamming.
Figure 12. The recognition results of the time-frequency fusion attention mechanism for different jamming: (a) the recognition results of the TFWF-AM model for single jamming, (b) the recognition results of the TFWF-AM model for compound jamming, (c) the recognition results of the TFFF-AM model for single jamming, and (d) the recognition results of the TFFF-AM model for compound jamming.
Sensors 25 06345 g012aSensors 25 06345 g012b
Figure 13. The number of misclassified instances under different jamming recognition information.
Figure 13. The number of misclassified instances under different jamming recognition information.
Sensors 25 06345 g013
Figure 14. Comparison of this model with existing algorithm models for the compound jamming sample set.
Figure 14. Comparison of this model with existing algorithm models for the compound jamming sample set.
Sensors 25 06345 g014
Table 1. Expressions of different types of jamming.
Table 1. Expressions of different types of jamming.
Expressions
Blanket
jamming
NAM J S r 1 t = U j 1 + u n t cos 2 π f 0 t + φ S r 1
NFM J S r 2 t = U j 2 cos 2 π f 0 t + 2 π K F M 0 t u t d t + φ S r 2
SAM J S r 3 t = U j 3 1 + m j cos 2 π f j t cos 2 π f 0 t + φ S r 3
SFM J S r 4 t = U j 4 cos 2 π f 0 t + m f sin ω m t + φ S r 4
Deceptive
jamming
RFT J D r 1 t = A j cos 2 π f 0 t τ j + 1 2 β t τ j 2 + φ D r 1
VFT J D r 2 t = A j cos 2 π f 0 + f j t τ + 1 2 β t τ 2 + φ D r 2
Table 2. Main parameters of target echo model.
Table 2. Main parameters of target echo model.
ParametersDefinitionValues
f0Carrier frequency8 GHz
TmModulation period4 × 10−5 s
vVelocity500 m/s
cLight velocity3 × 108 m/s
ΔFFrequency modulation deviation300 MHz
R0The initial distance from target to detector100 m
PtTransmission power1 W
FsThe sampling frequency of beating signal50 MHz
Table 3. Fitting parameters of the multi-terrain Ulaby model.
Table 3. Fitting parameters of the multi-terrain Ulaby model.
TerrainsIncidence Angle (θ)Fitting Value
P1P2P3P4P5P6
Grassland080−33.28832.9800.510−1.3434.874−3.142
Dry snow075−13.29820.04810.04.5292.927−1.173
Soil and rock surface0804.3376.666−0.107−29.7090.863−1.365
Short vegetation080−99.097.4170.114−0.8375.0−2.984
Wet snow08010.0207.90915.030.00.8282.073
Table 4. Jamming recognition sample sets and quantity statistics.
Table 4. Jamming recognition sample sets and quantity statistics.
Type of JammingThe Quantity of Samples
Single jammingNAM200
NFM200
SAM200
SFM200
RFT200
VFT200
Compound jammingNAM + RFT200
NAM + VFT200
NFM + RFT200
NFM + VFT200
SAM + RFT200
SAM + VFT200
SFM + RFT200
SFM + VFT200
Table 5. Performance comparison of TFWF-AM and TFFF-AM jamming recognition models.
Table 5. Performance comparison of TFWF-AM and TFFF-AM jamming recognition models.
Types of JammingSingle JammingCompound Jamming
Recognition modelTFFF-AMTFWF-AMParameter comparisonTFFF-AMTFWF-AMParameter comparison
Number of misclassified instances1261−1258527−845
NAPT10.524−47.6%10.464−53.6%
Recognition accuracy89.50%99.92%+10.42%46.75%99.56%+52.81%
Table 6. Analysis of model embeddability.
Table 6. Analysis of model embeddability.
ParametersTFWF-AMMLCJRN [37]MANet [38]JRNet [39]
FLOPs (M)100.83108.5190.01820.0
Parameters (M)2.480.982.5411.69
Memory requirements (M)2.94---
Table 7. The recognition effect of TFWF-AM for single jamming.
Table 7. The recognition effect of TFWF-AM for single jamming.
Types of JammingNAMNFMSAMSFMRFTVFT
Precision100%99.5%100%100%100%100%
Recall100%100%100%99.5%100%100%
F1 score1.00.9971.00.9971.01.0
Accuracy99.92%
Table 8. The recognition effect of TFWF-AM for compound jamming.
Table 8. The recognition effect of TFWF-AM for compound jamming.
Types of JammingNAM + RFTNAM + VFTNFM + RFTNFM + VFTSAM + RFTSAM + VFTSFM + RFTSFM + VFT
Precision99.5%100%98.03%99%100%100%100%100%
Recall100%97.5%99.5%99.5%100%100%100%100%
F1 score0.9970.9870.9880.9921.01.01.01.0
Accuracy99.56%
Table 9. The misclassification quantity of different jamming recognition information.
Table 9. The misclassification quantity of different jamming recognition information.
Recognition
Information
Time Domain +
Time-Frequency Domain
Time-Frequency DomainTime
Domain
Frequency
Domain
Misclassification quantity711241188
Table 10. The recognition results of the TFWF-AM model for the new type of jamming.
Table 10. The recognition results of the TFWF-AM model for the new type of jamming.
Types of JammingCIISRSMSP
Sample size200200200
The number of correctly classified samples200200200
Recognition accuracy100%
Table 11. The recognition results of the model for compound jamming under different SNR.
Table 11. The recognition results of the model for compound jamming under different SNR.
SNR−5−3035
Recognition accuracy46.8%69.4%82.4%80.2%84.6%
Table 12. The comparison of recognition accuracy between this model and the existing algorithm.
Table 12. The comparison of recognition accuracy between this model and the existing algorithm.
Deep Learning AlgorithmRecognition AccuracyMachine Learning AlgorithmRecognition Accuracy
TFFF-AM46.75%XGBoost65.25%
TFWF-AM99.56%Logistic regression79.63%
ResNet96.3%Decision tree49.5%
AlexNet12.4%AdaBoost36.88%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Y.; Wang, S.; Wu, L.; Yao, Y.; Pan, X. Research on Jamming Recognition Based on Time-Frequency Domain Weighted Fusion and Attention Mechanism. Sensors 2025, 25, 6345. https://doi.org/10.3390/s25206345

AMA Style

Zhang Y, Wang S, Wu L, Yao Y, Pan X. Research on Jamming Recognition Based on Time-Frequency Domain Weighted Fusion and Attention Mechanism. Sensors. 2025; 25(20):6345. https://doi.org/10.3390/s25206345

Chicago/Turabian Style

Zhang, Yao, Shuai Wang, Lingyi Wu, Yunchao Yao, and Xi Pan. 2025. "Research on Jamming Recognition Based on Time-Frequency Domain Weighted Fusion and Attention Mechanism" Sensors 25, no. 20: 6345. https://doi.org/10.3390/s25206345

APA Style

Zhang, Y., Wang, S., Wu, L., Yao, Y., & Pan, X. (2025). Research on Jamming Recognition Based on Time-Frequency Domain Weighted Fusion and Attention Mechanism. Sensors, 25(20), 6345. https://doi.org/10.3390/s25206345

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop