Results 1 to 10 of about 4,903 (114)

Deceptive Jamming in WLAN Sensing [PDF]

open access: green2024 IEEE Radar Conference (RadarConf24)
Joint Communication and Sensing (JCAS) is taking its first shape in WLAN sensing under IEEE 802.11bf, where standardized WLAN signals and protocols are exploited to enable radar-like sensing. However, an overlooked problem in JCAS, and specifically in WLAN Sensing, is the sensitivity of the system to a deceptive jammer, which introduces phantom targets
Hasan Can Yildirim   +3 more
arxiv   +7 more sources

Deceptive Jamming Detection for SAR Based on Cross-Track Interferometry [PDF]

open access: goldSensors, 2018
Deceptive jamming against synthetic aperture radar (SAR) can create false targets or deceptive scenes in the image effectively. Based on the difference in interferometric phase between the target and deceptive jamming signals, a novel method for detecting deceptive jamming using cross-track interferometry is proposed, where the echoes with deceptive ...
Qingqing Feng   +3 more
openalex   +6 more sources

A New Hybrid Method for Synthetic Aperture Radar Deceptive Jamming [PDF]

open access: greenInternational Journal of Microwave Engineering, 2019
ABSTRACT Based on the synthetic aperture radar (SAR) geometric model, a novel, and fast algorithm of large scene deceptive jamming against different SAR systems is proposed. First, a template deceptive image is transformed into the time domain signal using inverse image formation algorithm.
Jamal Saeedi
openalex   +4 more sources

Deceptive jamming against multi‐channel SAR‐GMTI [PDF]

open access: goldThe Journal of Engineering, 2019
Aimed at the problem that the deceptive jamming against synthetic aperture radar ground moving target indication generated by single jammer cannot work effectively in multi‐channel SAR, a novel deceptive jamming against multi‐channel SAR‐GMTI based on two jammers is studied. First, signal model of the novel deceptive jamming is built.
Jingke Zhang   +3 more
openalex   +4 more sources

Smart forwarding deceptive jamming distribution optimal algorithm [PDF]

open access: goldIET Radar, Sonar & Navigation
AbstractWith the frequent occurrence of drone black flying in large stadiums and airports, the requirement of precise electromagnetic interference to achieve unmanned aerial vehicle (UAV) displacement and forced landing in these protected area became urgent.
Chengkai Tang   +3 more
openalex   +3 more sources

Deceptive Jamming Method with Micro-motion Property Against ISAR [PDF]

open access: goldRadioengineering, 2017
Airborne target's micro-motion such as rotation or vibration causes phase modulation, termed as micro-Doppler effect, into radar signals. The feature of micro-motion is one of the most obvious features for radar recognition in mid-course phase. In traditional works, it is assumed that the micro-motion of the scatterer is the same as the ballistic ...
Ning Tai   +4 more
  +7 more sources

Research on the Property of Deceptive Jamming to Bistatic SAR

open access: hybridJOURNAL OF ELECTRONICS INFORMATION & TECHNOLOGY, 2010
Fang Liu, Jianguo Wang
openalex   +3 more sources

Multifrequency OFDM SAR in Presence of Deception Jamming [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2010
Orthogonal frequency division multiplexing (OFDM) is considered in this paper from the perspective of usage in imaging radar scenarios with deception jamming. OFDM radar signals are inherently multifrequency waveforms, composed of a number of subbands which are orthogonal to each other.
Dmitriy Garmatyuk, J. Schuerger
openaire   +3 more sources

Deception Jamming Against Doppler Beam Sharpening Radars [PDF]

open access: yes2019 IEEE Radar Conference (RadarConf), 2019
Missile seekers are becoming increasingly more capable of using Doppler Beam Sharpening (DBS) modes as part of the homing cycle, which requires new countermeasures against this mode. One type of countermeasure, is to create false targets within the seeker DBS image. This paper proposes a jamming technique to generate false targets at a precise location
Gareth Frazer   +2 more
openaire   +6 more sources

Three Decades of Deception Techniques in Active Cyber Defense -- Retrospect and Outlook [PDF]

open access: yesComputers & Security, Vol. 106, 102288, Elsevier, 2021, 2021
Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021. Techniques from these three domains complement with each other and may be leveraged to build a holistic deception based ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy