Next Article in Journal
An Improved Approach to Estimate Stocking Rate and Carrying Capacity Based on Remotely Sensed Phenology Timings
Previous Article in Journal
Annual Review of In Situ Observations of Tropical Cyclone–Ocean Interaction in the Western North Pacific during 2023
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression

1
College of Information and Communication Engineering, Harbin Engineering University, Harbin 150001, China
2
Key Laboratory of Advanced Marine Communication and Information Technology, Ministry of Industry and Information Technology, Harbin Engineering University, Harbin 150001, China
3
School of Electrical Engineering, University of Jinan, Jinan 250024, China
4
Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education, Anhui University, Hefei 230039, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2024, 16(11), 1989; https://doi.org/10.3390/rs16111989
Submission received: 30 April 2024 / Revised: 23 May 2024 / Accepted: 30 May 2024 / Published: 31 May 2024

Abstract

:
With the maturation of digital radio frequency memory (DRFM) technology, various intra-pulse retransmission interference methods have emerged. These flexible and changeable retransmission interference methods pose significant challenges to radar detection tasks, particularly in modern battlefields. This paper proposes an attention-guided complex-valued transformer (AGCT) as a solution. First, the encoder maps the received signal contaminated by interference and noise into a high-dimensional space. Then, the dilated convolution block (DCB) group and attention block (AB) group in the mask estimator extract the delicate multi-scale features and large-scale features of the interference, respectively, to obtain a multidimensional space mask. Finally, the decoder restores interference to the time domain and outputs the estimated target echo using residual learning. Considering the characteristics of intra-pulse interference, we introduced the energy attention block (EAB) at the end of the DCBs and the ABs within our network. This addition ensures a heightened focus on extracting interference features. Furthermore, we implemented a curriculum learning strategy during the network training. This approach gradually acclimates the network to fit different types of retransmission interference, starting from simpler to more complex scenarios. Our extensive experiments, conducted under various conditions, have provided compelling evidence of the AGCT’s superior performance. Compared to the comparative network, the AGCT’s advantages are particularly pronounced under more harsh conditions, demonstrating its robustness and effectiveness.

Graphical Abstract

1. Introduction

The strategic advantage of electronic warfare [1] has proven pivotal in conflicts such as the Gulf war and the recent Russo-Ukrainian war. As the most effective electronic reconnaissance equipment today, radar has been widely used in a variety of military equipment. In remote sensing technology, the linear frequency modulation (LFM) signal application is particularly prominent [2,3]. An LFM signal can increase radio frequency (RF) pulse width and average transmit power while maintaining sufficient spectrum width. This configuration does not compromise the range resolution of radar and allows for significant system gains [4].
The widespread adoption of digital radio frequency memory (DRFM) [5,6] has given rise to interference techniques such as smeared spectrum (SMSP) [7,8], interrupted sampling repeater jamming (ISRJ) [9,10], and interrupted non-uniform sampling repeater jamming (INUSRJ) [11,12]. These methods generate numerous false targets near the actual target by retransmitting the intercepted radar signal segments, which poses a significant threat to radar detection. Consequently, suppressing intra-pulse retransmission interference has become a research hotspot in the field of radar signal processing.
Autocorrelation methods and spectral kurtosis maximization are utilized to estimate the periodicity, initial phase, and interference suppression factor of SMSP interference [13]. The parameters of the SMSP signal are estimated from the time–frequency (TF) distribution, followed by interference suppression through signal reconstruction [14]. Li et al. [15] also suppressed SMSP interference in the TF domain and effectively compensated for the target echo information lost during the interference suppression process. A fractional Fourier transform-based algorithm is applied, to suppress SMSP interference [16], capitalizing on the significant difference in chirp rates between the SMSP interference signal and the target echo. To address the edge estimation errors of SMSP interference, an approach combining various box filters and time domain deconvolution curves has been proposed [17].
A novel bandpass filter design uses TF analysis to enhance ISRJ suppression in LFM radar [18], significantly improving signal clarity and detection probability. In [19], an ISRJ cancellation algorithm was proposed that aligns the cancellation signal with the target echo, to enhance signal discrimination under overlapping jamming conditions. Wang et al. [20] proposed a scheme that suppresses ISRJ by jointly designing complementary sequences and receiving filters, which are optimized using a gradient-based solver and the Lagrange multiplier method. In [21], an algorithm was proposed for suppressing ISRJ in intra-pulse frequency modulation slope agile radar, utilizing fractional Fourier filtering. This approach leverages the interference’s distinct energy distribution characteristics to enhance the interference suppression’s effectiveness. Lu et al. [22] introduced a truncated matched filter method to suppress ISRJ in LFM radars by capitalizing on the distinct energy differences between interference and target echoes in the matched filter results.
INUSRJ, as an improved version of ISRJ [23], is often employed to interfere with inverse synthetic-aperture radar [24,25]. Wu et al. [26] proposed an interference suppression method combining the inter-pulse energy function with compressed-sensing technology.
However, the above suppression methods are model-driven, designed for specific types of interference, which may fail in complex real-world scenarios, due to model mismatches. With the advent of deep learning [27], its powerful fitting [28] and feature-extraction [29] capabilities have provided new solutions for different types of interference suppression issues. The classic encoder, mask estimator, and decoder structures in Conv-TasNet [30] have achieved excellent results in single-channel blind source separation of speech signals. Chen et al. [31] proposed an adaptive multi-scale residual auto-encoder to suppress interference in short-range detection systems. In [32], a complex-valued fully convolutional network was proposed to solve the interference mitigation problem of frequency-modulated continuous wave (FMCW) radar. In [33], the weights and activations of anti-interference networks were quantitatively discussed and analyzed.
Deep learning techniques have also been applied to address intra-pulse retransmission interference. Jiang et al. [34] utilized a series of auto-encoders to extract signal and RF features, followed by another auto-encoder to reconstruct radar signals. He et al. [35] proposed a multi-stage multi-domain joint anti-jamming depth network to suppress ISRJ. This network integrates U-Net and transformer architectures to execute interference suppression through a series of steps, including TF filtering, feature reconstruction, and residual reconstruction. In [36], a multi-residual encoder–decoder network (MRDENet) was designed to suppress intra-pulse retransmission interference and to analyze the network’s performance under complete and incomplete datasets.
To sum up, there are currently few studies on applying deep learning methods to solving various types of intra-pulse retransmission interference, and the characteristics of interference signals are ignored in network design. This paper provides a solution: an attention-guided complex-valued transformer (AGCT). The main contributions of this paper are as follows:
(1)
In this paper, a complex-valued network is utilized to align closely with complex-valued signals, incorporating a basic architecture of encoder, mask estimator, and decoder, which demonstrates superior performance in complex electromagnetic environments through extensive validation;
(2)
The design leverages attention blocks (ABs) that integrate both inter-pulse and intra-pulse attention for extracting large-scale interference characteristics, complemented by dilated convolution blocks (DCBs) responsible for the extraction of delicate multi-scale features, providing a robust foundation for interference reconstruction;
(3)
The energy attention blocks (EABs) play a crucial role in enhancing network performance. Integrated into both the ABs and the DCBs, they focus more on interference, thereby improving the network’s ability to handle complex electromagnetic environments. Additionally, the implementation of a curriculum learning strategy accelerates model fitting and enhances the network’s generalization capabilities.
The remainder of this paper is organized as follows: Section 2 describes the signal model; Section 3 proposes the AGCT and provides a detailed description of the system model; Section 4 presents and discusses the experiments and analysis; Section 5 concludes.
Notation: · T , · H , E ( · ) , var ( · ) , sum ( · ) , · 2 , ⊗, ⊙, ∘, ∗, · , vec ( · ) , unvec ( · ) , R ( · ) and I ( · ) denote the operations of transpose, conjugate transpose, mathematical expectation, variance computation, summation, Euclidean norm, Kronecker product, element-wise product, tensor multiplication, convolution, absolute, vectorization, matrixization, taking real part, and taking imaginary part, respectively; 0 and 1 refer to the zero vector and one vector, respectively.

2. Signal Model

This paper considers the challenge of single-channel intra-pulse retransmission interference suppression so that the received signal of the ith pulse can be expressed as
y i ( t ) = x i ( t ) + J i ( t ) + n i ( t ) ,
where x i ( t ) , J i ( t ) , and n i ( t ) are the target echo, retransmission interference signal, and noise of the ith pulse, respectively. In this paper, the target echo is the LFM signal, and the retransmission interference methods include SMSP, ISRJ, and INUSRJ. The target echo is given by
x i ( t ) = ϕ e j 2 π ( φ i + f c t + 0.5 k t 2 ) , φ i = f d ( i 1 ) f r , f d = 2 v f c c ,
where ϕ , f d , k, v, f c , f r , and c denote amplitude, Doppler frequency, chirp rate, target velocity, carrier frequency, pulse repetition frequency, and light velocity, respectively; φ i is the Doppler phase of the ith pulse.
The multi-pulse received signal Y C P × T can be expressed in the form of tensor multiplication as
Y = d ( x 1 + J 1 ) + N = X + J + N ,
where x 1 C 1 × T and J 1 C 1 × T are the target echo and interference signal of the first pulse; d = [ 1 , φ 2 , , φ P ] T C P × 1 , P, and T denote the Doppler phase vector, pulse samples, and pulse number, respectively; and X , J , and N are matrices of multi-pulse target echo, interference signal, and noise, respectively.
SMSP is a classic interference method for LFM. Its core content is to compress the intercepted target echo in the time direction and retransmit it R times, and the chirp rate of each sub-pulse is R multiples of the target echo. It can be expressed as
J smsp = 1 1 × R J s u b , J sub = ϕ J e j 2 π f c t ˙ + 0.5 k R t ˙ 2 , t ˙ 0 , 1 f s , , T R f s R ,
where J sub and ϕ J are the interference sub-pulse and the interference amplitude.
The essence of ISRJ involves repeatedly retransmitting multiple intercepted segments of the target echo, which can be formulated as
x seg 1 = x 1 t i 1 , , x 1 t e 1 , J ISRJ = 0 , 1 1 × R x seg 1 , 0 , , 0 , 1 1 × R x seg N , 0 ,
where x seg 1 and x seg N denote the first and the Nth intercepted segments, respectively. N, t i 1 , and t e 1 are the number of interceptions, the starting moment of the first segment, and the ending moment of the first segment, respectively.
INUSRJ is an advanced version of ISRJ. The main improvement is that the retransmission number of each intercepted segment is random, thus increasing the complexity of the interference. It can be expressed as
J INUSRJ = 0 , 1 1 × R 1 x seg 1 , 0 , , 0 , 1 1 × R N x seg N , 0 ,
where R 1 and R N denote the retransmissions numbers of the first and the Nth segment, respectively.
In Figure 1, the TF diagrams, time domain diagrams, and pulse compression results of the received signal interfered with by three types of retransmission interference (SMSP, ISRJ, INURSJ) are illustrated (jamming-to-signal ratio (JSR) = 20 dB, signal-to-noise ratio (SNR) = 0 dB). In Figure 1a–f, it is evident that under conditions of high-level noise and strong interference, the target echo is nearly drowned out in both the TF and time domains by noise and interference signals. Both SMSP and ISRJ are periodic interference methods, but the latter is more complicated than the former, due to retransmitting different target echo segments. In Figure 1g–i, the dense false targets generated by these three methods obscure the main lobe of the target echo, thereby degrading the detection performance of the radar.

3. System Model

3.1. Complex-Valued Network

Typically, previous research [34,35,36] has dealt with complex-valued signals by separating the real and imaginary parts, either by concatenating or by processing them through two channels. This approach treats the real and imaginary parts as independent, overlooking the inherent phase information of complex signals. Compared to real-valued networks, complex-valued networks offer certain advantages regarding network flexibility, extraction of correlated features between the imaginary and real parts of signals, and the mapping of signal feature transformations [37]. To address these issues, the proposed network adopts a complex-valued structure.
The critical difference between real-valued and complex-valued convolutional and fully connected layers is that the latter involves complex-valued trainable parameters [38,39]. When the input complex-valued feature tensor H passes through a complex-valued convolutional layer, it undergoes convolution with C o u t complex-valued weight tensors W 1 , , W C o u t , which can be expressed as
O [ : , i , : ] = W i H + B i = [ R ( W i ) + j I ( W i ) ] [ R ( H ) + j I ( H ) ] + [ R i ( B i ) + j I ( B i ) ] = [ R ( W i ) R ( H ) I ( W i ) I ( H ) + R ( B i ) ] + j [ I ( W i ) R ( H ) + R ( W i ) I ( H ) + J ( B i ) ] ,
where O and B denote the output complex-valued feature tensor and complex-valued bias tensor. The operation details are shown in Figure 2. Similarly, the operation of a complex-valued feature tensor passing through a complex-valued fully connected layer can be expressed as
O = W H + B = [ R ( W ) + j I ( W ) ] [ R ( H ) + j I ( H ) ] + [ R ( B ) + j I ( B ) ] , = [ R ( W ) R ( H ) I ( W ) I ( H ) + R ( B ) ] + j [ I ( W ) R ( H ) + R ( W ) I ( H ) + J ( B ) ] .
The operation of various common real-valued activation functions and complex-valued activation functions can be expressed as
ReLU ( h ) = max ( 0 , h ) , PReLU ( h ) = max ( κ h , h ) , Sigmoid ( h ) = 1 1 + e h , Tanh ( h ) = e h e h e h + e h , Softmax h = e h sum ( e H ) ,
C ReLU ( H ) = ReLU ( R ( H ) ) + j ReLU ( I ( H ) ) , C PReLU ( H ) = PReLU ( R ( H ) ) + j PReLU ( I ( H ) ) , C Sigmoid ( H ) = Sigmoid ( R ( H ) ) + j Sigmoid ( I ( H ) ) , C Tanh ( H ) = Tanh ( R ( H ) ) + j Tanh ( I ( H ) ) ,
where h and κ denote an element of H and a learnable parameter, respectively. These complex-valued activation functions involve separately applying nonlinear mappings to the real and imaginary parts of the complex-valued feature tensor. Layer normalization in transformers is a common normalization technique applied across the feature dimension. Standardizing each feature to have a mean of 0 and a variance of 1 enhances the model’s training efficiency and generalization ability, facilitating more stable and faster convergence during the training process. The complex-valued layer normalization procedure can be expressed as
C LayerNorm ( H ) = LayerNorm ( R ( H ) ) + j LayerNorm ( I ( H ) ) .
For simplicity in the following discussions, all components mentioned previously in the proposed network are in their complex-valued form.

3.2. Attention-Guided Complex-Valued Transformer

The network proposed in this paper utilizes the Doppler-shift information contained between different pulses by stacking multi-pulse received signals into one-dimensional tensors for network input as Y C B × 1 × P T , and B denotes batch size. The advantage of the transformer over convolutional neural networks (CNN) lies in its ability to extract the relationship of information in long sequences [40,41], which is crucial for suppressing intra-pulse retransmission interference. The schematic of the AGCT architecture is shown in Figure 3. The network consists of an encoder, a mask estimator, and a decoder. First, the encoder maps the long received sequence to a high-dimensional sparse space for representation. Then, the mask of intra-pulse interference in the sparse space is obtained through the mask estimator. Finally, the decoder restores the estimated intra-pulse interference to the time domain, and a residual connection is applied to achieve interference suppression.
(1)
Encoder: The encoder is a one-dimensional convolutional layer and a PReLU layer, which performs convolution on a received sequence Y using C filters of length k 1 with stride of k 1 / 2 and nonlinear activation. This process generates a high-dimensional sparse representation D C B × C × L as
D = PReLU ( EncodingConv ( Y ) ) .
This approach effectively captures the essential features of the signal for further processing and analysis. In contrast to short-time Fourier transform with fixed basis functions, a convolutional encoder can learn more adaptive representations for feature extraction through training [30].
(2)
Mask estimator: At the beginning of the mask estimator, similar to many transformer models, the normalized D undergoes position encoding to imbue the sparse representation with position information. A pointwise convolution, serving as a bottleneck layer, adjusts the number of channels for transmitting features in the mask estimator and enhances the model’s performance.
The core of the mask estimator consists of u 1 DCBs and u 2 ABs. The DCBs focus on capturing finer multi-scale details, while the ABs are designed to extract large-scale information from interference.
The feature tensor is repeated r times through the DCB group with gradually increasing dilation factors 2 0 , 2 1 , , 2 u 1 . Each element of the final output feature tensor integrates extensive sequence information from the input feature tensor, ensuring comprehensive representation across the network. The detailed structure of the DCBs is illustrated in Figure 4a. The dilated depthwise convolution layer significantly increases the network’s receptive field, while the pointwise convolution layer enhances the network’s depth, collectively improving the overall functionality of the network. In the DCBs, the number of channels is consistently maintained at C, with a depthwise convolution kernel length of k 2 . The same padding is employed to preserve the length of the sequence.
To effectively mask target signals, interference often has significantly more vital energy than the target echo, even in high-dimensional feature space where the interference regions exhibit higher energy levels. However, traditional anti-interference networks often overlook this energy distribution information. Therefore, we have incorporated an EAB at the end of the DCB, enabling the network to capture interference information better. This design prioritizes salient features across the sequence and channel dimensions, as depicted in Figure 4b. The structure of both branches is fundamentally the same. However, the feature tensor needs to be transposed before entering the channel branch. Adaptive average pooling is employed to amalgamate global information across another dimension, to produce an initial attention vector. This vector then passes through two depthwise convolution layers, generating a weight vector via a sigmoid layer. The process can be formulated as
S W = Sigmoid σ s 2 PReLU σ s 1 1 C i = 1 C | I F T | , C W = Sigmoid σ c 2 PReLU σ c 1 1 L i = 1 L I F T T ,
where IFT C B × C × L , SW C B × 1 × L , CW C B × C × 1 , and σ · denote the input feature tensor, sequence weight vector, channel weight vector, and depthwise convolution operation. The convolution kernel lengths of the above four depthwise convolutional layers are all k 3 . These two weight vectors are multiplied to generate an energy weight tensor EW C B × C × L . This tensor is then element-wise multiplied with IFT to produce the output feature tensor OFT C B × C × L as
OFT = IFT CW SW = IFT EW .
The EAB assigns higher weights to high-energy elements, enabling the network to clearly identify which sequence positions and channels to focus on. The output of the DCB branches into two paths: one employs a skip connection to transport gradients and transmit features to the next DCB efficiently. The other path accumulates feature tensors from the EAB across the DCBs with varying dilation factors, continuously integrating features of different scales.
The data flows in the proposed network are all three-dimensional. The first dimension is the batch size, and the last two are the number of channels and the sequence length. Therefore, the transpose operation mentioned in this paper transposes the second and third dimensions.
In this paper, the structure of the ABs is consistent, as depicted in Figure 4c. Each AB consists of four ECBs, fusion attention, and an EAB. The detailed structure of the ECB is shown in Figure 4d. To align with its configuration, the transpose operation needs to be performed before the feature tensor is input to the ABs. The fully connected layer is employed to adjust the output feature channels followed by dropout to prevent overfitting. Subsequently, the feature tensor passes through a depthwise convolution layer with a kernel length of k 4 , to enhance the receptive field and preserve fine features. The process concludes with a skip connection for output.
Upon entering the AB, the feature tensor Z C B × L × C is processed through ECB qk to generate U C B × L × θ , which then undergoes offset and scaling operations to produce the query Q C B × L × θ and key K C B × L × θ components essential for the attention mechanism. Parallel to this process, Z is also mapped through ECB v to obtain value V C B × L × E . θ and E, which denote the output channel numbers from the fully connected layers of ECB qk and ECB v , respectively. In this paper, L is significantly greater than θ and E.
The self-attention mechanism [40] can be formulated as
A s = Softmax Q K θ V .
The entire process requires L 2 θ + L 2 E multiplication operations. When dealing with feature tensors of long sequence lengths where L is large, the computational cost becomes significantly expensive.
Inspired by the low-complexity mixed chunk attention in [42,43], integrating inter-pulse attention with intra-pulse attention has been implemented to enhance feature extraction from interference. To ensure the feature sequence length is evenly divisible into P parts, padding operations are applied to Q , K , and V to extend their sequence lengths to L . Figure 5 illustrates the schematic of the fusion attention. Inter-pulse attention A can be calculated as
A = Q 1 L K T V .
A C B × L × E considers the long dependency relationships between pulses from a global perspective. Q , K , and V are each divided into P sub-tensors with sequence length M, which are used to calculate the intra-pulse attention as
A p = ReLU 2 1 M Q p K p T V p , A = A 1 , A 2 , , A P ,
where Q p C B × M × θ , K p C B × M × θ , V p C B × M × E , and A p C B × M × E represent the query, key, value, and attention tensor corresponding to the pth pulse, respectively, and where ReLU 2 ( · ) denotes the squared complex-valued ReLU operation. A C B × L × E considers the fine dependencies within each pulse from a local perspective. The integration of these two attention tensors can be expressed as
A = A [ : , 1 : L , : ] + A [ : , 1 : L , : ] .
The multiplication operation count of the fusion attention is 2 L θ E + M 2 θ P + M 2 E P , which is cheaper than (15).
The gating module consists of ECB 1 and ECB 2 , which restore the channel numbers of A C B × L × E and V back to C, respectively. V C B × L × C is activated through a sigmoid function and then element-wise multiplied with V C B × L × C to produce V C B × L × C . Similarly to the DCB, the EAB and skip connection are added at the end of the AB to improve the performance of the network in extracting interference features. This process can be formulated as
Z = EAB Sigmoid ECB 1 ( A ) ECB 2 ( V ) + Z = EAB V V + Z = EAB V + Z .
In the AB group, a serial structure is adopted, where each AB’s input is the output from the previous AB. The output of the last AB is transposed and merged with the multi-scale features from the DCB group through addition. The merged features incorporate the fine details of the interference at smaller scales and the extensive information at larger scales. The merged features pass through a gating unit composed of four pointwise convolution layers and activation functions to generate a high-dimensional interference feature mask M C B × C × L . This mask is then element-wise multiplied with D to estimate the representation of interference in the high-dimensional feature space G C B × C × L , which can be expressed as
G = D M .
(3)
Decoder: The decoder is a one-dimensional transposed convolutional. It is the inverse transformation of the encoder, which restores high-dimensional representation to a one-dimensional time sequence as
X ^ = Y DecodingConv ( G ) = Y J ^ ,
where X ^ C B × 1 × P T and J C B × 1 × P T denote the output of the network and the estimated intra-pulse interference, respectively. Therefore, the encoder and decoder parameters are consistent, to ensure consistency in the encoding and decoding processes. Then, X ^ is a performed matrixization operation to obtain the multi-pulse estimated target echo X ^ C B × P × T = unvec ( X ^ ) .

4. Experiments and Analysis

The experimental setup includes a Windows 10 operating system, an AMD Ryzen 7 5800X 8-Core Processor, an NVIDIA RTX 3090 GPU, and 32 GB of RAM. The AGCT used in these experiments is implemented using PyTorch 2.1.2.

4.1. Dataset

The critical parameters of each signal in the system are listed in Table 1. Initially, 20,000 target echo samples were randomly generated within the specified chirp rate and target velocity ranges. Gaussian white noise was then randomly added to these samples within the range of −60 dB to 0 dB. Three types of retransmission interference—SMSP, ISRJ, and INURSJ—were added to each noisy sample, and the level of JSR ranged from −10 dB to 40 dB. The dataset was meticulously divided into a training set and a validation set at a ratio of 5:1, ensuring a comprehensive representation of the data.
Next, 1000 chirp rates were evenly selected within the range of [−30:3] GHz/s and [3:30] GHz/s, to generate target echo samples. These samples were then added to noise and three types of interference signals under each SNR [−60:5:0 dB] and JSR [−10:5:45 dB], to create the test set for this paper.
The training, validation, and test sets had 50,000, 10,000, and 156,000 samples, respectively.
The noisy interfered-with samples were vectorized and normalized to accelerate the training process and enhance the network’s ability to fit the model. The normalization process can be expressed as
Y = vec ( Y ) E ( vec ( Y ) ) var ( vec ( Y ) ) .

4.2. Evaluation Metrics and Loss Function

In this paper, the root mean of the square error (RMSE) ζ , the correlation coefficient ψ , and the detection probability χ are used as evaluation metrics, which can be expressed as
ζ = E vec ( X ) X ^ 2 ψ = | vec ( X ) X ^ H | vec ( X ) 2 2 X ^ 2 2 , χ = ϖ s ϖ t ,
where ϖ s and ϖ t denote the number of successful and total detections, respectively. The closer the value of ζ is to 0, the less error during the recovery process of the target echo, suggesting a more accurate restoration. Similarly, the value of ψ closer to 1 indicates a higher similarity between the estimated target echo and the actual target echo. This research aims to enhance target-detection performance by suppressing retransmission interference, with detection probability [44,45] serving as a direct metric for assessing target-detection performance.
We propose a weighted correlation coefficient as the loss function, which continuously optimizes the network through training, to achieve effective interference suppression. It can be expressed as
ψ i = vec ( Y X ) vec ( Y ) X ^ H vec ( Y X ) 2 2 vec ( Y ) X ^ 2 2 , ρ = vec ( X ) 2 2 vec ( Y X ) 2 2 + vec ( X ) 2 2 , loss = ρ ψ + ( 1 ρ ) ψ i ,
where ψ i is the correlation coefficient of the irrelevant components, and where ρ is the weight assigned to ψ ; ψ provides phase information guidance for the recovery of the target echo. After supplementing ψ 2 , the amplitude of the target echo can be effectively estimated. By assigning weights, the contribution of each component in the loss function can be meticulously balanced.

4.3. Training Setup

The hyperparameter settings of the network are detailed in Table 2. We used Adam as the optimizer, with an initial learning rate of 0.001, and we employed the ReduceLROnPlateau strategy to adjust the learning rate. The learning rate was halved automatically if there was no decrease in the loss function over three consecutive epochs. The batch size was set to 6.
Curriculum learning [46,47], a classic training strategy, involves training the network initially on simpler data and gradually progressing to more complex data. In the task of interference suppression, especially under low SNR conditions where noise can destroy or even obscure both target echoes and interference signals, this poses significant challenges in feature extraction. In Section 2, we analyzed three types of interference: SMSP, ISRJ, and INUSRJ. Due to their periodicity and randomness differences, the interference complexity increases in turn. Curriculum learning is employed in the network training process to enhance training efficiency and network generalization. Based on SNR levels and interference types, samples are progressively added to the training set and validation set.

