{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T13:31:29Z","timestamp":1774877489728,"version":"3.50.1"},"reference-count":25,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Radar unconventional active jamming, including unconventional deceptive jamming and barrage jamming, poses a serious threat to wideband radars. This paper proposes an unconventional-active-jamming recognition method for wideband radar. In this method, the visibility algorithm of converting the radar time series into graphs, called visibility graphs, is first given. Then, the visibility graph of the linear-frequency-modulation (LFM) signal is proved to be a regular graph, and the rationality of extracting features on visibility graphs is theoretically explained. Therefore, four features on visibility graphs, average degree, average clustering coefficient, Newman assortativity coefficient, and normalized network-structure entropy, are extracted from visibility graphs. Finally, a random-forests (RF) classifier is chosen for unconventional-active-jamming recognition. Experiment results show that recognition probability was over 90% when the jamming-to-noise ratio (JNR) was above 0 dB.<\/jats:p>","DOI":"10.3390\/s19102344","type":"journal-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T10:52:51Z","timestamp":1558435971000},"page":"2344","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Novel Unconventional-Active-Jamming Recognition Method for Wideband Radars Based on Visibility Graphs"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1274-319X","authenticated-orcid":false,"given":"Congju","family":"Du","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Bin","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1049\/ecej:19900035","article-title":"Digital radio frequency memory","volume":"2","author":"Roome","year":"1990","journal-title":"Electron. Commun. Eng. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TAES.2003.1207279","article-title":"Digital radio frequency memory linear range gate stealer spectrum","volume":"39","author":"Berger","year":"2003","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref_3","unstructured":"Schleher, D.C. (1999). Electronic Warfare in the Information Age, Artech House. [1st ed.]."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MAES.2004.1263229","article-title":"A STAP overview","volume":"19","author":"Melvin","year":"2004","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/78.905870","article-title":"Adaptive beamformer orthogonal rejection test","volume":"49","author":"Pulsone","year":"2001","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_6","unstructured":"Yang, X., Ruan, H., and Feng, H. (2017, January 21\u201323). A recognition algorithm of deception jamming based on image of time-frequency distribution. Proceedings of the 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), Macau, China."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/8.384191","article-title":"Optimal receive antenna polarization in the presence of interference and noise","volume":"43","author":"Stapor","year":"2002","journal-title":"IEEE Trans. Antennas Propag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1109\/TSP.2007.909326","article-title":"Radar detection and classification of jamming signals based on cone classes","volume":"56","author":"Greco","year":"2008","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"5984","DOI":"10.1109\/TSP.2010.2077283","article-title":"Detection Algorithms to Discriminate Between Radar Targets and ECM Signal","volume":"58","author":"Bandiera","year":"2010","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1080\/00207217.2012.743095","article-title":"Product spectrum matrix feature extraction and recognition of radar deception jamming","volume":"100","author":"Tian","year":"2013","journal-title":"Int. J. Electron."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Diks, C. (1999). Nonlinear Time Series Analysis, World Scientific.","DOI":"10.1142\/3823"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1063\/1.166424","article-title":"Practical implementation of nonlinear time series methods: The TISEAN package","volume":"9","author":"Hegger","year":"1999","journal-title":"Chaos: Interdiscip. J. Nonlinear Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018small-world\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Barabasi","year":"1999","journal-title":"Science"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4972","DOI":"10.1073\/pnas.0709247105","article-title":"From time series to complex networks: the visibility graph","volume":"105","author":"Lacasa","year":"2008","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"046103","DOI":"10.1103\/PhysRevE.80.046103","article-title":"Horizontal visibility graphs: exact results for random time series","volume":"80","author":"Luque","year":"2009","journal-title":"Phys. Rev. E"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1209\/0295-5075\/4\/9\/004","article-title":"Recurrence Plots of Dynamical Systems","volume":"4","author":"Eckmann","year":"1987","journal-title":"Europhys. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"046105","DOI":"10.1103\/PhysRevE.85.046105","article-title":"Analytical framework for recurrence network analysis of time series","volume":"85","author":"Donges","year":"2012","journal-title":"Phys. Rev. E"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1381","DOI":"10.1016\/j.physa.2007.10.055","article-title":"Complex network-based time series analysis","volume":"387","author":"Yang","year":"2008","journal-title":"Physica A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.physa.2014.05.058","article-title":"Time series analysis of the developed financial markets\u2019 integration using visibility graphs","volume":"410","author":"Zhuang","year":"2014","journal-title":"Physica A"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.physa.2014.03.038","article-title":"Dynamic analysis of traffic time series at different temporal scales: A complex networks approach","volume":"405","author":"Tang","year":"2014","journal-title":"Physica A"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.physa.2014.08.048","article-title":"Visibility graph analysis of 2002\u20132011 Pannonian seismicity","volume":"416","author":"Telesca","year":"2014","journal-title":"Physica A"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"016131","DOI":"10.1103\/PhysRevE.64.016131","article-title":"Scientific collaboration networks. I. Network construction and fundamental results","volume":"64","author":"Newman","year":"2001","journal-title":"Phys. Rev. E"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","article-title":"Assortative Mixing in Networks","volume":"89","author":"Newman","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random Forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/10\/2344\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:54:01Z","timestamp":1760187241000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/10\/2344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,21]]},"references-count":25,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["s19102344"],"URL":"https:\/\/doi.org\/10.3390\/s19102344","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,21]]}}}