Professional Documents
Culture Documents
net/publication/347631413
CITATIONS READS
23 7,966
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Kandarpa Kumar Sarma on 28 April 2021.
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.DOI
ABSTRACT Electronic warfare (EW) is one of the most important characteristics of modern battles. EW
can affect a military force’s use of the electromagnetic spectrum to detect targets or to provide information.
Recent developments in artificial intelligence (AI) suggest that this emerging technology will have a
deterministic and potentially transformative influence on military power. AI driven algorithms can be very
effective in diverse domain of EW like processing of radar signals for efficient recognition and classification
of emitters, detection of jammer and its characteristics and for developing efficient anti-jamming algorithms.
AI techniques can also enable an EW system to operate autonomously. This paper provides a description of
various branches of EW, the role of AI in EW systems and different AI techniques that have been deployed
in EW systems.
INDEX TERMS Artificial Intelligence, Deep Neural Network, ECM, Electronic warfare, ESM, ECCM,
jamming.
VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
bolstered. In this direction, many AI-based techniques have SIGINT collects intelligence data for subsequent or non real-
been proposed to improve the performance of an EW system time analysis [10].
[5]- [9]. To continue with this description, the definition of The ESM system basically measures the parameters of
EW, the subdivision of EW system and fundamentals of AI, the incoming radar signal in the operating frequency range.
and the relevant techniques are described in the following The typical parameters are: pulse width, pulse repetition
subsections. frequency (PRF), signal power, time of arrival (TOA), the di-
rection of arrival (DOA), etc [8]. The ESM system normally
A. ELECTRONIC WARFARE (EW) consists of: Antennas, Receivers, Signal processor, Computer
EW is any military action that involves the use of the entire with emitter library and Display unit [11].
electromagnetic spectrum to intercept, analyze and manipu- An antenna is a specialized transducer that converts the
late the enemy’s use of the spectrum while protecting one’s received RF signal into a suitable form and sends it to
own effective use of the same spectrum. The objective of EW the front-end receiver. The principal function of an ESM
is to determine the existence of the enemy’s electronic aids receiver is to provide information regarding the existence
as part of war-fighting capability, destroy the effectiveness and nature of various signals in the minimum possible time.
of the enemy’s electronic warfare aids and to deny the de- ESM receiver identifies the usable intelligence carried by the
struction of the effectiveness of friendly EW resources. EW signal (i.e., frequency, PRF, pulse width, scan type and rate,
represents a set of techniques used to deny free access to the polarisation, amplitude) and measures the DOA of the wave-
electromagnetic spectrum. These techniques are adopted for form so as to calculate the location of the transmitter. Signal
denying services rendered by the communication system and processor process and preserve the signal characteristics for
radar based methods used as a part of military setups. EW later in-depth analysis and provide significant information
consists of three major subdivisions: Electronic Attack (EA), to the operator for making intelligent and timely decisions.
Electronic Protection (EP), and Electronic Warfare Support The display unit obtains the track data file from the ESM
(ES) systems. EA refers to the actions taken to prevent processor and displays the emitter details on the screen.
or reduce the enemy’s effective use of the electromagnetic ESM receiver has the largest influence on the character-
spectrum. EP involves actions taken to protect the effective istics of the ESM system [12]. There are various receiver
use of the electromagnetic spectrum for friendly forces. ES approaches to achieve the desired characteristics for the
comprises of all those measures taken to detect, intercept, lo- system. Radar warning receiver (RWR) is an example of an
cate and analyse sources of radiated electromagnetic energy. ESM system that intercepts radar signals and analyzes their
So, all of the three components of EW must be carefully inte- relative threat in real-time [13]. RWR have a threat library
grated to be effective. The subdivisions of EW are described in its microprocessor that represents the enemy EOB. The
below. performance of a simple RWR deteriorates when many radar
emitters are present in the dense environment [14]. In such
1) Electronic Warfare Support (ES) situations, there arises a requirement of filtering or sorting
ES or Electronic Support Measures (ESM) in general, in- of emissions in order to classify each signal so as to extract
volves methods of gathering EW information through Elec- the important parameters like the amplitude, pulse width,
tronic intelligence (ELINT), Communication Intelligence frequency, angle of arrival (AOA), coherency, polarisation,
(COMINT), and ESM receiver. The key functions of ESM pulse train characteristics, etc. of the radar.
systems are: intercepting, identifying, analyzing, and lo- Based on various design approach, some important ad-
cating sources of hostile electromagnetic radiation for the vance ESM receivers that have excellent multiple signal
purposes of immediate threat recognition and the tactical handling capability even in a dense emitter environment as
employment of military forces or assets, such as ECM equip- discussed in [10] are:
ment. Moreover, ES information correlated with other intelli- • Crystal Video Receiver (CVR): This is a small-sized,
gence surveillance information can be developed into an elec- low-cost receiver that is excellent for limited applica-
tronic order of battle (EOB) for situational awareness. This tion. However, their capability is limited to fine fre-
information can also be used to develop new countermea- quency measurement and cannot readily handle com-
sures. Hence, ESM is an important EW information source plex and dense signals. They have poor sensitivity and
to carry out ECM and ECCM operations. The main objective are incapable of handling frequency agile systems.
of an ELINT system is to compile operational data on enemy • Superheterodyne receivers: The advantage of these re-
electronic systems and weapons. COMINT is the intelligence ceivers is that they have high sensitivity, better fre-
derived from unfriendly communication by persons other quency selectivity, proven design, and are not suscep-
than the intended recipients. The Combination of ELINT and tible to jamming. However, this type of receiver has a
COMINT is called signal intelligence (SIGINT). Both ESM poor probability of intercept if the emitter is frequency
and SIGINT operate in the electromagnetic spectrum and agile or frequency hopping.
use the same electromagnetic resources. The main difference • Microscan receiver: This type of receiver has the advan-
between ESM and SIGINT is that ESM function is for a tage of a high probability of detection. Also, they are
tactical purpose that requires immediate actions, whereas capable of handling the wideband and frequency agile
2 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
signals efficiently. But the drawback with this type of • Barrage Jamming: In this type of jamming, the jam-
receiver is that they require a channelizer, minimum mer targets multiple frequencies simultaneously. All the
pulse width, multiple receivers for direction finding power of the jammer is spread over a bandwidth much
operations, and a very wide IF bandwidth. wider than that of the radar signal and hence overcomes
• Channelized receivers: This type of receiver has high the challenges associated with other types of jamming.
selectivity and a high probability of detection and is In the deception jamming technique, the ECM systems de-
not susceptible to jamming. But the shortcoming of liberately deceive the radar and send out pseudo signals
this receiver is that they require a channeliser, thereby to mislead the hostile systems in deriving interpretation of
increasing the receiver’s size and cost. information received by their electronic system. Deception
• Instantaneous frequency measurement (IFM) receivers: can be either manipulative or imitative [14]. Modification of
The advantage of this type of receiver is that they have a friendly electromagnetic radiations to accomplish deception
high probability of detection and good frequency mea- is called manipulative deception. Introducing radiation into
surement accuracy. They can also handle frequency ag- enemy channels that mimic their own emission is called
ile signals efficiently. However, they have the limitations imitative deception. Deception jamming can be broadly clas-
of poor sensitivity, easy jamming, inability to handle a sified into four categories, namely false target generation,
very high data rate, and continuous wave signals. range deception, velocity deception, and angle deception
[12], [16].