4.4. Experiments

(1)
SMSP: Figure 6 shows the range–Doppler (RD) [48] results before and after SMSP interference suppression under SNR = −60 dB and JSR = 45 dB. The addition of strong SMSP interference and noise raised the RD clutter floor, obscuring the target’s range information, though a row of peaks remains evident at f d = 266.85 Hz. Figure 6c shows the RD result after AGCT interference suppression. It can be seen that the AGCT effectively eliminated most of the interference and noise and obtained clean RD results similar to Figure 6a. From the perspective of the evaluation metrics, ζ and ψ of the multi-pulse received signal in Figure 6b and the multi-pulse estimated target echo in Figure 6c were 0.5268, 0.0389, 0.2009, and 0.9569, respectively. These demonstrate that the AGCT can effectively extract the characteristics of the target echo from the interference and noise background and achieve a relatively ideal recovery effect. In order to analyze the interference suppression effect more intuitively, the cell-averaging constant false alarm rate (CA-CFAR) algorithm was applied to the RD results of Figure 6a–c, with the detection results displayed in Figure 6d–f. In Figure 6e, many false target peaks were generated near the actual target but remained below the CFAR threshold, indicating that interference destroyed the radar’s detection capability. Conversely, Figure 6d,f both present distinct main lobes at the 0 μ s, with peak sidelobe ratios (PSLR) of −13.4388 dB and −12.1681 dB, respectively, both above the CFAR threshold, effectively detecting the target.
To further validate the interference suppression performance of the AGCT, Figure 7 shows the evaluation metrics of the AGCT and the MRDENet in the SMSP interference test set. Both networks showed performance degradation under low SNR conditions, due to high noise levels that obscured the interference signal and target echo, complicating the feature extraction. However, the interference suppression performance would be improved under high JSR conditions. SMSP interference has extremely strong periodicity. An increase in interference power would strengthen the characteristics of SMSP interference, which benefits the network’s extraction of interference features, thereby achieving better results. Comparatively, the AGCT consistently outperforms the MRDENet across most conditions, especially at low SNR levels. Here, χ higher than 0.8 was considered as effective detection. The lower bound of the AGCT to achieve effective detection is JSR + SNR = −30 dB, while the lower bound of the MRDENet is −20 dB. This shows that the AGCT can achieve effective interference suppression under harsher conditions.
(2)
ISRJ: Figure 8 demonstrates the RD results before and after ISRJ suppression when SNR was −25 dB and JSR was 45 dB. From Figure 8b,c, it can be seen that the AGCT significantly mitigated the adverse effects of irrelevant signals, restoring the Doppler and range information of the target; ζ and ψ of the multi-pulse estimated target echo were 0.2331 and 0.9069, respectively, which were improvements of 0.2936 and 0.8959, respectively, compared with the multi-pulse received signal. In Figure 8e, the actual target was obscured by the retransmission interference, so the CFAR algorithm could not detect the target. The PSLR of Figure 8f was −11.2026 dB, which was an increase of 2.2362 dB compared to Figure 8d, and both successfully achieved target detection.
The performance of ISRJ suppression under various conditions is displayed in Figure 9. Contrary to SMSP interference, higher ISRJ power leads to poorer suppression outcomes. The interference mechanism of ISRJ is the retransmission of intercepted target echo segments. The interference does not contain all target echo information, which limits its utility in aiding the recovery of target echo. Additionally, the truncation of multiple segments creates boundary effects that hinder the network’s feature extraction. Increased interference power negatively affects target detection post-interference suppression. The AGCT effectively suppressed ISRJ under conditions with SNR above −30 dB and JSR not exceeding 45 dB. Especially under the higher SNR conditions on the right side of Figure 9b, ζ and ψ of the multi-pulse estimated target echo could reach levels below 0.05 and above 0.99, respectively. Under the same conditions, the MRDENet’s interference suppression was less effective than the AGCT’s. Due to ISRJ’s higher complexity compared to SMSP, both networks demonstrated less effective suppression of ISRJ than SMSP.
(3)
INUSRJ: Figure 10 shows the RD results related to INUSRJ suppression when the SNR was −25 dB and the JSR was 45 dB. It can be clearly seen from Figure 10c that the AGCT achieved a terrific interference suppression effect; ζ and ψ of the multi-pulse estimated target echo were 0.2922 and 0.8191, respectively. Compared with the multi-pulse received signal, the improvements were 0.2302 and 0.8039, respectively. Contrary to the detection failure result in Figure 10e, the RD value at the 0 μ s in Figure 10f was higher than the CFAR threshold and was successfully detected, with a PSLR of −11.0158 dB. Unlike the results in Figure 6f, where the pulse compression closely restored the original pulse structure after suppressing SMSP interference, the outcomes in Figure 8f and Figure 10f exhibit various degrees of deformation. This indicates that remnants of ISRJ and INUSRJ still affected the multi-pulse estimated target echoes after undergoing AGCT interference suppression.
Comparing Figure 9 and Figure 11, it is observable that both networks experienced some performance degradation under INUSRJ relative to ISRJ. The performance under both interference types correlated negatively with the interference power, consistent with the analysis in Section 2. The random retransmission characteristic of INUSRJ increases interference complexity, naturally raising the difficulty for networks to fit the interference. From Figure 11c, the AGCT effectively suppressed interference under conditions where SNR was above −30 dB and JSR was not higher than 45 dB, similar to Figure 9c. However, ψ in Figure 9b surpassed those in Figure 11b under the same conditions. In Figure 11f, the MRDENet could effectively suppress interference only under high SNR and low JSR conditions, which further verified the noise robustness of the AGCT.
The number of network parameters and the inference time of the AGCT were 7.05 M and 175 ms, respectively, while the number of network parameters and the inference time of the MRDENet were 20.00 M and 51 ms, respectively. Although the AGCT is lighter than the MRDENet, its sophisticated attention mechanisms lead to longer inference times. However, considering the balance between performance and efficiency, these time costs are worthwhile.

5. Conclusions

This paper proposes the AGCT to suppress intra-pulse retransmission interference in electronic countermeasure. The AGCT adopts the structure of a complex-valued network to fit the model of complex-valued signals. Its main structures include an encoder, mask estimator, and decoder. In the mask estimator, the DCB group focuses on extracting the more delicate multi-scale details of the interference. In contrast, the AB group combines inter-pulse and intra-pulse attention, to obtain the large-scale information of the interference. An ECB integrated into DCBs and ABs can further improve the feature extraction capability for strong interference. The interference is suppressed through residual learning, and the multi-pulse estimated target echo is obtained. Extensive experiments under various SNR and JSR conditions validated the effectiveness of the AGCT in suppressing multiple types of intra-pulse retransmission interference. For SMSP with an SNR of −60 dB and a JSR of 45 dB, the AGCT achieved a low RMSE of 0.5268 and a high correlation coefficient of 0.9569. ISRJ, with an SNR of −25 dB and a JSR of 45 dB, achieved an RMSE of 0.2331 and a correlation coefficient of 0.9069. INUSRJ, with an SNR of −25 dB and a JSR of 45 dB, achieved an RMSE of 0.2922 and a correlation coefficient of 0.8191. Under the same SNR and JSR conditions mentioned above, the AGCT and the MRDENet were used to suppress the three types of interference, and the detection probability of the former was 0.021, 0.840, and 0.857 higher than the latter, respectively. The AGCT demonstrated superior performance compared to the MRDENet, making it a promising solution for complex electromagnetic environments. In the future, we aim to further enhance the AGCT’s ability to handle a wider range of interference types.

Author Contributions

Y.W.: investigation, methodology, software, writing—original draft; Y.L. (Yibing Li): supervision, formal analysis, project administration; Z.Z.: visualization; G.Y.: writing—review and editing; Y.L. (Yingsong Li): conceptualization. All authors have read and agreed to the published version of the manuscript.

Funding

This paper was supported by the Foundation of National Defense Key Laboratory (2021-JCJQ-LB-066-12), the National Natural Science Foundation of China (No. 52271311), and the Heilongjiang Touyan Innovation Team Program.

