A Novel Interrupted-Sampling Repeater Jamming Suppression Method Based on Time-Frequency Analysis and Target Sparse Reconstruction

Interrupted-sampling repeater jamming (ISRJ) is a new kind of coherent jamming for linear frequency modulation (LFM) signals. Based on digital radio frequency memory (DRFM), ISRJ can generate multiple false target groups by intercepting, storing, and retransmitting radar signal fragments, which significantly affects the postprocessing results of radar systems. Furthermore, due to the fragment interception of ISRJ, ISRJ false targets present a regular and discontinuous time-frequency (TF) distribution in contrast with real targets. Considering this intrinsic property and the coherent nature of ISRJ, this study proposes a new method based on TF analysis and target sparse reconstruction to address the ISRJ suppression issue. In this method, the echo signal is first sparsely represented to obtain both the real and false target positions. Then, according to the acquired target positions, information entropy features of targets are extracted in TF data for subsequent target identification. Finally, guided by the identification result, the real targets can be retained and reconstructed by adaptive filtering in the sparse domain to realize ISRJ suppression. Simulations have validated the effectiveness of the proposed method under various situations.


Introduction
Linear frequency modulation (LFM) signal is widely used in modern radar systems, and its large time-bandwidth product enables it to obtain a large coherent processing gain [1], which greatly mitigates the e ect of noise jamming and other noncoherent jammings [2].
erefore, coherent jamming is receiving increasing attention. With the widespread use of digital radio frequency memory (DRFM) in electronic countermeasures (ECM), many types of active coherent jammings have been developed. DRFM can coherently duplicate radar signals so that the transmission power requirement of jammers is lowered [3]. Meanwhile, DRFM is also characterized by adjustable jamming parameters and portability on different platforms, posing a severe threat to the radar system [4,5].
ere are two main working modes for DRFM-based jammers [6]. e rst working mode is to intercept and forward the entire radar signal pulse, thus the generated jamming signal is able to obtain the coherent processing gain to the maximum extent and form a highly realistic deceptive target. Nevertheless, this kind of jamming cannot take e ect until the next pulse repetition interval (PRI), so radar systems can adopt strategies such as interpulse waveform agility [7,8], frequency agility [9,10], and protecting signal [11] to counter such jamming. Besides, this working mode is restricted by the high isolation of two receive-and-transmit antennas and the sampling rate of the wideband signal, so it cannot be exibly applied to small platforms such as missiles and unmanned aerial vehicles (UAVs) [12].
In order to solve the inherent defects of the rst working mode, the other working mode named the interruptedsampling-repeating mode came into being. In this mode, interrupted-sampling repeater jamming (ISRJ) is proposed [13]. It intercepts, stores, and repeatedly forwards radar signals within a pulse duration and can generate a series of false targets after pulse compression (PC). e intrapulse jamming characteristic of ISRJ solves the application limitation of the first working mode and also invalidates the abovementioned jamming countermeasures. On this basis, scholars have further explored the application prospect and derivative forms of ISRJ [14][15][16][17][18][19][20][21][22]. In terms of specific application, the jamming theory and effect of ISRJ have been tested on various LFM wideband radars, such as PC radar [14], dechirping radar [15], and range doppler (RD) imaging radar [16][17][18]. In addition, Li et al. [19] quantify the influence of signal interception ratio on jamming power loss and evaluate the corresponding jamming effect. In the aspect of derived jamming types, Liu [20] proposes interruptedsampling loop jamming (ISLJ) by changing the forwarding mode of intercepted radar signal fragments. In [21], ISRJ is combined with the scatter wave, and the jamming effect of resulting intermittent sampling scatter-wave jamming on SAR is verified. In [22], an improved ISRJ is proposed, which can generate false targets ahead of real targets by means of frequency shifting. However, the jamming thus formed may lead to an inevitable energy loss of the generated false targets.
On account of the practicality of ISRJ, the suppression methods against ISRJ have attracted extensive attention since ISRJ was proposed. ese methods can be divided into waveform design methods and signal filtering methods. e waveform design methods divide the transmitted signal into multiple segments and then perform subpulse compression separately to destroy the intrapulse coherence of ISRJ as much as possible. For instance, Zhang et al. use a stepped LFM signal [23] and an intrapulse LFM-Costas frequency stepping signal [24] to increase the orthogonality among subpulses, thus the jammed subpulses can be easily eliminated through the energy threshold after subpulse compression. Similarly, a mixed modulation of frequency-shift keying (FSK)/phase-shift keying (PSK) signal is employed in [25] to distinguish the real targets from false ones via the accumulated target detection results after subpulse compression. In [26], guided by the estimated jamming parameters, Zhou et al. optimize the transmitted waveform by adopting protective pulses and genetic algorithms. Overall, the performance of the waveform design methods mainly depends on the orthogonality between the transmitted signal and ISRJ, and the energy loss of the real target increases when the jamming duty ratio becomes larger. e signal filtering methods realize jamming removal by filtering in a certain transform domain. In these methods, one option is to extract the jamming-free radar signal fragments through energy function [27,28], timefrequency (TF) function [29], and neural network [30]. is option, however, relies heavily on the intensity of the jamming signal and performs relatively poorly under weak jamming conditions. e other option is based on TF analysis. For the dechirping radar, a band-pass filtering process is carried out in the frequency domain [31,32] [34] to improve the estimation accuracy of ISRJ sampling slice width. Yet, the performance of these methods is sensitive to the parameter estimation accuracy [35,36] and provides new ideas for jamming suppression. In [35], Lu et al. initially apply a TF mask to filter out the wideband jamming signal and then reconstruct the target signal according to the compressed sensing theory. In [36], the PC result is transformed into the TF domain, and a TF filter can be designed to filter out the false targets directly after determining the range gates of real targets. Nevertheless, this approach is limited by the contradiction between time resolution and frequency resolution in the TF transform, so it cannot accurately determine the extraction locations and the spectrum widths of the target range gates simultaneously. In [37], a new method for ISRJ suppression is proposed based on real target locating and recovery; the success rate of this method depends on the real target locating precision of the neural network. Although the method is limited to a single real target recovery, for the time being, it provides a new solution for ISRJ suppression.
In this context, according to the coherence of ISRJ and the different TF distribution characteristics between ISRJ false targets and real targets, this study proposes a new ISRJ suppression method for LFM PC radars based on TF analysis and target sparse reconstruction.
is method converts the jamming suppression problem into a target binary classification problem, and the targets of interest can be recovered through sparse reconstruction assisted by the target identification result. Owing to the use of TF information entropy (TFIE) features, the proposed method can achieve an overall high target identification accuracy, and ISRJ false targets as well as the noise signal can be greatly suppressed after real target reconstruction. Furthermore, in the stage of TF feature extraction, the proposed method can locate the targets precisely by means of sparse representation and thus is free from the time resolution limit in the TF transform. e structure of this study is as follows. Section 2 first introduces the ISRJ signal model and then analyzes the PC result of ISRJ and its corresponding TF distribution. Section 3 proposes the ISRJ suppression method, in which the procedures of target identification using TFIE and target sparse reconstruction are introduced in detail. Section 4 conducts lots of simulations to verify the effectiveness of the proposed method and also studies the factors affecting the antijamming probability. Finally, the main conclusions are drawn in Section 5.

Principle of ISRJ
2.1. ISRJ Signal Model. ISRJ is mainly used for self-defensive purposes in defense penetration scenarios [28]. For the formation process of ISRJ, the jammer first intercepts and stores a fragment of the radar-transmitting signal and then forwards it repeatedly many times. is process is repeated till the end of the radar signal pulse, as shown in Figure 1.

International Journal of Antennas and Propagation
We assume that the radar transmits LFM signal sig(t) with pulse width T and bandwidth B, and the distance between the radar and the real target is R tar , then the target echo signal can be represented as where rect(t/T) is a rectangular window function with window length T and starting point 0, σ tar and τ tar � 2R tar /c represent the intensity and the propagation time delay of the target echo signal, respectively. k � B/T is the frequency modulation rate of the LFM signal, and c is the speed of light. As Figure 1 illustrates, the jammer samples the radar signal at a certain repeat sampling interval T S within a signal pulse width, and the sampling slice width is T W . Accordingly, the sampling function p(t) can be defined as where ⊗ denotes the convolution operator, N � T − T W )/T S is the number of sampled radar signal fragments [29,30], and ⌈•⌉ is the round-up operator. Note that the relationship between the repeat sampling interval T S and the sampling slice width T W is T S � (M + 1)T W , in which M is the forwarding time of a jamming slice. erefore, the radar signal fragments sampled and stored by the jammer can be obtained as Finally, the jammer forwards the stored radar signal fragments for M times to generate the resulting jamming signal, which can be expressed as where σ jam indicates the intensity of the jamming signal.

PC Result of ISRJ.
For LFM radar, the PC process can be regarded as the time-domain convolution between the echo signal and LFM radar matched filter sig * (−t). For the jamming slice formed by the m th forwarding of the n th sampled signal fragment, the PC result can be formulated as follows: International Journal of Antennas and Propagation where phase(t) � πk(t − mT W )(2nT S + mT W − t). τ tar is omitted for convenience, which does not affect the derivation result. Equation (5) shows that the PC result of a jamming slice is a "sinc" form function with corresponding time delay and phase shift. Moreover, for all jamming slices with the m th forwarding time, their PC results can be represented as where β m (t) � πk(t − mT W )T S . erefore, the amplitude response of the whole ISRJ PC result can be expressed as As depicted by equation (7), it can be seen that ISRJ can generate M false target groups after PC, and different false target groups are formed by the sampled radar signal fragments of different forwarding times. For a particular false target group, when β m (t) � iπ, i.e., t � i/kT S + mT W , iϵN, a local peak value can be achieved with In summary, ISRJ can generate multiple false target groups whose amplitude responses are codetermined by T W , σ jam , N, and M. Among them, T W , σ jam , and N jointly determine the amplitude peak value. At the same time, T W also decides the distribution intervals among false target groups. Finally, M determines the number of false target groups.

TF Analysis of PC Result.
As a joint function of time and frequency, the TF transform can explicitly describe the variation of signal frequency over time and has become an essential tool for analyzing nonstationary signals. In general, linear TF transform is realized by short-time Fourier transform (STFT), which can be expressed as where s(t) is the input signal to be analyzed, and h(t) is a sliding window function.
For the PC results of ISRJ, taking S m,n PC (t) as an example, when a rectangular window is employed, the TF distribution can be formulated as where τ is the sliding time, and b is the sliding window length. Equation (9) is a Fresnel integral, so an exact analytical solution cannot be derived. An approximation is obtainable through the principle of stationary phase. According to the principle of stationary phase, let the derivative of phase φ(t) � phase(t) − 2πft be zero, and we can get that the relationship between time and frequency is By substituting equation (9) into equation (10), the approximate amplitude response of this integral can be obtained as 4 International Journal of Antennas and Propagation It can be seen from (10) that the TF distribution of a certain ISRJ jamming slice after PC presents the form of "sinc" in the time domain and frequency domain, respectively, and its corresponding positions in these two signal domains separately depend on the interception order n and the forwarding order m of the sampled radar signal fragment. erefore, the PC result of the whole ISRJ appears as multiple sinc-shaped fluctuations regularly arranged in the TF domain.
Besides ISRJ, the echo signal also contains target echo signals and noise signal n(t), i.e., where the TF distributions of the noise signal and target echo signal after PC are easy to learn. e energy of the noise signal scatters evenly throughout the TF domain because the noise signal cannot obtain coherent processing gain in the PC process. In contrast, the energy of the target echo signal after PC concentrates on a specific range gate and distributes uniformly within the bandwidth as a result of linear frequency modulation, presenting a time-unvarying and continuous line in the TF domain. e TF distribution of the echo signal after PC is shown in Figure 2, which is consistent with the above analysis. In the TF domain, the target echo signal after PC presents a continuous strip distribution, while the false targets present a regular and discontinuous distribution due to the fragment interception and forwarding of ISRJ. erefore, real targets and false target groups can be well distinguished on the basis of different TF distribution characteristics.

Target Identification Based on TF Information Entropy.
Information entropy is an important metric for measuring the uncertainty of the information source, which solves the problem of quantitative measurement of information. We assume that the occurrence probability of each event in an event set S is P � p 1 , p 2 , · · · , p l , where l is the total number of events in S, and l e�1 p e � 1. en, information entropy can be defined as where α is set at 2 in this study. When the influence of noise is not considered, the instantaneous spectrums of target range gates are shown in Figure 3. For the range gate of the real target, the instantaneous spectrum has the spectrum characteristic of LFM signals. By contrast, for the range gate of the ISRJ false target, in line with the analysis in Section 2.3, the instantaneous spectrum has a regular distribution of sinc-shaped fluctuations, resulting in a lower TFIE. In practice, due to the signal edge effect in the TF transform, the instantaneous spectrums of real targets and ISRJ false targets will affect each other.
In consideration of the different TF distribution characteristics between real targets and ISRJ false targets in the TF domain, this study proposes a target identification method based on TFIE. Specifically, the target range gates can be determined through sparse representation, which has been an emerging signal-processing approach in recent years. Signal sparse representation aims to capture the intrinsic nature of the signal and represent the signal with a few atoms in a given overcomplete dictionary, so as to obtain a more concise representation of the signal, which facilitates further signal processing as well as information acquisition. With the radar-transmitting signal dictionary, the real targets and main false targets can be precisely located due to the energy matching by range gates. After locating the target range gates, features of target instantaneous spectrums can be extracted for target identification. In this study, a support vector machine (SVM), a generalized linear classifier for multivariate classification based on supervised learning, is employed in the target identification process. By learning the data distribution, SVM can determine the decision boundaries among different target groups, thus realizing target distinguishment. e process of TFIE extraction is as follows: (1) Transforming the PC result of the echo signal into the TF domain through STFT.
where a fj , jϵN, is the amplitude of each frequency point, A is the total amplitude value, and L is the fixed sampling number of the instantaneous spectrum after bandwidth normalization. (5) Calculating TFIE values of the corresponding targets using equation (13).
After the above feature extraction steps are completed, the extracted TFIE features are input into an SVM for target identification.

Sparse Reconstruction of Real Target.
Since ISRJ is generated by fragment interception, storage, and repeated forwarding of radar-transmitting signals, each generated jamming slice can be seen as a radar-transmitting signal with shorter pulse width and different time delay. erefore, based on the intrapulse coherence of ISRJ, a dictionary of radar-transmitting signals Փ ∈ C N r ×R bin can be designed to match the echo signal under ISRJ, where N r is the sampling number in range direction, and R bin is the number of range gates. Hence, the echo signal can be rewritten as where Փ � [ϕ i,j ] N r ×R bin and the specific element in this dictionary can be represented as where ⌊•⌋ is the round-off operator, and ∆t is the sampling interval. It can be seen from equation (15) that each column in Փ is a delayed form of the radar-transmitting signal, and the time interval between two adjacent columns is ∆t. us, the range resolution of the dictionary can be calculated as ρ r � ∆t•c.
Sparse representation of the echo signal in nature can be viewed as the coherent matching of targets from different range gates, and x ∈ R R bin ×1 represents the matching energy at each range gate. If there are a relatively limited number of significant targets compared with R bin in the imaging scene, the targets can be regarded as sparsely distributed in the range domain.
Consequently, x contains only several nonzero values, and the indexes of these nonzero values correspond to the target positions. It is worth noting that the noise signal n(t) cannot obtain the radar processing gain due to its incoherence, resulting in corresponding negligible energy in the sparse domain. e sparse representation of the echo signal can be realized through the following convex optimization equation: where p is the p− norm, and ] is a trade-off coefficient to balance the optimization proportion between the sparsity ‖x‖ 1 and the residual component r � s r (t) − Փ * x. In (15), the larger the ] is, the more the ‖x‖ 1 is taken into account in the optimization process, and the resulting optimization result x is relatively sparser. However, the residual component is larger in this case. On the contrary, there is less residual component left when ] is smaller, but the sparsity of the sparse representation result will accordingly decrease. A typical sparse representation result is shown in Figure 4. As shown in Figure 4, there are many peaks (nonzero values) at the corresponding positions of the real targets and ISRJ false targets because of their matching characteristics with the dictionary Փ, and the peak values of the false targets within the same false target group conform to the modulation of sin [Nβ m (t)]/sin [β m (t)] envelope, which is in consistency with the derivation result of equation (7). Based on the sparse representation result, the obtained target positions can be expressed as where c is a threshold to distinguish between the range gates with and without targets, and NaN denotes not a number value.   International Journal of Antennas and Propagation With the acquired target positions, TFIE features can be extracted from the instantaneous spectrums for target identification. Assuming that the positions of the identified false targets are r j in the target identification result i t , then an adaptive filter can be accordingly constructed in the sparse domain to retain the peaks of real targets and filter out the peaks caused by ISRJ, which can be expressed as Finally, after amplitude compensation, the reconstructed target echo signals can be obtained as where λ is the amplitude compensation factor, which is the amplitude ratio of the real targets before ISRJ suppression to the corresponding reconstructed targets.

Main
Steps of the Proposed Method. As analyzed in Section 2.3, real targets and ISRJ false targets have different distribution characteristics in the TF domain. erefore, in view of this inherent difference and to make full use of the coherence of ISRJ, this study proposes a method for ISRJ suppression, which can be mainly divided into three steps: sparse representation, target identification, and real target sparse reconstruction. Firstly, considering the coherence of ISRJ, a dictionary of radar-transmitting signals is designed to represent the echo signal sparsely. Due to the matching with the dictionary, there will be peaks at the corresponding positions of the real targets and the ISRJ false targets in the sparse representation domain. en, the echo signal is pulse compressed and transformed into the TF domain.
According to the obtained target positions, the TFIE features of the corresponding targets are extracted for target identification. Consequently, only the identified real targets can be retained in the sparse domain to complete target reconstruction. e detailed steps of the proposed method are listed in Algorithm 1.

Target Identification Result.
In order to verify the effectiveness of TFIE in distinguishing real targets from ISRJ false targets, we set the jamming slice width T W at 5 μs, the forwarding time M � 3, and the jamming-to-signal ratio (JSR) at 15 dB, respectively. Radar transmits LFM signals with bandwidth B � 9MHz and pulse width T � 60μs. Under these settings, the mean TFIE values of real targets and ISRJ false targets are calculated on different signal-tonoise ratio (SNR) conditions, as shown in Figure 5. Each value is the average result of 500 Monte Carlo simulations. It can be seen from Figure 5 that the mean TFIE value of real targets is hardly affected by the change of SNR and remains stable at around 8.94, while that of ISRJ false targets decreases slowly as SNR increases, and at length levels off when SNR is greater than 0 dB. From an overall perspective, the mean TFIE value of ISRJ false targets is lower than that of real targets because of the regular TF distribution of ISRJ false targets. In addition, there is no overlap between the curves of real targets and ISRJ false targets, presenting an obvious distinction.
In [32], Yang et al. use the variance feature to detect ISRJ according to the fluctuation of spectrum energy. However, on account of the difference in data dimension and mean value between the variance feature and the TFIE feature, we  cannot compare the dispersion degree of these two features directly through standard deviation. erefore, the coefficient of variation (C.V) is introduced in this study, which is a normalized metric to measure the dispersion degree and can be defined as the ratio of standard deviation σ to mean value μ, i.e., As a dimensionless quantity, C.V is a better metric to compare the stability among data groups with different dimensions or mean values, as it eliminates the effect brought by various data values. Specifically, the C.V values of these two features are separately calculated by 500 Monte Carlo simulations under each SNR scenario. As demonstrated in Figure 6, both features of targets tend to be more stable with the increase of SNR. But on the whole, the C.V of the TFIE feature is remarkably smaller than that of the variance feature, indicating that the TFIE feature is less discrete and possesses better stability. e proposed method in this study transforms the jamming suppression problem into a binary classification problem for targets. ISRJ suppression can be achieved by adaptive filtering based on the identification result. erefore, the performance of the proposed method depends directly on the target identification accuracy, which can be expressed as where T t is the total target number, and T c represents the number of targets correctly identified.
In the supervised learning process, 4000 sets of TFIE features, including 2000 real target features and 2000 ISRJ false target features (with different orders), are generated under different parameter settings, and they are further Input: e echo signal s r (t), the sliding window h (t), the trained SVM, the dictionary Φ, and the target locating threshold c. Output: Target positions r t , target identification result i t , the reconstructed target echo signal s t .

Begin
(1) Carry out sparse representation x for s r (t); (2) Obtain the target positions r t according to the preset threshold c; (3) Perform pulse compression to s r (t); (4) Implement STFT to transform the PC result S PC (t) into TF domain; (5) Extract TFIE features according to the acquired target positions r t ; (6) Input the TFIE features into the trained SVM and obtain the target identification result i t ; (7) Construct an adaptive filter F based on i t ; (8) Perform adaptive filtering in the sparse representation result x to retain the corresponding peaks of real targets and filter out the corresponding peaks of the false targets; (9) Reconstruct the target echo signal s t through Φ and amplitude compensation to obtain the jamming-free result; End ALGORITHM 1: e proposed method.  e parameter ranges of training samples are listed in Table 1. After several rounds of data generation and training in accordance with the above settings, the average P A based on TFIE can reach 99.46%. e hypothesis test is usually applied to test the robustness of certain conclusions [38]. To further prove the superiority of TFIE in the task of target identification, a onetailed t-test is carried out in this study, in which P A serves as the evaluation metric. For the generated datasets, the average test P A value using TFIE is μ 0 � (1/m 1 ) m 1 s�1 ε s � 0.9217, and the variance is 6). Subsequently, the critical value τ t can be obtained by τ t � �� � m 1 √ |μ 0 − ε 0 |/σ 2 0 �4.347 (where ε 0 � 0.99 is the assumed minimum P A value) and is larger than the 4.032 given by the one-tailed t-test table. is result means that the P A using the TFIE feature is greater than the assumed test P A value (0.99) at a confidence level of (1 − α � 0.995).
In contrast, we also perform a hypothesis t-test on the variance feature with the same datasets, and the intermediate results of the statistical calculation process are listed in Table 2. e TFIE feature can contribute to a higher P A with stronger robustness compared with the variance feature.

Factors Affecting Target Identification Accuracy.
As previously mentioned in Section 3.1, TF features may be affected by the interactions among targets resulting from the signal edge effect in the TF transform. erefore, some key parameters such as T W , σ jam (JSR), SNR, N, and M may have an impact on the target identification result. In this section, extensive experiments are done to explore the effect of these key parameters on P A .
As can be learned from equation (7), the forwarding time M decides the number of false target groups. In other words, M merely decides how far the false targets are distributed in the range domain and is unrelated to target intensity, so it can hardly affect P A . To substantiate this claim, we fix the experimental parameters for the purpose of controlling variables, as shown in Table 3 (for convenience, if not specifically specified, the basic experimental parameters remain unchanged as those in Table 3 in the following simulations). Also, we set the sampling slice width T W uniformly distributed within the range of (T/13, T/11) so that N remains at 3. en, two datasets with 10000 features are generated when the forwarding time M is 4 and 5, respectively. e result demonstrates that the P A values of both datasets are 0.9903, thus indicating that M basically has no direct effect on P A .   In order to study the effect of JSR, SNR, and sampled fragment number N on the target identification accuracy P A , a series of Monte Carlo experiments are carried out in this study. As for the parameter settings, under the condition that the sampling slice width T W � T/14, test datasets under four modes are generated, as shown in Table 4. In each mode, the test datasets are generated from −10 dB to 10 dB with a 2.5 dB SNR interval and from 5 dB to 20 dB with a 1.5 dB JSR interval, respectively. is results in a total of 99 test datasets per mode and 100 Monte Carlo experiments are conducted in each dataset. e variation trends of P A versus SNR and JSR in different jamming modes are illustrated in Figure 7. Simultaneously, the misidentified real targets and false targets are separately counted, and the number distribution versus JSR is shown in Figure 8.
Some key conclusions can be drawn from Figures 7 and  8, which are summarized in the following: (1) When the signal fragment is forwarded immediately after being intercepted, i.e., M � 1, the jamming signal at this time is called interrupted-sampling direct jamming (ISDJ), which differs from ISRJ only in the forwarding time. e Monte Carlo experiment results shown in Figure 7 demonstrate that the proposed method can maintain high levels of P A in these four modes, which means that the proposed method can effectively counter both kinds of jamming signals. (2) According to equation (7), the peak amplitudes of the generated false targets become larger with larger N, which is unfavorable for the correct identification of real targets as they are more likely to be covered by ISRJ false target groups. On the other hand, as analyzed in Section 2.2, false targets are generated at the interval of 1/kT S within a false target group, so a broader jamming area is yielded when N becomes larger (T S is smaller accordingly), exacerbating the overlapping between real targets and false targets. e above two factors lead to an overall lower P A . (3) When JSR is fixed, P A generally rises with the growth of SNR. (4) In the case of low JSR, false targets are relatively weak, and their TF features are more affected than the real target features by the mutual effect among targets. In consequence, the primary cause of identification error in this circumstance is ISRJ false targets, and the error rate drops gradually with the increase of JSR.
(5) e same rule applies to real targets in the case of high JSR. Compared with false target features, the TF features of real targets suffer considerably more from the mutual effect among targets. As a result, the misidentified samples mainly come from real targets, and the target identification accuracy P A falls as JSR increases.
According to equation (6), T W not only determines the intensity of the ISRJ false target group but also decides the distribution intervals among targets. In order to learn the specific influence of T W on P A , two test datasets, including 2000 target features (1000 real target features and 1000 ISRJ false target features), are generated under the conditions of M � 2 and M � 5, respectively. Correspondingly, T W is uniformly distributed in the interval of T W ∈ (1/15, 1/13)T and T W ∈ (1/15, 1/11)T for controlling variables (N remains constant). e misidentified data is statistically analyzed, and the statistical T W distributions are shown in Figure 9.
rough statistical histograms, the error probability of target identification is seen to fall steadily with the increase of T W after a sharp rise at first. In terms of the upward trend, the target distribution interval is relatively small, and the mutual effect among targets cannot be ignored. At this time, the intensity of the false target group becomes stronger as T W increases, so the TF features of the real targets are prone to be affected, bringing about more misidentified real targets. However, when T W grows to a certain degree, the target distribution interval is large enough to significantly weaken the interactions among targets. Consequently, the error rate starts to decline in general.

e Jamming Suppression Performance of the Proposed
Method. On the ground of an overall high target identification accuracy, the jamming suppression performance of the proposed method is tested. We set three real targets at 1.5 km, 3 km, and 5 km, respectively. e sampling slice width T W is fixed at 5 μs, and the intercepted radar signal fragments are forwarded three times. e ISRJ jammer is implemented on the real target at 1.5 km to cover all these three targets.
As shown in Figure 10, under the influence of ISRJ, the real targets are mixed with multiple false target groups in the range direction after PC, leading to the inability of radar systems to acquire effective information on real targets. By sparse representation, the positions of targets are obtained so that the TFIE features of targets can be extracted for the subsequent target identification procedure.
With the target identification result, an adaptive filter can be constructed in the sparse domain by equation (18) to  10 International Journal of Antennas and Propagation  International Journal of Antennas and Propagation remove the corresponding peaks of ISRJ false targets. After amplitude compensation, the final jamming suppression result is obtained, as shown in Figure 11. It can be seen that based on the correct target identification result, all the ISRJ false targets are filtered out, and only the real targets are reconstructed. Moreover, the noise signal in the original echo signal is also suppressed to a significant extent since its energy cannot match with the dictionary in the process of sparse representation. Furthermore, when the real targets and the generated false targets are aliasing in the range direction, which is also a typical scene in common practice, the jamming suppression performance of the proposed method still needs to be tested. Concerning this issue, we set the real target at 3.5 km from the reference point, and the intercepted radar signal is forwarded once to form ISRJ. 4000 sets of target TFIE features are generated with T W ranging uniformly from 1-30 μs to ensure the real target is aliasing in the different positions (from the middle to the edge) of the false target group, and the training range of SNR and JSR is in line with Table 1.
Although the mutual effect among targets brought by the signal edge effect in the TF transform cannot be ignored at this time, the overall target identification accuracy P A still reaches 90.0% in this case, which proves the validity of the proposed method in the target aliasing situation. When the sampling slice width T W � 2.5 μs, the corresponding sparse representation and ISRJ suppression results are shown in Figures 12 and 13, respectively.
In practice, another frequently encountered scenario is that the generated ISRJ false target is located ahead of the real target, which can be achieved by frequency shifting [22]. Similarly, 4000 sets of target TFIE features are generated with the sampling slice width T W set as 4 μs and frequency shift f d ranging from 0.54 MHz to 1.92 MHz to produce false targets preceding the real target. is range also keeps the real target aliasing in the different positions (from the middle to the edge) of the false target group (if not aliasing,   there is no difference from the regular case). Other training parameters remain unchanged. Under this circumstance, the overall P A is 86.0%, demonstrating the effectiveness of the proposed method in the frequency-shifting situation. e decline in P A is caused by frequency shifting, which lowers the regularity of the false target instantaneous spectrums and reduces the feature difference between the real targets and ISRJ false targets. When the frequency shift f d is 1.2 MHz, the corresponding sparse representation and ISRJ suppression results are shown in Figures 14 and 15, respectively.
In order to evaluate the jamming suppression performance quantitatively, the signal-to-jamming ratio improvement factor (SJRIF) is introduced in this study, which is defined as the difference between the signal-tojamming ratio (SJR) after and before ISRJ suppression, i.e., In (21), SJR can be formulated as where I denotes the total number of real targets, a i is the peak amplitude of the i th real target, and a j is the maximum amplitude besides the real targets.
Monte Carlo simulations are conducted in this study to compare the jamming suppression performance of the proposed method with two typical competing methods proposed in [33,36]. e simulations are carried out from −10 dB to 10 dB at 5 dB SNR intervals in the low JSR and high JSR scenarios, respectively. Each result is the averaged result of 500 Monte Carlo simulations, which is displayed in Figure 16.    It can be seen from Figure 16 that the method in [36] is prone to be affected by low SNR situations, while the proposed method outperforms the other two methods for PC radars both in high and low JSR situations, demonstrating its superiority against ISRJ.

Conclusions
ISRJ is a promising intrapulse coherent jamming that regularly intercepts and retransmits radar-transmitting signals by fragments, resulting in noticeable TF distribution differences between ISRJ false targets and real targets. Given these characteristics, this study proposes a new ISRJ suppression method based on TF analysis and real target sparse reconstruction. e proposed method innovatively converts jamming suppression into a target binary classification problem. Firstly, the echo signal is sparsely represented to obtain the target positions. en, guided by the previously acquired positions, the target features are extracted in the TF domain for subsequent target identification. In the end, the real targets are reconstructed according to the target identification result, thus realizing ISRJ suppression.
Simulation experiments are conducted to validate the effectiveness of the proposed method under various situations, and the factors that may affect the target identification accuracy are also studied in detail. In the scheme of target identification, hypothesis tests reveal that the adopted TFIE feature can achieve improved performance than the variance feature, with an overall target identification accuracy of 99.46%. As for the final ISRJ suppression result, only the real targets are retained and reconstructed, while the false ISRJ targets and the noise signal are suppressed considerably. rough quantitative evaluation, the proposed method shows better performance than competing methods for pulse compression radar.

Data Availability
e simulation data used to support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding the publication of this paper. The proposed method The method in [36] The method in [33]  The proposed method The method in [36] The method in [33] (b)  16 International Journal of Antennas and Propagation