2) Electronic Attack (EA)
• False target generation:This is an effective jamming
EA, also known as Electronic Countermeasures (ECM), is technique employed against acquisition, early warning,
the component of EW that involves the use of electromag- and ground control intercept (GCI) radars. The objective
netic energy or anti-radiation weapons to attack personnel of this type of jamming is to confuse the enemy radar
or equipment with the intent of neutralizing or destroying operator by generating many false target returns on
enemy combat capability. The main operational objectives of the victim radar [10]. When this technique is success-
ECM are: fully employed, the radar operator cannot distinguish
• To prevent hostile ESM and communication systems between false targets and real targets [15].
from receiving information regarding the operation of • Range deception: In this technique, range deception
friendly forces within the radar coverage. jammer exploits any inherent weakness in missile guid-
• To introduce pseudo, deceptive data into hostile elec- ing radar system’s automatic range gate tracking cir-
tronic systems in order to generate ineffective personnel cuits. When the distance between the real and false
or command and control actions. targets is larger than the range gate of the radar, the
• To destroy hostile electronic warfare system so as to deceptive jammer shuts down.
deny the destruction of friendly EW resources. • Velocity deception: Continuous wave (CW) radar and
Various ECM techniques that are used to prevent or reduce Pulse Doppler radar track targets based on velocity or
the enemy’s effective use of the electromagnetic spectrum are Doppler-shifted frequency. In this deception technique,
shown in Figure 1. the velocity tracking information is denied by gener-
The two major techniques of ECM are Active ECM and ating pseudo velocity targets. This is accomplished by
Passive ECM [13], [15]. Active ECM involves degradation of using techniques like velocity gate pull-off (VGPO),
effectiveness of the enemy’s electronic warfare aids by gen- Doppler noise, narrowband Doppler noise.
erating and transmitting electromagnetic energy. It involves • Angle deception: In this technique, jammer degrades
two major actions, namely noise jamming and deceptive the tracking radar’s ability to extract the correct angle
jamming [13]. Jamming prevents threat radar from measuring and elevation information of a target. So, radar ac-
target position and velocity, whereas deception techniques quires incorrect information about the angular position
produce false position and velocity of the target. Jamming is of the target. Based on different angle measurement
the deliberate radiation of electromagnetic energy to weaken algorithms, there are many angle deception techniques.
the use of electronic devices and systems. Noise jamming Such as for conical scan radars, scan rate modula-
attempts to inject an interference signal into the enemy’s tion and inverse gain jamming is used, for Lobe-On-
electronic system such that the target signal is masked or Receive-Only (LORO) tracking radars, swept square
completely submerged by interference. There are three differ- wave (SSW) jamming is used, for monopulse radars,
ent techniques for generating noise-like IF interference [16]: cross-eye jamming is used etc [12].
• Spot Jamming: In this type of jamming, all the power Passive ECM does not make use of electromagnetic energy;
of the jammer is concentrated to a very narrow band of rather, it employs confusion reflectors for the deception of
frequencies which should ideally be that of the radar. enemy’s electronic system. This is achieved by chemical or
• Sweep Jamming: In this type of jamming, the jammer mechanical means.
sweeps its frequency from one to other over a very wide • Chemical Jamming: It involves the use of smoke and
bandwidth. chemical agent like aerosols to deceive the enemy [10].
VOLUME 4, 2016 3
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
• Mechanical Jamming: This involves deception of en- whereas ECCM is concerned with techniques that are embod-
emy’s electronic warfare aids by the use of specially ied in the design of electronic equipment (e.g., radar and its
designed mechanical objects like chaff, flares, drones constituent parts like receiver, transmitter, etc.) to overcome
etc. these methods. Most of the ECCM techniques are based on
Chaff is an electronic equivalent of smoke. Instead of scat- the characteristics of radar parameters like power, frequency,
tering or absorbing electromagnetic energy, as in the case of PRF, pulse length, antenna gain, antenna polarisation, re-
smoke, it reflects electromagnetic energy in order to confuse ceiver’s probability of intercept, etc [14]. Some commonly
an enemy electronic system. Chaff consists of thin metal- used ECCM techniques in terms of spatial, spectral, tempo-
coated dielectric fibers. It forms a cloud of metallic dipoles ral, and netting domains are shown in Figure 2.
and appears on the enemy’s radar screens as a blot, thereby
• Spatial ECCM: This category of ECCM includes meth-
masking the real target signal [17]. A flare is a pyrotechnic
ods which are space based. Some of the methods under
target launched from an aircraft causing infrared (IR) mis-
this category are as follows [13], [17]:
siles and other optical devices to be decoyed away from the
true target. The flares are dispersed when the heat-seeking -- Side lobe canceller: This technique is used on
missile approaches its target to divert them from the target surveillance or tracking radar. This method pre-
[13]. Decoys like remotely piloted vehicles (RPVs), drones, vents the noise jamming signal from adversely
and other aircraft-type vehicles are also some other means of affecting the radar’s operation. All false signals
deception. The objective of decoys is to trigger the enemy’s entering the side lobe of the main antenna get
radar so as to force them to reveal their presence, location, cancelled at the output.
and operating characteristics. This information is very useful -- Side lobe blanking: This device employs an auxil-
for the forces which are trying to counter such a radar threat iary wide-angle antenna and receiver to determine
[10]. whether a received pulse is from the side lobe re-
gion. If signal from the side lobe region of antenna
3) Electronic Protection (EP) is detected then it is blanked from the output signal.
EP, also known as Electronic Counter-Counter Measures -- Burn through technique: This method enables the
(ECCM), ensures friendly, effective use of the electromag- appearance of a true target on a radar indicator
netic spectrum despite the enemy’s use of EW. The funda- even in a jamming environment. In this technique,
mental difference between ECCM and ECM is that ECM radar increases its energy on the target in order to
involves techniques to provide jamming and decoy methods, illuminate the targets in a jamming environment
4 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
• Spectral ECCM: This category of ECCM includes longer detection ranges and wideband short pulse,
methods which are frequency based. Some of the meth- thereby increasing the target range resolution.
ods under this category as discussed in, [17], and [18] -- PRF agility: This is an anti-interference technique
are: that is used on tracking pulse radar to degrade the
-- Low probability of intercept (LPI) technique: effectiveness of a pseudo target repeater. In this
This technique attempts to escape detection by an technique, PRF is rapidly varied at a random rate
intercept receiver. This is attained by using antenna so that the pseudo targets appear fuzzy on the radar
having low side lobes and spread spectrum trans- scope. This method helps to increase the radar’s
missions. capability in a dense signal environment.
-- Frequency agility: This is another ECCM tech- -- Dickefix: This technique is used to counter wide-
nique which is use to counter the jamming signal. band sweep jamming and other related ECM tech-
This technique enables the radar to rapidly change niques, which uses a wideband IF amplifier and a
its transmitter and receiver operating frequency, limiter ahead of the normal bandwidth IF amplifier
sometimes on a pulse-to-pulse basis. in the radar receiver.
-- Doppler filtering: This technique is used on a -- Constant false alarm rate (CFAR): This tech-
tracking doppler radar. Doppler radar is a special- nique is used for prevention of radar receiver sat-
ized radar that uses the Doppler effect to produce uration, and overload [10]. It allows the radar to
velocity information about the target. The objective function properly in an environment where inter-
of this method is to detect doppler targets and to aid ference due to signals from jammers and other
in defeating velocity deception techniques. radiating sources are present. The presence of
• Temporal ECCM: This category of ECCM includes these interfering signals in radar with automatic
techniques which are time-dependant. Some of the threshold detection can increase the rate of false
methods under this category are as follows [14], [18]: alarms to an intolerable extent. When the radar
output data is processed in a computer, the device
-- Pulse expansion-compression: This technique is
might be overloaded by the added false alarms due
used to counter some types of noise jamming and
to jamming. So, this CFAR technique keeps the
deception jamming. A pulse signal is expanded for
detection of false alarm rate constant when the
transmission. This expanded pulse is transmitted
radar is receiving these interfering signals [15].
and decoded on its return. In the decoding process,
However, detection of a target is not possible in
Echo responses are then compressed. This provides
VOLUME 4, 2016 5
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
this method if the target is weaker than the jammer, with a RF signal and passed through a high-power amplifier.
but an ambiguous situation due to the presence of A high gain power amplifier amplifies the signal from the
jammer can be removed. jammer. Jammer antenna system directs the jamming signal
• Radar Netting: Radar net is a combination of at least to the target. A special jammer receiver, along with a servo
two or three radars that feeds information to a central system, keeps the antenna aligned on the selected target.
hub from where the commander directs the conflicts
in the battlefield. This technique increases the potential B. AI FUNDAMENTALS AND RELEVANT TECHNIQUES
ECCM capability of the system.
AI is defined as non-human intelligence that is used to de-
A typical block diagram of EW system for disruption in radar velop a computer system in such a manner that it can replicate
based detector and surveillance system is shown in Figure 3. human mental skills. The commonly used AI techniques are
It is certainly not the only configuration available for EW Machine Learning (ML), including Artificial Neural Network
systems, the design of such systems depends on a particular (ANN) and Deep Learning (DL) or Deep Neural Network
application. (DNN), Fuzzy Logic, Genetic algorithm, etc. These tech-
The function of search and tracking system is to determine niques are briefly discussed below.
the location or direction of a target on a continuous basis.
Search and tracking system basically consist of receivers 1) Machine Learning
which cover a number of specific radar bands. This receiver
• Artificial Neural Network (ANN): An ANN is a non-
identifies the frequency of the transmitted signal, AOA of the
parametric computational tool that can be trained to per-
signal in order to calculate the location of the transmitter. Sig-
form various computational tasks like pattern recogni-
nal analysis and interpretation unit comprise of a frequency
tion, classification, data clustering, etc. The basic com-
counter, spectrum analyzer and a video display unit [14].
putation unit in an ANN is the artificial neuron, which
It measures the values of signal parameters like PRF, pulse
can generate outputs after receiving inputs replicating
width, polarisation, amplitude, etc., present in the received
the biological counterpart. These neurons are intercon-
signal. This information can also be feed to a remote data
nected by links (synapses) with weights and are grouped
system. The remote data system is a tactical indicator to
in layers to form a network designed to process an
display threat category, frequency of transmission, and signal
input signal. The network has an input layer, any num-
parameters. Data from the signal analysis and interpretation
ber of hidden layers, and an output layer. ANNs may
unit is fed to the data analysis system for threat evaluation
have two different types of network topology, namely
and storage purposes. RF transmission block consists of a
feedforward and feedback network. A Feedforward net-
signal processor, pulse code modulation (PCM) encoder, pre-
work is a non-recurrent network, and information flow
modulator, and RF transmitter. The function of this module
is unidirectional. A feedback network is a recurrent
to process the analog signals coming from the signal anal-
network where information can flow in both directions
ysis and interpretation unit and converts them to a digital
using loops. The learning mechanism used in ANNs
form for application in the modulation circuits of a radio
may be supervised or unsupervised learning. Multi layer
communication transmitter. The jamming signal generator is
perceptron (MLP) is the simplest feedforward ANN
made up of wideband and spot tuning microwave circuits.
trained with a back-propagation algorithm. It is a non-
Jammer prevents threat radar from measuring target position
parametric learning-based technique best suitable for
and velocity. It transmits RF noise signals like amplitude
prediction, classification, and regression. Another ex-
modulated (AM) or frequency modulated (FM) signal into
ample of feedforward ANN is the time delay neural
the enemy’s electronic system so as to completely masked the
network (TDNN). Recurrent neural network (RNN) and
target signal. The modulation can take many forms, depend-
nonlinear autoregressive network with exogenous inputs
ing on the target signal, but random noise is commonly used
(NARX) are examples of feedback ANN. MLP doesn’t
for communication signals. Data from the signal analysis and
have time processing capability, whereas TDNN, RNN,
interpretation module also goes to a mode selector. There
and NARX demonstrate the ability to process time de-
are two modes in the mode selector, namely continuous and
pendent signals. The basic mathematical steps of each
control mode. In continuous mode, the system generates the
of these methods are mentioned below:
jamming signal continuously, and in controlled mode, the
jamming action is determined by the control unit. The Con- -- MLP: A MLP with two hidden layer is shown
trol unit supervises the passage of data from the signal analy- in Figure 4. It is a fully connected network, so
sis and interpretation module to the jamming signal generator every unit receives connections from all the units
module. For jamming techniques, where the jammer works in in the previous layer. Each unit has its own bias
the repeater mode without performing any analysis, in those and there is a weight for every pair of units in two
circumstances control unit blocks the passage of data from consecutive layers [19]. Let ‘xj ’ be the input units,
the signal analysis and interpretation unit to the jamming ‘y’ be the output unit, units in the l th hidden layer
(l)
signal generator unit. Finally, the jamming signal is mixed be denoted as hi . The network’s computations are
6 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
(2)
X (2) (1) (2)
hi = ψ (2) ( wij hj + bi ) (2)
j
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
Figure 8: Deep belief network structure with three hidden Figure 9: Architecture of Stacked Autoencoder
layers
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
III. ROLE OF AI IN EW
The importance of EW has gradually grown as modern
military command and control has emphasized connectivity
through all echelons [47]. AI enabled EW systems are re-
constructing the fundamental nature of military technologies
[48]. Inclusion of AI algorithm in an EW system makes
them highly effective as autonomous systems. EW systems
Figure 10: Architecture of DCNN of all modern militaries are heavily reliant on autonomous
algorithms [47]. With the increasing demand of automation
of EW systems, modern AI algorithms are being investigated
denoted by equation 22. It takes the concatenated
to determine their value as an addition to upcoming EW
feature maps of the layers as an input.
systems. AI can be used in diverse domains of military
y = φ(w0 fv + b0 ) (22) activity like weapons systems selection and employment,
decision support, threat analysis, interpretation of intelli-
where b0 is a bias vector and w0 is a weight matrix, gence, logistics etc. For military applications, AI supported
fv is the concatenated feature vector and φ(.) is the data processing systems are already in use and intelligent
nonlinear activation function. communication attributes have become indispensable [7],
Deep learning plays a significant role in EW systems for [8], [24], [25], [49]. These applications tend to fall into two
radar signal processing, emitter identification and clas- categories: AI based EW systems that affect the operational
sification, developing improved anti-jamming methods, level of war and those that affect the strategic level. At
detection of jammer and its characteristics, etc. A few the strategic level, application of AI could affect how the
related works are presented in [8], [9] , [28], [38], [39], military department organize the order of battle, assignments
[40], [41], [42], [43]. to forces, war strategies, decisions about the scale and escala-
tion, intelligence sharing and interpretation, scope and nature
2) Fuzzy systems of war, consequence of deployment of specific assets etc.
Fuzzy Logic combines traditional crisp set with statistical Application of AI at the operational level of battle could have
grading performed by membership functions enabling it to a very significant influence in achieving tactical objectives,
track finite variations in inputs. Fuzzy systems attempt to re- planning, removing uncertainty and effective preparedness.
semble the human decision-making methodology using ANN Some of these aspects are discussed below:
and deals with vague and imprecise information [44]. Fuzzy • Application of AI at operational level of war: Some
systems have no learning capability or memory. Hence, fuzzy examples of application of AI at the operational level of
modelling is often combined with other techniques to form war are discussed below:
hybrid systems, e.g., neuro-fuzzy systems, which is a combi- 1) AI in information collection, interpretation and
nation of neural network and fuzzy system. These have been analysis: In military arena, information are col-
widely used in a host of radar and related signal processing lected from signal intelligence (SIGINT), ELINT,
applications [45]. human intelligence (HUMINT), measurement and
signature intelligence (MASINT) etc. All these
3) Genetic Algorithm (GAs) information need proper interpretation and anal-
GA attempts to replicate the naturally occurring evolution ysis to make them useful for decision making.
processes, supporting survival of the fittest while deriving The issues of information overload faced by the
an optimal solution. It is an iterative technique based on intelligence community is sought to be effectively
probability. The algorithm progresses until it satisfactorily handled by using machine learning [50]. This will
solves the problem. The fitter solutions in a population help all the source analysts to understand an evolv-
survive and pass their traits to offspring, which replace the ing security environment. In this respect, an AI
poorer solutions. Unlike some random search techniques, enabled system can be useful for strategic stability.
VOLUME 4, 2016 11
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
2) AI in war gaming: AI can increase the power of A. REVIEW OF CURRENT TRENDS OF APPLICATION
simulations and gaming tool that is used to study OF AI BASED TECHNIQUES IN RADAR SIGNAL
the battle field scenario and conventional weapons. PROCESSING AND EW
AI can enable planners to model battle field sce-
Various AI algorithms that can be used as part of EW tech-
nario in order to explore how dynamic conditions
niques include range of neuro-computing and deep learning
may affect outcomes and decision making and can
techniques which acquire knowledge from the surroundings,
also be used to analyze the results of such scenario.
retain it and use it subsequently.
3) AI in unmanned vehicle: AI based navigation
software enables UAV to find their way through The method discussed in [5] shows the analysis of data
hostile territory. AI equipped drones can conduct sets gathered through electronic warfare for determining
advanced battle tactics and immediately adjust to regions where target elements are concentrated through ap-
enemy war games to exploit battle field opportuni- plication of density based special clustering (DBSCAN) and
ties. When combined with robots, AI can increase K-Means algorithms. In [49], a method on radar visual range
the ability of machines to operate autonomously of electronic warfare simulation based on transcendental
[51]. equation method and graphic space intersection method is
discussed. A Novel learning algorithms based on the multi-
• Application of AI at strategic level of war: Some armed bandit framework is discussed in [6] to optimally jam
examples of application of AI at the strategic level of malicious transmitter-receiver pairs in an electronic warfare-
war are discussed below: type scenario without having any apriori knowledge about
the system. A soft-computing based model to realize an
1) AI in Intelligence, Surveillance and Reconnais- autonomous decision-making process for threat detection,
sance (ISR): AI can play a very significant role in classification, and the selection of alternative counter mea-
processing the information of military importance. sures against threats in EW settings is discussed in [7]. In
ISR is very important for multi domain situational [45], AI techniques i.e. fuzzy logic and neural networks, for
awareness. AI can be a very significant tool in decision making in EW environment based on influential
managing this huge amount of ISR data involved parameters for the specific scenario is discussed. A novel
in modern warfare. AI can be useful in analyz- delayed learning framework with transition-based rewards is
ing the real time dynamic battle field conditions. discussed in [23]. For an ESM, it is essential to recognize
Moreover, AI can also make it possible to attack the modulation of pulse repetition intervals (PRIs), to ex-
quickly and optimally while minimizing the risks tract information about the radar emitters. PRI modulations
to one’s own forces. are difficult to recognize in modern electronic environments
2) AI enable advance targeting and navigation tech- due to a large number of spurious pulses. An automatic
niques can have improved prospects for a wide method for recognizing seven PRI modulation types using
range of tactical and strategic defence system by a CNN is discussed in [8].Another improved algorithm for
allowing target acquisition, tracking and discrimi- PRI modulation recognition is discussed in [24]. This method
nation [50]. can recognize four different PRI modulation types using
3) AI guided probing, mapping and hacking of com- a three- layer neural network. A radar signal intra-pulse
puter networks can provide useful information for modulation recognition method based on convolutional de-
both offensive and defensive purpose [50]. noising autoencoder (CDAE) and deep convolutional neural
network (DCNN) is discussed in [38]. In this method, at
The AI techniques can also be used in signal intelligence first radar signals are converted into time-frequency images
systems to detect RF signals intercepted from opponents and (TFIs). These images are then pre-processed using bilinear
predict the threats [52]. It can help in decoding RF signals interpolation and amplitude normalization method. CDAE
sent out by communications or radar systems. Convolutional is then used to denoise and repair TFIs. A DCNN based
neural network (CNN) can be used for improving DOA on Inception architecture is then designed to identify the
estimates for EW systems [9]. Based on images created by processed TFIs. Similarly, an automatic modulation classi-
time-frequency images of the radar signals DNN can be used fication system for radar signals based on hybrid AI based
to classify radar pulses [38]. Competitive deep reinforcement algorithm including naive Bayesian and SVM is presented
learning-based methods can be used in ECCM system for in [53]. In this method, the modulation features of the radar
adapting ones’ own communications to an EW environment signal is extracted using a set of algorithms that comprises
where the adversary is using adaptive jamming [39]. Current of time-frequency analysis, discrete Fourier transform, and
trends of application of AI based techniques in radar signal instantaneous autocorrelation. This method can successfully
processing and EW from state of the art is briefly discussed classify seven types of signal in different modulation type
in the following subsection. namely binary phase shift keying (BPSK), quadrature phase
shift keying( QPSK), 16-quadrature amplitude modulation
(16QAM), linear frequency modulation (LFM), single fre-
12 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
quency (SF), 2FSK, and 4FSK. The performance of a deep developed to extract features and to reduce the redundant
reinforcement learning (DRL)-based anti-jamming method information. Thereafter to further improve the performance
is discussed in [39]. At first an intelligent jamming method of recognition rate, feature fusion algorithm based on SAE
based on reinforcement learning is designed to combat the is developed to get the more essential expression of feature.