Data Availability Statement

The datasets presented in this paper are not readily available because the data are part of an ongoing study.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
FMCWfrequency-modulated continuous wave
LFMlinear frequency modulation
RFradio frequency
DRFMdigital radio frequency memory
SMSPsmeared spectrum
ISRJinterrupted sampling repeater jamming
INUSRJinterrupted non-uniform sampling repeater jamming
TFtime–frequency
MRDENetmulti-residual encoder–decoder network
AGCTattention-guided complex-valued transformer
CNNconvolutional neural networks
ABattention block
DCBdilated convolution block
EABenergy attention blocks
ECBenhanced convolution blocks
JSRjamming-to-signal ratio
SNRsignal-to-noise ratio
RDrange–Doppler

References

  1. Spezio, A.E. Electronic warfare systems. IEEE Trans. Microw. Theory Tech. 2002, 50, 633–644. [Google Scholar] [CrossRef]
  2. Zaugg, E.C.; Long, D.G. Theory and application of motion compensation for lfm-cw sar. IEEE Trans. Geosci. Remote Sens. 2008, 46, 2990–2998. [Google Scholar] [CrossRef]
  3. Li, P.; Zhang, Y.; Yao, J. Rapid linear frequency swept frequency-modulated continuous wave laser source using iterative pre-distortion algorithm. Remote Sens. 2022, 14, 3455. [Google Scholar] [CrossRef]
  4. Lewis, B.L.; Kretschmer, F.F. Linear frequency modulation derived polyphase pulse compression codes. IEEE Trans. Aerosp. Electron. Syst. 1982, 5, 637–641. [Google Scholar] [CrossRef]
  5. Berger, S.D. Digital radio frequency memory linear range gate stealer spectrum. IEEE Trans. Aerosp. Electron. Syst. 2003, 39, 725–735. [Google Scholar] [CrossRef]
  6. Han, B.; Qu, X.; Yang, X.; Zhang, Z.; Li, W. Drfm repeater jamming suppression method based on joint range-angle sparse recovery and beamforming for distributed array radar. Remote Sens. 2023, 15, 3449. [Google Scholar] [CrossRef]
  7. Li, X.; Wang, C.; Yuan, H.; Shi, J. Smeared spectrum jamming suppression based on time unit analysis and polarization cancellation. Clust. Comput. 2019, 22, 14367–14375. [Google Scholar] [CrossRef]
  8. Wang, Y.; Li, Y.; Yu, G.; Geng, X.; Zhou, Z. A chirplet-based masking algorithm for smeared spectrum jamming suppression and signal separation. IET Radar Sonar Navig. 2024. [Google Scholar] [CrossRef]
  9. Wang, X.; Liu, J.; Zhang, W.; Fu, Q.; Liu, Z.; Xie, X. Mathematic principles of interrupted-sampling repeater jamming (isrj). Sci. China Ser. Inf. Sci. 2006, 36, 891–901. [Google Scholar] [CrossRef]
  10. Zhou, K.; Li, D.; Su, Y.; Liu, T. Joint design of transmit waveform and mismatch filter in the presence of interrupted sampling repeater jamming. IEEE Signal Process. Lett. 2020, 27, 1610–1614. [Google Scholar] [CrossRef]
  11. Wu, Q.; Liu, J.; Wang, J.; Zhao, F.; Xiao, S. Improved active echo cancellation against synthetic aperture radar based on nonperiodic interrupted sampling modulation. IEEE Sens. J. 2018, 18, 4453–4461. [Google Scholar] [CrossRef]
  12. Luo, Z.; Li, J.; Dong, X.; Sun, J. Research on non-uniform interrupted sampling repeater jamming for phase coded radar. J. Phys. Conf. Ser. 2022, 2209, 012004. [Google Scholar] [CrossRef]
  13. Xin, L.; Chunyang, W.; Hui, Y.; Shanshan, J. Smsp jamming suppression method based on jamming reconstruction and kurtosis maximum. J. Beijing Univ. Aeronaut. Astronaut. 2018, 44, 1176–1184. [Google Scholar]
  14. Wu, C.; Chen, B.; Yang, M.; Dong, M. A study on parameter estimation and suppression for smeared spectrum jamming based on short-time fourier transform. Eurasip J. Wirel. Commun. Netw. 2020, 2020, 115. [Google Scholar] [CrossRef]
  15. Zeng, L.; Chen, H.; Zhang, Z.; Liu, W.; Wang, Y.; Ni, L. Cutting compensation in the time-frequency domain for smeared spectrum jamming suppression. Electronics 2022, 11, 1970. [Google Scholar] [CrossRef]
  16. Baher Safa Hanbali, S. Countering self-protection smeared spectrum jamming against chirp radars. IET Radar Sonar Navig. 2021, 15, 382–389. [Google Scholar] [CrossRef]
  17. Han, B.; Qu, X.; Yang, X.; Li, W.; Zhang, Z. Drfm-based repeater jamming reconstruction and cancellation method with accurate edge detection. Remote Sens. 2023, 15, 1759. [Google Scholar] [CrossRef]
  18. Chen, J.; Wu, W.; Xu, S.; Chen, Z.; Zou, J. Band pass filter design against interrupted-sampling repeater jamming based on time-frequency analysis. IET Radar Sonar Navig. 2019, 13, 1646–1654. [Google Scholar] [CrossRef]
  19. Hanbali, S.B.S. Technique to counter improved active echo cancellation based on isrj with frequency shifting. IEEE Sens. J. 2019, 19, 9194–9199. [Google Scholar] [CrossRef]
  20. Wang, F.; Li, N.; Pang, C.; Li, C.; Li, Y.; Wang, X. Complementary sequences and receiving filters design for suppressing interrupted sampling repeater jamming. IEEE Geosci. Remote Sens. Lett. 2022, 19, 1–5. [Google Scholar] [CrossRef]
  21. Wang, X.; Li, B.; Liu, W.; Chen, H.; Zhu, Y.; Ni, M. Anti-interrupted sampling repeater jamming based on intra-pulse frequency modulation slope agile radar waveform joint frft. Digit. Signal Process. 2024, 147, 104418. [Google Scholar] [CrossRef]
  22. Lu, L.; Gao, M. A truncated matched filter method for interrupted sampling repeater jamming suppression based on jamming reconstruction. Remote Sens. 2021, 14, 97. [Google Scholar] [CrossRef]
  23. Sun, Z.; Quan, Y.; Liu, Z. A non-uniform interrupted-sampling repeater jamming method for intra-pulse frequency agile radar. Remote Sens. 2023, 15, 1851. [Google Scholar] [CrossRef]
  24. Wu, Q.; Zhao, F.; Ai, X.; Liu, X.; Xiao, S. Two-dimensional blanket jamming against isar using nonperiodic isrj. IEEE Sens. J. 2019, 19, 4031–4038. [Google Scholar] [CrossRef]
  25. Liu, Z.-D.; Zhang, Q.; Li, G.-M.; Li, K.-M.; Wang, D. Improved blanket jamming against isar based on nonperiodic interrupted sampling modulation. IEEE Sens. J. 2020, 21, 430–437. [Google Scholar] [CrossRef]
