Results 1 to 10 of about 4,903 (114)
Deceptive Jamming in WLAN Sensing [PDF]
Joint Communication and Sensing (JCAS) is taking its first shape in WLAN sensing under IEEE 802.11bf, where standardized WLAN signals and protocols are exploited to enable radar-like sensing. However, an overlooked problem in JCAS, and specifically in WLAN Sensing, is the sensitivity of the system to a deceptive jammer, which introduces phantom targets
Hasan Can Yildirim+3 more
arxiv +7 more sources
Deceptive Jamming Detection for SAR Based on Cross-Track Interferometry [PDF]
Deceptive jamming against synthetic aperture radar (SAR) can create false targets or deceptive scenes in the image effectively. Based on the difference in interferometric phase between the target and deceptive jamming signals, a novel method for detecting deceptive jamming using cross-track interferometry is proposed, where the echoes with deceptive ...
Qingqing Feng+3 more
openalex +6 more sources
A New Hybrid Method for Synthetic Aperture Radar Deceptive Jamming [PDF]
ABSTRACT Based on the synthetic aperture radar (SAR) geometric model, a novel, and fast algorithm of large scene deceptive jamming against different SAR systems is proposed. First, a template deceptive image is transformed into the time domain signal using inverse image formation algorithm.
Jamal Saeedi
openalex +4 more sources
Deceptive jamming against multi‐channel SAR‐GMTI [PDF]
Aimed at the problem that the deceptive jamming against synthetic aperture radar ground moving target indication generated by single jammer cannot work effectively in multi‐channel SAR, a novel deceptive jamming against multi‐channel SAR‐GMTI based on two jammers is studied. First, signal model of the novel deceptive jamming is built.
Jingke Zhang+3 more
openalex +4 more sources
Smart forwarding deceptive jamming distribution optimal algorithm [PDF]
AbstractWith the frequent occurrence of drone black flying in large stadiums and airports, the requirement of precise electromagnetic interference to achieve unmanned aerial vehicle (UAV) displacement and forced landing in these protected area became urgent.
Chengkai Tang+3 more
openalex +3 more sources
Deceptive Jamming Method with Micro-motion Property Against ISAR [PDF]
Airborne target's micro-motion such as rotation or vibration causes phase modulation, termed as micro-Doppler effect, into radar signals. The feature of micro-motion is one of the most obvious features for radar recognition in mid-course phase. In traditional works, it is assumed that the micro-motion of the scatterer is the same as the ballistic ...
Ning Tai+4 more
+7 more sources
Research on the Property of Deceptive Jamming to Bistatic SAR
Fang Liu, Jianguo Wang
openalex +3 more sources
Multifrequency OFDM SAR in Presence of Deception Jamming [PDF]
Orthogonal frequency division multiplexing (OFDM) is considered in this paper from the perspective of usage in imaging radar scenarios with deception jamming. OFDM radar signals are inherently multifrequency waveforms, composed of a number of subbands which are orthogonal to each other.
Dmitriy Garmatyuk, J. Schuerger
openaire +3 more sources
Deception Jamming Against Doppler Beam Sharpening Radars [PDF]
Missile seekers are becoming increasingly more capable of using Doppler Beam Sharpening (DBS) modes as part of the homing cycle, which requires new countermeasures against this mode. One type of countermeasure, is to create false targets within the seeker DBS image. This paper proposes a jamming technique to generate false targets at a precise location
Gareth Frazer+2 more
openaire +6 more sources
Three Decades of Deception Techniques in Active Cyber Defense -- Retrospect and Outlook [PDF]
Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021. Techniques from these three domains complement with each other and may be leveraged to build a holistic deception based ...
arxiv +1 more source