DRL-based user. Then, the conditions when the DRL-based Finally, improved artificial bee colony (IABC) algorithm is
anti-jamming algorithm cannot converge are theoretically presented as the scheme of ensemble learning which combine
analyzed. Thereafter, various scenarios where users with dif- three classifiers together to get more accurate recognition
ferent communicating modes combat jammer with different results.
jamming modes are compared in order to investigate the A novel method for radar emitter signal identification and
performance of DRL-based method. A method based on deep classification based on Ward’s clustering and probabilistic
learning is proposed in [9] to select antennas in a cognitive neural networks (PNN) is discussed in [25]. Initially, self-
radar scenario. A DNN is constructed with convolutional adaptive filtering and Fourier transform are used to obtain
layers as a multi-class classification framework. The training the frequency spectrum of the signals. Then the range of the
data is generated such that each class indicated an antenna optimal number of clusters is obtained by using the Ward
subarray. These results in lowest minimal error bound for clustering method and some clustering validity indexes. The
estimating target DOA in a given scenario. Wireless networks PNN is used as a classifier in this method.
are prone to jamming attacks. The transmission performance In [26], ANN based method for timely and reliable recog-
further deteriorates when the jammer focus their signals on nition of radar signal emitters is presented. The method
reference signals of the transmitters. The AI based method involves a large data set of intercepted generic radar signal
presented in [40] is capable of jointly determining the pres- samples for investigating and evaluating several ANN topolo-
ence of the jammer, along with its attack characteristics. The gies. Three case studies are discussed in [26] and several
presence of the jammer is determined by using two different data coding, data transformation and learning parameters are
neural networks namely DCNN and deep RNN. The presence evaluated. An automatic radar waveform recognition system
of jammer and its type is determined through a diverse set of to detect, track and locate the low probability of intercept
scenarios that are implemented on software defined radios. (LPI) radars is discussed in [55]. The system can classify
With the rapid development of EW systems, there arises 12 different types of pulse wave radar signals with a low
the need of proper electromagnetic environment observation signal-to-noise ratio (SNR). The method uses a hybrid clas-
in order to analyze target radar signatures. MASINT plays sifier which includes two relatively independent subsidiary
a significant role in this direction [54]. MASINT helps to networks namely convolutional neural network (CNN) and
detect, track, identify and describe the distinguishing char- Elman neural network (ENN).
acteristics of emitters. These distinguishing characteristics Another neural network based radar signal classification
of radio electronic devices are the important element in the system is presented in [27]. This method introduces a novel
process of recognition and identification of the emitter [54]. feature extraction algorithm based on probability moment
In advanced systems, analysis and processing of these dis- and approximate entropy (ApEn) for radar signal classifica-
tinctive features for recognition and identification of emitter tion. The antenna acts as a radiation device for radar signal
involves the procedures like analysis of signal parameters and its characteristics determines the performance of the
measured in a dense electromagnetic environment, automatic radar. In order to determine the target, the radar antenna beam
emitter sources identification by comparing signal parame- required to be search in a certain manner, which corresponds
ters from a database as early as possible, use of specific ex- to a parameter known as antenna scan type. The accurate
pert’s knowledge in the process of identification and location recognition of antenna scan type of hostile radar is important
of emitters for detection of unknown signals. Moreover, it for the threat assessment. In this direction, a method combin-
also involves methods of pulses de-interleaving in case of ing the Visibility graph with machine learning for recognition
simultaneous signal from many emitters and updating mech- of radar antenna scan pattern is discussed in [28]. At first,
anism of the database. In this direction, a method of specific seven radar antenna scan patterns are modelled. Then the
emitter identification based on graphical representation of time series of the scan patterns are converted into a visibility
the distribution of radar signal parameters is presented in graph and the visibility graph feature extraction is performed.
[54]. This method is based on transformation and analysis Thereafter, the extracted six types of features are sent to
of distribution of basic radar parameters especially Pulse the classifier for identification of the signals. The support
Repetition Interval. vector machine (SVM), back propagation (BP) neural net-
A system for radar signal recognition based on non- work, naive Bayes algorithm, MLP and DBN is used as a
negative matrix factorization network (NMFN) and ensemble classifier in this method. Another algorithm for estimation of
learning is presented in [41]. This system can recognize nine the radar antenna scan period (ASP) and recognition of the
different radar signals even at the condition of low signal radar antenna scan type in EW environment is presented in
to-noise ratio (SNR). At first, a feature extraction algorithm [29]. This method involves scan period estimation followed
based on pre-trained convolutional neural network (CNN) is by pre-processing using normalization, re-sampling and aver-
developed. Then based on the theory of network, NMFN is aging techniques, feature extraction, and classification. Naive
VOLUME 4, 2016 13
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
Bayes (NB), decision-tree (DT), ANN, and SVM classifiers to suppress the ISRJ while retaining the real target signal
are used to classify five different antenna scan types Since components simultaneously.
ESM receivers are required to carry out high amount of
computations in real-time, technique like compressive sens- B. CRITICAL OVERVIEW OF AI APPLICATION
ing (CS) can be very useful for reducing the computational However, in order to predict the extent to which AI algorithm
cost of such receivers [42]. CS-based EW receivers are able might be incorporated in the EW system, it is critical to
to detect and locate targets using only a small number of assess the flip side of this technology. Some of the potentially
compressively obtained samples in much less computational destabilizing aspects of AI are discussed below:
cost compared to the traditional EW receivers. One such CS 1) AI based EW systems are susceptible to faulty date
based ESM receiver design is presented in [42] to estimate input, which can cause unexpected outcomes [50]. AI
the angle-Doppler of adversary targets whose waveforms are based techniques are heavily dependent on a large
not known. The receiver uses a Sparse Bayesian Learning amount of data. Since data are collected from many
(SBL) framework, which is blind in the sense that the knowl- sources, faulty data may result in flawed learning,
edge of the sparsity basis is not available. An innovative thereby produces unintended consequences. Moreover,
framework for testing various CEW tasks, in which the DRL differentiating between similar objects may be chal-
algorithm has been used for the target searching purpose, is lenging under denial and deception operations. Acci-
discussed in [43]. This method depicts how to overcome, the dentally hitting the wrong targets could have strategic
spatial sparsity, continuous action, and partially observable implications. So, the inherent problem of data reliabil-
environment that exist in cognitive EW that can limit the ity of AI raises a critical question about its loyalty on
abilities of DRL algorithms. To realize this task Python is the battlefield. Some specific examples of this situation
used to build a 3-D space game Explorer to simulate various can be: AI technique that is used for classification of
cognitive EW environments in which the electronic attacker signals such as DNN requires a considerable amount
is an unmanned combat air vehicle (UCAV) and the defender of well labelled signal data for parameter optimization
is an observation station. prior to implementation. However, the EW environ-
The chaotic compound short-range detection system is a ment consists of very agile systems that can adapt
system that has strong anti-jamming ability [46]. For the and change. So, in this scenario, DNN performance
deception jamming case, the features of the complex short- will be uncertain if it is trained on less than the full
range detection system are close to the echo detection. This range of possible data it might encounter. Similarly, in
causes a serious threat to the detection system. In this di- deep reinforcement learning algorithm, the parameter
rection, a technique that can extract and analyze different optimization data is built up over a very large number
features of deceptive jamming and target echo signal in order of interactions with the opponent system. However,
to realize the anti deceptive jamming of chaotic compound EW does not allow repeated engagements with fixed
short-range detection system is discussed in [46]. The method rules for a long time. To an experienced EW operator,
simulates the mathematical model of deceptive jamming and adversaries adapt rapidly by shifting tactics to different
target echo. Thereafter analyzes the bi-spectral characteris- parts of the electromagnetic spectrum. Further, deep
tics of the simulated echo and jamming signal. A set of anti- learning methods evolve with changing scenarios, and
deception jamming feature parameters is then constructed. the possibilities of false targeting reduce.
The task of identification of deceptive interference is accom- 2) One of the advantages of AI-enabled EW system is
plished by GA-back propagation neural network technique. its speedy decision making. This can turn around into
A jamming style selection method based on jamming rule its disadvantage as well if it needlessly accelerates the
base is described in [30].The radar signal parameter like PRF, growth of conflict from crisis to war. AI enable au-
pulse width, pulse amplitude, angle of arrival etc are used for tonomous ISR systems could decrease the time avail-
construction of jamming rule base. This method can play a able for diplomats to manage crises. Here, human
significant role in improving the accuracy and real-time per- intervention shall have a definite role to play.
formance of the cognitive EW intelligence countermeasure 3) Decisions of war and peace cannot be left to predictive
system. analytic. Machine learning cannot reliably predict the
Different types of jamming signals interferes the radar exact outcomes of an event; rather, it can predict within
in detection, tracking, and targets reorganization operations. margins of error. This margin of error may be tolerable
The filtering method based on stacked bidirectional gated for research purpose but not for the real-time battle-
recurrent unit network (SBiGRU) and infinite training is dis- field. AI-enabled systems can correctly assess most
cussed in [56]. This method tends to suppress the Interrupted- but not all the situations. In military applications, this
sampling repeater jamming (ISRJ) signal for pulse compres- could mislead decision makers and put forces at risk.
sion (PC) radar with linear frequency modulation (LFM) 4) AI-supported information warfare, including fake
waveform. This algorithm converts the extracted signal into news, cybershots and deep fakes could deform public
a temporal classification problem and extracts the jamming- and leadership perceptions of international conflicts,
free segments of the signal to generate a band pass filter thereby affecting strategic stability.
14 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
for detection of jammer and its characteristics and for devel- role in EW [60]. Chaff clouds are an effective de-
oping efficient anti-jamming methods. Table 1 shows that AI ception jamming technique for certain radars. It poses
technique that has been used for different applications in all serious challenges to radar system performance. So,
the subdivisions of EW gives promising results. the study on radar characteristics of chaff clouds and
Cognitive EW systems should be dynamic in nature with a countermeasures against chaff jamming is very cru-
closed loop feedback system. This will enable an intelligent cial. In this direction, a technique of chaff jamming
response to defeat threat radars. Hence AI techniques can be recognition based on the SVM classification method is
a powerful tool for cognitive EW systems to exploit unknown presented in [60]. In [61], a method for recognizing
radar signals. Moreover, a feedback mechanism could possi- radar compound jamming signals including additive,
bly co-ordinate the operations of the system’s transmitter and multiplicative and convolution signals of typical blanket
receiver to achieve optimal jamming performance. With the jamming and deception jamming based on BP neural
help of machine learning and pattern recognition algorithms networks is discussed. At first, compound jamming
advance intelligent EW system may able to mimic human signals are modelled with all received signals (echo,
mental process of perception, memory, judgement and rea- jamming and noise) in one PRI. Then features are ex-
soning. tracted in time domain, frequency domain and fractal
dimensions. Thereafter, classifier based on BP neural
A. EW - APPLICATION SPECIFIC AI TECHNIQUES: network is established to recognize types of compound
In this subsection, a few specific techniques related to active jamming signals.
ECM, Passive ECM, and ECCM from state of the art in • ECCM: Frequency agile (FA) radar is useful for radar
literature are discussed. Further, a few AI techniques that are anti-jamming designs because of its ability to randomly
suitable for specific EW applications are also enumerated. alter the carrier frequency [62]. In this direction, a rein-
• ECM: Most of the phenomena of ECM are time depen- forcement learning-based anti-jamming frequency hop-
dent, location dependent, and sometimes slow to fast ping algorithm for cognitive radar is presented in [62].
varying, so for such diverse applications, a range of Q-learning and deep Q-network (DQN) is used in this
ML/DL tools may be considered. Here a few of the method. It is reported that the learning performance of
subdomains of ECM with respect to the application of DQN is much better than that of Q-learning especially
ML/DL techniques are discussed. Jamming is a menace when the available frequencies are large. Radars resist
to radar system survival, and anti-jamming is one of interference by transmitting complex signals. Chaotic
the solutions. So, the classification of radar jamming is FM signal has high resolution in the time domain and
the first step toward anti-jamming. In this direction, a Doppler frequency domain [63]. So, the chaotic FM
CNN based method for classification of radar jamming signal is used to improve the ECCM capabilities of
signal is discussed in [57]. In this method at first, a 1D- radar. However, the drawback is when the chaotic signal
CNN is designed for radar jamming signal classification is applied to a pulse radar system; a randomly dis-
under the condition of sufficient training samples. Since tributed range sidelobe appears. Hence, in a multi-target
the collection of sufficient training samples is time- scenario, a high peak sidelobe of a strong target echo can
consuming and expensive so to deal with this issue a mask the mainlobe of a weak target echo. This affects
CNN-based siamese network is then developed for radar the dynamic range and increases the false alarm proba-
jamming signal classification. Both of these methods bility. In order to solve this issue, sidelobe suppression is
have reported good classification accuracy. In [58] a new necessary. In this direction, a sidelobe processing tech-
method of barrage jamming detection and classification nique based on Radial Basis Function (RBF) network
for synthetic aperture radar (SAR) based on CNN is dis- is discussed in [63]. The ability to discover targets at
cussed. The method can effectively detect and classify a great distance even in noisy environments is one of
the jamming in the low-frequency SAR signals. Two the key features of radar systems. So, for maintaining
methods of predicting the appropriate jamming tech- a high probability of detection and low false alarm rate
nique for a received threat signal using deep learning CFAR detectors are used. Hence for lowering the false
are presented in [59]. Firstly, a DNN is used on feature alarm rate, an ANN-based target detector with partial
values extracted manually from the pulse description cell averaging constant false alarm rate (CA-CFAR)
width (PDW) list of the radar signal. Secondly, long supervised training is presented in [64].
short-term memory (LSTM) is used that takes the PDW
Among the ML/DL techniques the following are suitable:
list as input. These deep learning models predict suitable
jamming techniques for received threat signals without 1) ANN: It is a simplified mathematical analogue of hu-
using the library. The prediction performance and time man’s neural network. It is used to process the input
complexity of the two methods are then compared. It information by the layer-wise style for regression and
is reported that the prediction accuracy of the LSTM classification tasks. ANN can learn by themselves and
model is higher than the DNN model but the former produce the output that is not limited to the input
requires longer training time. Chaff plays a significant provided to them. Because of their parallel architec-
VOLUME 4, 2016 17
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
18 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
[12] A. D. Martino, Introduction to modern EW systems, Artech House [36] G. Liu, H. Bao and B. Han, “A Stacked Autoencoder-Based Deep Neural
Publishers, 2012. Network for Achieving Gearbox Fault Diagnosis," Mathematical Prob-
[13] F. Neri, Introduction to Electronic Defense Systems, 2nd ed., SciTech lems in Engineering, Hindawi, Volume 2018, pp. 1-10, 2018. Available:
Publishing, 2006. https://doi.org/10.1155/2018/5105709
[14] M. Singh, Electronic warfare, Defence Scien- [37] R. B. Palm, “Prediction as a candidate for learning deep hierarchical
tific Information and Documentation Centre, 1988, models of data," Master’s thesis, Technical university of Denmark, 2012.
Available:https://www.drdo.gov.in/sites/default/files/publcations- [38] Z. Qu, W. Wang, C. Hou and C. Hou, “Radar Signal Intra-Pulse Mod-
document/Electronic ulation Recognition Based on Convolutional Denoising Autoencoder and
[15] L.B. Van Brunt, Applied ECM, 1st ed, vol. 1. Dunn Loring, VA: EW Deep Convolutional Neural Network," in IEEE Access, vol. 7, pp. 112339-
Engineering, 1978. 112347, 2019, doi: 10.1109/ACCESS.2019.2935247.
[16] F. A. Butt and M.Jalil, “An Overview of Electronic Warfare in Radar [39] Y.Li, X. Wang, D. Liu, Q. Guo, X. Liu, J. Zhang and Y. Xu, “On
Systems," In proceedings of International Conference on Technological the Performance of Deep Reinforcement Learning Based Anti-jamming
Advances in Electrical, Electronics and Computer Engineering (TAEECE), Method Confronting Intelligent Jammer," Applied Sciences, vol. 9, no. 7,
2013, pp. 213-217. pp. 3161-3176, 2019.
[17] P. M. Grant and J. H. Collins, “Introduction to electronic warfare," In the [40] S. Gecgel, C. Goztepe and G. K. Kurt, “Jammer Detection based on
IEE Proceedings F-Communications, Radar and Signal Processing, 1982, Artificial Neural Networks: A Measurement Study," In Proceedings of the
pp. 113-132. ACM Workshop on Wireless Security and Machine Learning, 2019, pp. 43-
[18] M. I. Skolnik, Radar Handbook, 3rd ed. McGraw-Hill, 2008. 48.
[19] S. Haykin, Neural Networks: A Comprehensive Foundation, 2nd edition, [41] J. Gao, Y. Lu, J. Qi and L. Shen, “A Radar Signal Recognition System
Prentice Hall, 1999. Based on Non-Negative Matrix Factorization Network and Improved Arti-
[20] Z. Boussaada, O. Curea, A. Remaci, H. Camblong, and N. Mrabet ficial Bee Colony Algorithm," in IEEE Access, vol. 7, pp. 117612-117626,
Bellaaj, “A Nonlinear Autoregressive Exogenous (NARX) Neural Net- 2019, doi:10.1109/ACCESS.2019.2936669.
work Model for the Prediction of the Daily Direct Solar Radiation," [42] S. Salari,F. Chan and S. Rajan, “Blind Compressive-Sensing Based Elec-
Energies, vol. 11, no. 3, pp. 620-641, Mar. 2018 [Online]. Available: tronic Warfare Receiver," IEEE Transactions on Aerospace and Electronic
http://dx.doi.org/10.3390/en11030620 Systems, vol. 53, no. 4, pp. 2014-2030, 2017.
[21] Y. E. Shao and S.-C. Lin, “Using a Time Delay Neural Network Approach [43] S. You, M. Diao and L. Gao, “Deep Reinforcement Learning for Target
to Diagnose the Out-of-Control Signals for a Multivariate Normal Process Searching in Cognitive Electronic Warfare," in IEEE Access, vol. 7, pp.
with Variance Shifts," Mathematics, vol. 7, no. 10, pp. 959-973, Oct. 2019 37432-37447, 2019, doi: 10.1109/ACCESS.2019.2905649.
[Online]. Available: http://dx.doi.org/10.3390/math7100959 [44] S. H. Hamilton and A. J.Jakeman, “Artificial Intelligence techniques: An
[22] K. Nikola ,D. Medak, Z. Robert and M. Rezo, “Machine Learning Methods introduction to their use for modelling environmental systems," Mathemat-
for Classification of the Green Infrastructure in City Areas," ISPRS Inter- ics and Computers in Simulation, vol. 78, no. 2, pp. 379-400, 2008.
national Journal of Geo-Information, vol. 8, no.10, pp. 1-14, 2019.
[45] N. Waghray and P. M. Menghal, “Simulation of Radar Topology Networks
[23] S. Amuru and R. M. Buehrer, “Optimal Jamming using Delayed Learn-
to Evolve the Electronic Warfare Survivability Metrics," In Proceedings of
ing," In Proceedings of IEEE Military Communications Conference, 2014,
3rd International Conference on Electronics Computer Technology, 2011,
pp. 1528-1533.
pp. 355-359.
[24] Y. Liu and Q. Zhang, “An improved algorithm for PRI modulation
[46] D. Wei, S. Zhang, S. Chen , H. Zhao and L. Zhu, “Research on decep-
recognition," In proceedings of IEEE International Conference on Signal
tion jamming of chaotic composite short-range detection system based on
Processing, Communications and Computing (ICSPCC), 2017, pp. 1-5.
bispectral analysis and genetic algorithm-back propagation," International
[25] X. Liao, B. Li and B. Yang, “A Novel Classification and Identification
Journal of Distributed Sensor Networks, vol. 15, no. 5, pp. 1-11, 2019.
Scheme of Emitter Signals Based on WardŠs Clustering and Probabilistic
[47] J. R. Allen and G. Massolo, The global race for technological superiority-
Neural Networks with Correlation Analysis", Computational Intelligence
Discover the Security Implications, Ledizioni Ledi Publishing, 2019.
and Neuroscience, vol. 2018, Article ID 1458962, pp. 1-15 , 2018. Avail-
able: https://doi.org/10.1155/2018/1458962 [48] J. E. Baker, “Artificial Intelligence and National Security Law: A
[26] N. Petrov, I. Jordanov and J. Roe, “Radar Emitter Signals Recognition and Dangerous Nonchalance."Accessed: Jan. 9, 2020. [Online]. Available:
Classification with Feedforward Networks," Procedia Computer Science, https://cis.mit.edu/publications/starr-forum-report/18-01-report
vol. 22, pp. 1192-1200, 2013. [49] Z. Shi, S. Tang and X. Zhang, “Simulation of Radar Electronic Warfare
[27] C. M. Jeong, Y.G. Jung, and S.J. Lee, “Neural network-based radar signal Range of Visualization Applications," In Proceedings of International Con-
classification system using probability moment and ApEn," Soft Computing, ference on Computer Application and System Modeling (ICCASM 2010),
vol. 22, no. 13, pp. 4205-4219, 2018. 2010, pp. 93-96.
[28] T. Wan, X. Fu, K. Jiang, Y. Zhao and B. Tang, “Radar Antenna Scan [50] Z. S. Davis, Artificial Intelligence on the Battlefield- An Initial
Pattern Intelligent Recognition Using Visibility Graph," in IEEE Access, Survey of Potential Implications for Deterrence, Stability, and Strate-
vol. 7, pp. 175628-175641, 2019, doi: 10.1109/ACCESS.2019.2957769. gic Surprise. Center for Global Security Research Lawrence Liver-
[29] B. Barshan and B. Eravci, “Automatic Radar Antenna Scan Type Recog- more National Laboratory,[online document], 2019. Retrieved from
nition in Electronic Warfare," IEEE Transactions on Aerospace and Elec- https://cgsr.llnl.gov/research/occasional-papers
tronic Systems, vol. 48, no. 4, pp. 2908-2931, 2012. [51] R. Brooks, “Technology and Future War Will Test US Civil-
[30] X. Qiang, Z. Wei-gang and B. Yuan, “Jamming Style Selection for Small Military Relations."Accessed: Jan. 9, 2020. [Online]. Available:
Sample Radar Jamming Rule Base," In proceedings of IEEE International https://warontherocks.com/2018/11/technology-and-future-war-will-
Conference on Signal Processing, Communications and Computing (IC- test-u-s-civil-military-relations/
SPCC), 2018, pp. 1-5. [52] Microwave and RF staff, “BAE Bets on Use of Artificial
[31] Y. Bengion and O. Delalleau, “On the expressive power of deep architec- Intelligence in Electronic Warfare."Accessed: Jan. 9, 2020.[online].
tures," In Proceedings of the 14th International Conference on Discovery Available:https://www.mwrf.com/markets/defense/article/21849838/bae-
Science, 2011, pp. 18-36. bets-on-use-of-artificial-intelligence-in-electronic-warfare
[32] H. Yi, S. Shiyu, D. Xiusheng and C. Zhigang, “A study on Deep Neural [53] F. Wang, S. Huang, H. Wang and C. Yang, "Automatic Modulation Clas-
Networks framework," In proceedings of IEEE Advanced Information Man- sification Exploiting Hybrid Machine Learning Network", Mathematical
agement, Communicates, Electronic and Automation Control Conference Problems in Engineering, vol. 2018, Article ID 6152010, pp. 1-14, 2018.
(IMCEC), 2016, pp. 1519-1522. Available:https://doi.org/10.1155/2018/6152010
[33] Y. Bengio, “Learning Deep Architectures for AI," Foundations and [54] J. Dudczyk and A. Kawalec, “Specific Emitter Identification Based on
Trendső in Machine Learning, vol.2, no.1, pp. 1-127,2009. Available: Graphical Representation of the Distribution of Radar Signal Parameters,"
http://dx.doi.org/10.1561/2200000006 Bulletin of the polish academy of sciences technical sciences, vol. 63, no. 2,
[34] Y. Bengio, P. Lamblin and D. Popovici, “Greedy layer-wise training 2019, doi:10.1515/bpasts-2015-0044 .
of deep networks," In proceedings of 20th annual conference on neural [55] M. Zhang, M. Diao, L. Gao and L. Liu, “Neural Networks for Radar
information processing systems, 2007, pp. 153-160. Waveform Recognition," Symmetry, vol. 9, no. 5, pp. 75-95, 2019.
[35] I. Goodfellow, Y. Bengio and A. Courville, Deep Learning: Adaptive [56] J. Chen, S. Xu, J. Zou and Z. Chen, “Interrupted-Sampling Repeater
Computation and Machine Learning series, MIT Press, 2016. Jamming Suppression Based on Stacked Bidirectional Gated Recurrent Unit
VOLUME 4, 2016 19
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3044453, IEEE Access
Network and Infinite Training," in IEEE Access, vol. 7, pp. 107428-107437, NIKOS MASTORAKIS (Senior Member, IEEE)
2019, doi:10.1109/ACCESS.2019.2932793. received the B.Sc. (Ptychion) degree in pure math-
[57] G. Shao, Y. Chen and Y. Wei, “Convolutional Neural Network-Based ematics, the B.Sc. and M.Sc. (Diploma) degrees
Radar Jamming Signal Classification With Sufficient and Limited Sam- in electrical engineering, and the Ph.D. degree in
ples," in IEEE Access, vol. 8, pp. 80588-80598, 2020, doi: 10.1109/AC- electrical engineering and computer science from
CESS.2020.2990629. the National University of Athens, Greece. He also
[58] Y. Junfei, L. Jingwen, S. Bing and J. Yuming, “Barrage Jamming Detection studied medicine at the Medical School of Athens,
and Classification Based on Convolutional Neural Network for Synthetic
National University of Athens. He had served as
Aperture Radar," In the proceedings of IEEE International Geoscience and
a special scientist on computers and electronics
Remote Sensing Symposium (IGARSS), Valencia, Spain, 2018, pp. 4583-
4586, doi: 10.1109/IGARSS.2018.8519373. in the Hellenic (Greek) Army General Staff from
[59] G. H. Lee, J. Jo, and C. H. Park, “Jamming Prediction for 1993 to 1994 and taught several courses at the Electrical and Computer
Radar Signals Using Machine Learning Methods," Security and Com- Engineering Department, National Technical University of Athens, from
munication Networks, vol. 2020, pp. 1-9, 2020. Retrieved from: 1994 to 1998. He was a Visiting Professor with the School of Engineering,
https://doi.org/10.1155/2020/2151570 University of Exeter, U.K., in 1998, and a Visiting Professor with the
[60] Y. Liu, S. Xing, Y. Li, D. Hou and X. Wang, “Jamming recognition method Technical University of Sofia, Bulgaria, from 2003 to 2004. He is currently
based on the polarisation scattering characteristics of chaff clouds," IET a Professor with the Technical University of Sofia and the Department of
Radar, Sonar and Navigation, vol. 11, no. 11, pp. 1689-1699, 2017. Computer Science, Military Institutions of University Education (MIUE)-
[61] F. Ruo-Ran, “Compound Jamming Signal Recognition Based on Neural Hellenic Naval Academy, Greece. He was the first that solved with sev-
Networks," In the proceedings of Sixth International Conference on In- eral different approaches to the former unsolved problem of multivariable
strumentation and Measurement, Computer, Communication and Control factorization and published it. He was also the first scholar that completely
(IMCCC), Harbin, 2016, pp. 737-740, doi: 10.1109/IMCCC.2016.163. solved the problem of stability for multidimensional systems using genetic
[62] L. Kang, J. Bo, L. Hongwei and L. Siyuan, “Reinforcement Learning based algorithms. It was the first that constructed electronic musical instrument
Anti-jamming Frequency Hopping Strategies Design for Cognitive Radar,"
with the spaces of the Byzantine music. He is an active researcher in applied
In the proceedings of IEEE International Conference on Signal Processing,
mathematics and computer science (systems theory, control, optimization
Communications and Computing (ICSPCC), Qingdao, 2018, pp. 1-5, doi:
10.1109/ICSPCC.2018.8567751. theory, algorithms theory, signal processing, robotics, and computational
[63] Q. Y. Tan and Y. Song, “Sidelobe Suppression Algorithm for Chaotic intelligence). He has edited more than 200 books and authored five books.
FM Signal Based on Neural Network," In the proceedings of International He has published more than 600 papers in international books, journals, and
Conference on Signal Processing, Beijing, 2008, pp. 2429-2433. conferences. He is also a member of the New York Academy of Sciences, the
[64] J. Akhtar and K. E. Olsen, “A Neural Network Target Detector with A. F. Communications and Electronics Association, the American Associa-
Partial CA-CFAR Supervised Training," In the Proceedings of Interna- tion for the Advancement of Science, and other smaller scientific societies.
tional Conference on Radar (RADAR), Brisbane, QLD, 2018, pp. 1-6, doi: He is an active reviewer of 26 international journals, a member of the
10.1109/RADAR.2018.8557276. Editorial Board of 13 international journals, and an Editor of International
[65] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning," Nature, vol. 521, Book Series: Editor of the series ”Electrical and Computer Engineering”
pp. 436-444, May 2015, doi: 10.1038/nature14539. (WSEAS Press) and Editor of the series ”Mathematics and Computers in
Science and Engineering” (WSEAS Press). He is a member of the Editorial
Board of Advances in Computation: Theory and Practice (NOVA). He has
received several awards, including the Royal Society of England and the
Hellenic National Research Foundation, for his academic studies and his
scientific research. He is the Editor-in-Chief in many international journals.
He was the General Chairman in more than 30 international conferences.
PURABI SHARMA is currently a Ph.D. Research He has organized more than 40 special sessions and three workshops and
Scholar in the Department of Electronics and has given many plenary lectures. He is a registered Professional Electrical
Communication Engineering, Gauhati University, and Mechanical Engineer. He has received the Prize of Excellence from the
Guwahati, Assam, India. She received the B. E de- Romanian Academy of Science, Bucharest, Romania.
gree in Electronics and Telecommunication Engi-
neering from GIMT, Guwahati, India in 2011 and
M.Tech degree in Electronics and Communication
Engineering from Gauhati University, Guwahati,
Assam, India in 2013. Her area of interests in-
cludes applications of soft-computational tools,
Bio-medical image processing, and signal processing.
20 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
View publication stats