  26. Qihua, W.; Feng, Z.; Tiehua, Z.; Xiaobin, L.; Zhiming, X.; Shunping, X. Nonperiodic interrupted sampling repeater jamming suppression for inverse synthetic aperture radar. J. Syst. Eng. Electron. 2024. [Google Scholar] [CrossRef]
  27. LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef] [PubMed]
  28. Zha, H.; Wang, H.; Feng, Z.; Xiang, Z.; Yan, W.; He, Y.; Lin, Y. Lt-sei: Long-tailed specific emitter identification based on decoupled representation learning in low-resource scenarios. IEEE Trans. Intell. Transp. Syst. 2023, 25, 929–943. [Google Scholar] [CrossRef]
  29. Luo, K.; Zhu, J.; Li, Z.; Zhu, H.; Li, Y.; Hu, R.; Fan, T.; Chang, X.; Zhuang, L.; Yang, Z. Ultrasonic lamb wave damage detection of cfrp composites using the bayesian neural network. J. Nondestruct. Eval. 2024, 43, 48. [Google Scholar] [CrossRef]
  30. Luo, Y.; Mesgarani, N. Conv-tasnet: Surpassing ideal time–frequency magnitude masking for speech separation. IEEE/ACM Trans. Audio Speech Lang. Process. 2019, 27, 1256–1266. [Google Scholar] [CrossRef] [PubMed]
  31. Chen, K.; Zhang, J.; Chen, S.; Zhang, S.; Zhao, H. Active jamming mitigation for short-range detection system. IEEE Trans. Veh. 2023, 72, 11446–11457. [Google Scholar] [CrossRef]
  32. Wang, J.; Li, R.; He, Y.; Yang, Y. Prior-guided deep interference mitigation for fmcw radars. IEEE Trans. Geosci. Remote Sens. 2022, 60, 1–16. [Google Scholar] [CrossRef]
  33. Rock, J.; Roth, W.; Toth, M.; Meissner, P.; Pernkopf, F. Resource-efficient deep neural networks for automotive radar interference mitigation. IEEE J. Sel. Top. Signal Process. 2021, 15, 927–940. [Google Scholar] [CrossRef]
  34. Jiang, Y.; Yang, Y.; Zhang, W.; Guo, L. Deep learning-based active jamming suppression for radar main lobe. IET Signal Process. 2024, 2024, 3179667. [Google Scholar] [CrossRef]
  35. He, X.; Liao, K.; Peng, S.; Tian, Z.; Huang, J. Interrupted-sampling repeater jamming-suppression method based on a multi-stages multi-domains joint anti-jamming depth network. Remote Sens. 2022, 14, 3445. [Google Scholar] [CrossRef]
  36. Wang, H.; Chen, B.; Ye, Q.; Huang, F. Mrednet: A multi-residual encoder-decoder network for recovering lfm interfered by intra-pulse retransmission interferences. Signal Process. 2024, 217, 109329. [Google Scholar] [CrossRef]
  37. Tu, Y.; Lin, Y.; Hou, C.; Mao, S. Complex-valued networks for automatic modulation classification. IEEE Trans. Veh. 2020, 69, 10085–10089. [Google Scholar] [CrossRef]
  38. Choi, H.-S.; Kim, J.-H.; Huh, J.; Kim, A.; Ha, J.-W.; Lee, K. Phase-aware speech enhancement with deep complex u-net. In Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada, 30 April–3 May 2018. [Google Scholar]
  39. Wang, Y.; Li, Y. Attention-guided complex denoising network for automatic modulation recognition. Phys. Commun. 2023, 56, 101964. [Google Scholar] [CrossRef]
  40. Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, L.; Polosukhin, I. Attention is all you need. Adv. Neural Inf. Process. Syst. 2017, 30. [Google Scholar]
  41. Han, K.; Wang, Y.; Chen, H.; Chen, X.; Guo, J.; Liu, Z.; Tang, Y.; Xiao, A.; Xu, C.; Xu, Y.; et al. A survey on vision transformer. IEEE Trans. Pattern Anal. Mach. Intell. 2022, 45, 87–110. [Google Scholar] [CrossRef]
  42. Hua, W.; Dai, Z.; Liu, H.; Le, Q. Transformer quality in linear time. In Proceedings of the International Conference on Machine Learning, Baltimore, MD, USA, 25–27 July 2022; pp. 9099–9117. [Google Scholar]
  43. Zhao, S.; Ma, B. Mossformer: Pushing the performance limit of monaural speech separation using gated single-head transformer with convolution-augmented joint self-attentions. In Proceedings of the ICASSP 2023—2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece, 4–10 June 2023; pp. 1–5. [Google Scholar]
  44. Ma, J.; Jiang, J. Compressive subspace detectors based on sparse representation in multistatic passive radar systems. IEEE Trans. Signal Process. 2022, 70, 5074–5086. [Google Scholar] [CrossRef]
  45. Ma, J.; Li, H.; Gan, L. Order-statistic based target detection with compressive measurements in single-frequency multistatic passive radar. Signal Process. 2023, 203, 108785. [Google Scholar] [CrossRef]
  46. Matiisen, T.; Oliver, A.; Cohen, T.; Schulman, J. Teacher-student curriculum learning. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 3732–3740. [Google Scholar] [CrossRef] [PubMed]
  47. Wang, X.; Chen, Y.; Zhu, W. A survey on curriculum learning. IEEE Trans. Pattern Anal. Mach. Intell. 2021, 44, 4555–4576. [Google Scholar] [CrossRef] [PubMed]
  48. Wang, H.; Chen, B.; Zhu, D.; Huang, F.; Yu, X.; Ye, Q.; Cheng, X.; Peng, S.; Jing, J. Chaff identification method based on range-doppler imaging feature. IET Radar Sonar Navig. 2022, 16, 1861–1871. [Google Scholar] [CrossRef]
Figure 1. TF diagrams, time domain diagrams, and pulse compression results of various interfered-with signals (JSR = 20 dB, SNR = 0 dB): (a,d,g) SMSP (R = 4); (b,e,h) ISRJ (R = 4, N = 4); (c,f,i) INUSRJ ( R = [2, 5, 4, 4], N = 4).
Figure 1. TF diagrams, time domain diagrams, and pulse compression results of various interfered-with signals (JSR = 20 dB, SNR = 0 dB): (a,d,g) SMSP (R = 4); (b,e,h) ISRJ (R = 4, N = 4); (c,f,i) INUSRJ ( R = [2, 5, 4, 4], N = 4).
Remotesensing 16 01989 g001
Figure 2. Schematic diagram of complex-valued convolutional layer.
Figure 2. Schematic diagram of complex-valued convolutional layer.
Remotesensing 16 01989 g002
Figure 3. Schematic of an attention-guided complex transformer architecture.
Figure 3. Schematic of an attention-guided complex transformer architecture.
Remotesensing 16 01989 g003
Figure 4. The detailed structure of the blocks: (a) Dilated convolution block (DCB). (b) Energy attention block (EAB). (c) Attention block (AB). (d) Enhanced convolution block (ECB).
Figure 4. The detailed structure of the blocks: (a) Dilated convolution block (DCB). (b) Energy attention block (EAB). (c) Attention block (AB). (d) Enhanced convolution block (ECB).
Remotesensing 16 01989 g004
Figure 5. The schematic of the fusion attention.
Figure 5. The schematic of the fusion attention.
Remotesensing 16 01989 g005
Figure 6. Range-Doppler result of SMSP interference suppression (SNR = −60 dB, JSR = 45 dB, f d = 266.85 Hz): (a) Range–Doppler result of multi-pulse target echo. (b) Range–Doppler result of multi-pulse received signal. (c) Range–Doppler result of multi-pulse estimated target echo. (d) Detection result of (a) at f d . (e) Detection result of (b) at f d . (f) Detection result of (c) at f d .
Figure 6. Range-Doppler result of SMSP interference suppression (SNR = −60 dB, JSR = 45 dB, f d = 266.85 Hz): (a) Range–Doppler result of multi-pulse target echo. (b) Range–Doppler result of multi-pulse received signal. (c) Range–Doppler result of multi-pulse estimated target echo. (d) Detection result of (a) at f d . (e) Detection result of (b) at f d . (f) Detection result of (c) at f d .
Remotesensing 16 01989 g006
Figure 7. The performance of SMSP interference suppression under various conditions: (a) ζ (AGCT). (b) ψ (AGCT). (c) χ (AGCT). (d) ζ (MRDENet). (e) ψ (MRDENet). (f) χ (MRDENet).
Figure 7. The performance of SMSP interference suppression under various conditions: (a) ζ (AGCT). (b) ψ (AGCT). (c) χ (AGCT). (d) ζ (MRDENet). (e) ψ (MRDENet). (f) χ (MRDENet).
Remotesensing 16 01989 g007
Figure 8. Range–Doppler result of ISRJ suppression (SNR = −25 dB, JSR = 45 dB, f d = 266.85 Hz): (a) Range–Doppler result of multi-pulse target echo. (b) Range–Doppler result of multi-pulse received signal. (c) Range–Doppler result of multi-pulse estimated target echo. (d) Detection result of (a) at f d . (e) Detection result of (b) at f d . (f) Detection result of (c) at f d .
Figure 8. Range–Doppler result of ISRJ suppression (SNR = −25 dB, JSR = 45 dB, f d = 266.85 Hz): (a) Range–Doppler result of multi-pulse target echo. (b) Range–Doppler result of multi-pulse received signal. (c) Range–Doppler result of multi-pulse estimated target echo. (d) Detection result of (a) at f d . (e) Detection result of (b) at f d . (f) Detection result of (c) at f d .
Remotesensing 16 01989 g008
Figure 9. The performance of ISRJ suppression under various conditions: (a) ζ (AGCT). (b) ψ (AGCT). (c) χ (AGCT). (d) ζ (MREDNet). (e) ψ (MREDNet). (f) χ (MREDNet).
Figure 9. The performance of ISRJ suppression under various conditions: (a) ζ (AGCT). (b) ψ (AGCT). (c) χ (AGCT). (d) ζ (MREDNet). (e) ψ (MREDNet). (f) χ (MREDNet).
Remotesensing 16 01989 g009
Figure 10. Range–Doppler result of INUSRJ suppression (SNR = −25 dB, JSR = 45 dB, f d = 266.85 Hz): (a) Range–Doppler result of multi-pulse target echo. (b) Range–Doppler result of multi-pulse received signal. (c) Range–Doppler result of multi-pulse estimated target echo. (d) Detection result of (a) at f d . (e) Detection result of (b) at f d . (f) Detection result of (c) at f d .
Figure 10. Range–Doppler result of INUSRJ suppression (SNR = −25 dB, JSR = 45 dB, f d = 266.85 Hz): (a) Range–Doppler result of multi-pulse target echo. (b) Range–Doppler result of multi-pulse received signal. (c) Range–Doppler result of multi-pulse estimated target echo. (d) Detection result of (a) at f d . (e) Detection result of (b) at f d . (f) Detection result of (c) at f d .
Remotesensing 16 01989 g010
Figure 11. The performance of INUSRJ suppression under various conditions: (a) ζ (AGCT). (b) ψ (AGCT). (c) χ (AGCT). (d) ζ (MRDENet). (e) ψ (MRDENet). (f) χ (MRDENet).
Figure 11. The performance of INUSRJ suppression under various conditions: (a) ζ (AGCT). (b) ψ (AGCT). (c) χ (AGCT). (d) ζ (MRDENet). (e) ψ (MRDENet). (f) χ (MRDENet).
Remotesensing 16 01989 g011
Table 1. System configuration.
Table 1. System configuration.
ParameterValue
Target echo X Sampling frequency f s (MHz)5
Carrier frequency f c (GHz)4
Pulse duration ( μ s)160
Pulse repetition frequency (Hz) f r 2000
Number of samples in each pulse T800
Number of pulses P64
Target velocity v (m/s)[5:20]
Chirp rate | k | (GHz/s)[3:30]
JSR (dB)[−10:45]
SMSP interference J smsp Number of retransmissions R 4 , 5
ISRJ J isrj Number of retransmissions R 4 , 5
Number of interceptions N 4 , 5
INUSRJ J inusrj Number of retransmissions R[1:1:8]
Number of interception N 2 , 4 , 5 , 8
NoiseSNR (dB)[−60:0]
Table 2. Network configuration.
Table 2. Network configuration.
ParameterValue
DecoderLength of convolution kernel k 1 32
Number of output channels C256
DCB groupNumber of repetitions r3
Number of DCBs u 1 6
Length of dilated convolution kernel k 2 3
AB groupNumber of ABs u 2 6
Number of output channels for ECB qk   θ 128
Number of output channels for ECB v  E512
ECBLength of depthwise convolution kernel k 4 31
EABLength of depthwise convolution kernel k 3 17
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Li, Y.; Zhou, Z.; Yu, G.; Li, Y. An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression. Remote Sens. 2024, 16, 1989. https://doi.org/10.3390/rs16111989

AMA Style

Wang Y, Li Y, Zhou Z, Yu G, Li Y. An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression. Remote Sensing. 2024; 16(11):1989. https://doi.org/10.3390/rs16111989

Chicago/Turabian Style

Wang, Yifan, Yibing Li, Zitao Zhou, Gang Yu, and Yingsong Li. 2024. "An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression" Remote Sensing 16, no. 11: 1989. https://doi.org/10.3390/rs16111989

APA Style

Wang, Y., Li, Y., Zhou, Z., Yu, G., & Li, Y. (2024). An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression. Remote Sensing, 16(11), 1989. https://doi.org/10.3390/rs16111989

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop