Journal of Xidian University 2021 Vol.48
Please wait a minute...
For Selected: Toggle Thumbnails
Editorial:introduction to the special issue on network and information security research progress·commemoration of Mr. XIAO Guozhen
HE Dake,SHEN Bazhong,XING Chaoping,FENG Dengguo,REN Jian,GU Dawu,HU Yupu,ZHANG Yuqing,ZHANG Weiguo
Journal of Xidian University    2021, 48 (1): 1-6.   DOI: 10.19665/j.issn1001-2400.2021.01.001
Abstract584)   HTML785)    PDF(pc) (1056KB)(337)       Save
Reference | Related Articles | Metrics
On the significance and function of the Xiao-Massey theorem
FENG Dengguo
Journal of Xidian University    2021, 48 (1): 7-13.   DOI: 10.19665/j.issn1001-2400.2021.01.002
Abstract569)   HTML44)    PDF(pc) (669KB)(150)       Save

Divide-and-conquer correlation analysis is an important stream cipher analytical method,which is one of the analytical methods that must be defended when designing the stream cipher.The frequently-used defense strategy is to make the cryptographic function used in the stream cipher have a certain correlation immune order.This kind of cryptographic function is called the correlation immune function.The characterization of correlation immune functions is the theoretical basis for constructing and analyzing such functions.Professor G.Z.Xiao and Professor J.L.Massey first gave the characterization of the Walsh spectrum of correlation immune Boolean functions (called Xiao-Massey theorem),which opened up a new research direction for the study of stream ciphers.This paper mainly reviews the Xiao-Massey theorem,sketches the significance of the Xiao-Massey theorem,and explains the function of the Xiao-Massey theorem.

Reference | Related Articles | Metrics
Progress of and some comments on the research of side-channel attack for cryptosystems
GU Dawu,ZHANG Chi,LU Xiangjun
Journal of Xidian University    2021, 48 (1): 14-21.   DOI: 10.19665/j.issn1001-2400.2021.01.003
Abstract783)   HTML44)    PDF(pc) (1149KB)(241)       Save

Side-channel attack is among the real threats to a cryptosystem in practice.By tracking its latest development,the main research directions including information pre-processing,non-profiled and profiled analysis are classified and demonstrated.The research key points of side-channel attack are summarized,in which the limitation of relying on artificial assumptions is pointed out to be as the principal issue of the state-of-the-art methods.Once the artificial assumptions deviate from the actual situation,the effect of side-channel attack will be seriously affected or weakened.A possible technical solution to ruling out this limitation is given,that is,to make use of what we call the zero-assumption (or weak assumption) method.The next-step research points under this assumption are listed briefly.

Table and Figures | Reference | Related Articles | Metrics
Survey of anonymous network applications and simulation platforms
ZHENG Xianchun,LI Hui,WANG Rui,YAN Haonan,DAI Rui,XIAO Mingchi
Journal of Xidian University    2021, 48 (1): 22-38.   DOI: 10.19665/j.issn1001-2400.2021.01.004
Abstract745)   HTML42)    PDF(pc) (8010KB)(142)       Save

An anonymous network can hide the real identities of and location information on users and service providers. With the expansion of cyberspace and the increasing importance of privacy protection,the research on anonymous networks has been further developed.For lack of application survey of anonymous networks at present,especially for lack of relevant reviews on the research on anonymous network simulation platforms,this paper,in the light of the current research status of anonymous networks,summarizes the existing privacy protection anonymous technology and the typical representatives of practical application of the anonymous network from multiple dimensions.We investigate the advantages and disadvantages of existing simulation platforms and environments and introduce the related works in terms of usability,efficiency,authenticity and the controllable scale.Finally,prospects for future research on anonymous network application are given to provide ideas for new research content and trends.

Table and Figures | Reference | Related Articles | Metrics
Overview of Sybil attacks and defenses in the distributed architecture
XU Zhicheng,LI Xiang,MAO Jian,LIU Jianwei,ZHOU Zhihong
Journal of Xidian University    2021, 48 (1): 39-49.   DOI: 10.19665/j.issn1001-2400.2021.01.005
Abstract517)   HTML21)    PDF(pc) (1638KB)(97)       Save

In recent years,the distributed architecture has been widely used in Internet information services.The distributed architecture usually relies on multiple independent nodes to deal with potential malicious threats.However,for lack of authentication between nodes and for the difficulty of recognizing the identity in the network and the relationship between nodes,it is vulnerable to multiple identity attacks,namely,the Sybil attacks,which destroy the trust relationship between nodes.In this paper,we analyze the Sybil attacks in the distributed architecture and their defense methods.First,we give a brief introduction to attack models of the Sybil attacks in different application scenarios.Then,we discuss common Sybil defenses in distributed architectures,and then emphasize two main Sybil defenses in the social network,a typical and popular distributed architecture.Finally,we prospect the trends of future research on the Sybil attack.

Table and Figures | Reference | Related Articles | Metrics
Survey of results of (n,m)-functions against differential power attack
ZHOU Yu,CHEN Zhixiong,ZHUO Zepeng,DU Xiaoni
Journal of Xidian University    2021, 48 (1): 50-60.   DOI: 10.19665/j.issn1001-2400.2021.01.006
Abstract756)   HTML26)    PDF(pc) (1013KB)(83)       Save

(n,m) functions (or S-boxes) are the most basic components in symmetric cryptography,and its cryptographic properties determine some security of symmetric cryptography.Therefore,how to design and analyze (n,m) functions which satisfy various cryptographic properties is an important problem in the research on symmetric cryptography.With the development of the research on the side channel of symmetric cipher algorithms,there are some indicators in the aspect of (n,m) functions resisting differential power attack:the signal-to-noise ratio,transparency order and confusion coefficient.These indicators have gradually become the main indicators to measure the cryptographic properties of (n,m) functions cryptography,and have been applied to the design and analysis of block cipher S-boxes.In this paper,the research results of the signal-to-noise ratio (SNR),transparency order (TO) and confusion coefficient (CC) of (n,m) functions are summarized,including:(1) some relationships between the signal-to-noise ratio of (n,m) functions and the traditional cryptographic indicators;(2) some relationships between the transparency order of (n,m) functions and the traditional cryptographic property;some relationships between the transparency order of a Boolean function and its decomposition functions;few distributions of the transparency order of small variable balance functions;(3) the confusion coefficient of (n,m) function(s);(4)a comprehensive analysis of three indicators of a S-box in some public algorithms.Finally,the research prospect of these three indicators is given.

Table and Figures | Reference | Related Articles | Metrics
Key distillation from passwords
LIU Yingfeng,LIU Shengli
Journal of Xidian University    2021, 48 (1): 61-68.   DOI: 10.19665/j.issn1001-2400.2021.01.007
Abstract375)   HTML21)    PDF(pc) (1751KB)(90)       Save

Authentication via passwords is one of the most widely-used method for identification.Passwords can be easily memorized,but they are hardly uniformly distributed.For lack of uniformity,passwords cannot be used as keys for cryptographic schemes directly.In this paper,we explore the approach to key distillation from passwords by utilizing the entropy in passwords.To this end,we present a key distillation scheme from passwords.We first estimate the entropy of passwords,and then make use of Toeplitzmatrices to transform passwords into keys and analyze the lengths of the distilled keys.Besides,we also discuss how to distill multiple keys from the same password.Our approach can be closely combined with the modern cryptographic techniques to fulfill cryptographic functionalities.

Table and Figures | Reference | Related Articles | Metrics
8 bits lightweight S-box with the Feistel structure
DONG Xinfeng,ZHANG Wenzheng,XU Chunxiang
Journal of Xidian University    2021, 48 (1): 69-75.   DOI: 10.19665/j.issn1001-2400.2021.01.008
Abstract548)   HTML40)    PDF(pc) (910KB)(157)       Save

As a confusion component of the lightweight symmetric cryptographic algorithm,a lightweight S-box is the key to designing the lightweight symmetric cryptographic algorithm.In this paper,a new method for designing 8-bits lightweight S-boxes is proposed.The round logic operation in the S-boxes involves only 4 logic AND operations (single bits) and 4 logic XOR operations (single bits).After iterating 4 rounds,the differential uniformity of the 8-bits lightweight S-boxes is 16 and the nonlinearity is 96.Compared with the existing known methods,the 8-bits lightweight S-box designed by our method needs less hardware resources while gaining the best known cryptographic properties,such as the low differential uniformity and the high nonlinearity.

Table and Figures | Reference | Related Articles | Metrics
Analysis of zero-sum distinguisher of the KNOT authenticated encryption algorithm
YE Tao,WEI Yongzhuang,LI Lingchen
Journal of Xidian University    2021, 48 (1): 76-86.   DOI: 10.19665/j.issn1001-2400.2021.01.009
Abstract428)   HTML43)    PDF(pc) (1023KB)(80)       Save

As one of the second round candidates of the lightweight crypto standardization process,KNOT has the advantages of fast implementation in software and hardware,low hardware area and software memory.Currently,the security of KNOT has received extensive attention.In this paper,based on the flag technique,a new method to design the model of division property for S-box is proposed.Moreover,by using the structure of KNOT,a new Mixed Integer Linear Programming (MILP) model of division property for KNOT is constructed.The automated search method of zero-sum distinguisher of KNOT-256 is also further presented.It is illustrated that there exists a 30-round zero-sum distinguisher of KNOT-256 permutation.Although the security of the KNOT authenticated encryption algorithm (whose 256-bit block size version has 52 rounds in the initialization process) is not practically threatened via this distinguisher,the result verifies that the method of constructing zero-sum distinguisher is valid.

Table and Figures | Reference | Related Articles | Metrics
Efficient multi-key fully homomorphic encryption scheme from RLWE
CHE Xiaoliang,ZHOU Haonan,YANG Xiaoyuan,ZHOU Tanping,LIU Longfei,LI Ningbo
Journal of Xidian University    2021, 48 (1): 87-95.   DOI: 10.19665/j.issn1001-2400.2021.01.010
Abstract602)   HTML28)    PDF(pc) (904KB)(130)       Save

The ring-LWE-based BGV-type multi-key fully homomorphic encryption (MKFHE) scheme has a large size of ciphertexts and keys,and the generation process of evaluation key is complicated,which results in a low homomorphic evaluating efficiency.To improve these problems,a BGV-type MKFHE scheme with a small-size key and a high efficiency of evaluation of key generation is proposed.First,by modifying the expansion of the ciphertext,the algorithm for generation of the evaluation key is optimized and the efficiency of the algorithm is improved.Second,the low bit discarding technique is used in the generation algorithm,which reduces the calculated redundancy and decreases the calculated complexity.Finally,by applying modulus-switching and key-switching techniques to the optimized algorithm,an efficient leveled BGV-type MKFHE scheme with IND-CPA security is proposed.Compared with the previous leveled BGV-type MKFHE schemes,the proposed scheme can simplify the process of generation of the evaluation key and decrease memory (bit-size) and calculation costs.Moreover,the proposed scheme has a higher efficiency and a less noise magnitude.

Table and Figures | Reference | Related Articles | Metrics
Algorithm for the detection of a low complexity contrast enhanced image source
WANG Junxiang,HUANG Lin,ZHANG Ying,NI Jiangqun,LIN Lang
Journal of Xidian University    2021, 48 (1): 96-106.   DOI: 10.19665/j.issn1001-2400.2021.01.011
Abstract360)   HTML25)    PDF(pc) (4033KB)(211)       Save

With the rapid development of multimedia techniques,enhanced images,such as mobile phone pictures,are widely used due to its good visual quality,In general,conventional image enhancement algorithms include histogram equalization,gamma correction,and so on.Recently,a new reversible data hiding algorithm with the content enhancement function (denoted as RDH_CE) is proposed,which could achieve identical visual enhancement quality as conventional enhancement algorithms do when a certain amount of secret data is embedded.It is easy to have some security risk when one enhanced image with some suspicious code embedded in it is utilized.Therefore,an effective algorithm for identifying some suspicious RDH_CE and other regular ones (i.e.,histogram equalization and gamma correction) is proposed in this paper.By analyzing their implementation process,four features are designed and then SVM is employed to identify their source.Experimental results indicate that the proposed scheme can achieve a better performance compared with other state-of-art algorithms in terms of the accuracy and stability.

Table and Figures | Reference | Related Articles | Metrics
Joint reversible data hiding in encrypted images with the self-correcting ability
QIU Yingqiang,CAI Canhui,ZENG Huanqiang,FENG Gui,LIN Xiaodan,QIAN Zhenxing
Journal of Xidian University    2021, 48 (1): 107-116.   DOI: 10.19665/j.issn1001-2400.2021.01.012
Abstract310)   HTML17)    PDF(pc) (2623KB)(67)       Save

In order to solve the problem of extracted-bit errors in existing joint reversible data hiding methods for encrypted images and achieve a higher embedding capacity,a novel algorithm with self-correction and privacy protection is proposed.Before image encryption,the algorithm embeds self-correcting data generated by preprocessing into the down-sampling pixels of the image reversibly,and then data can be embedded into the encrypted image by reserving or flipping certain least significant bits of non-sampled pixels in each group.Experimental results show that the proposed algorithm greatly increases the embedding capacity,and that the quality of the decrypted marked image is fine.This technology can be used in military,medical,cloud services and other fields.

Table and Figures | Reference | Related Articles | Metrics
Structure-statebased graybox Fuzzing technique
LIU Huayuan,SU Yunfei,LI Ruilin,TANG Chaojing
Journal of Xidian University    2021, 48 (1): 117-123.   DOI: 10.19665/j.issn1001-2400.2021.01.013
Abstract420)   HTML16)    PDF(pc) (1537KB)(57)       Save

In order to solve the problem of program state coverage that cannot be effectively solved by code coverage feedback indicators,we propose a fuzzing method that uses the state coverage of a specific code structure in the source code as the feedback indicator,and introduce the concept of target structure state coverage distribution.By inserting piles for a specific structure,statistics of the target structure state distribution,seed selection and energy scheduling according to the structure state distribution,in order to achieve uniform program state coverage.This method implements the prototype system SFL,and compares it with the existing code coverage fuzzing method AFL.Experimental results show that the method proposed in this paper can more fully cover the program state and can accelerate the discovery speed of specific types of vulnerabilities.

Table and Figures | Reference | Related Articles | Metrics
Detecting use-after-free bugs in embedded C programs
WANG Yaxin,LI Xiaoqing,WU Gaofei,TANG Shijian,ZHU Yajie,DONG Ting
Journal of Xidian University    2021, 48 (1): 124-132.   DOI: 10.19665/j.issn1001-2400.2021.01.014
Abstract231)   HTML13)    PDF(pc) (2928KB)(41)       Save

Use-after-Free (UaF) bugs in C programs seriously affect the robustness and reliability of embedded systems.Current detection methods are mostly focused on computer operating systems or applications,which does not support complex and variable embedded systems.A static code analysis can achieve the detection without the requirement of execution environment.Therefore,a static taint analysis tool based on the LLVM compiler infrastructure has been implemented to detect UaF bugs in theembedded C code automatically.Experimental results prove that this static analysis method can detect UaF bugs in C programs rapidly with low false positive and false negative.It is also proved that the tool can be applied in large-scale embedded C projects.

Table and Figures | Reference | Related Articles | Metrics
TTP-free weighted muti-owner RFID tag authentication protocol
FAN Meiyue,DONG Qingkuan,WANG Lei,YANG Can
Journal of Xidian University    2021, 48 (1): 133-140.   DOI: 10.19665/j.issn1001-2400.2021.01.015
Abstract284)   HTML17)    PDF(pc) (1186KB)(38)       Save

Aiming at the problem of multi-owner tag authentication,a TTP-free weighted multi-owner RFID tag authentication protocol is proposed.In this protocol the Shamir secret sharing threshold scheme is used to manage the key,with the message encrypted with the key stream that is generated based on the hash function.It realizes the mutual authentication between all of the readers and the tag.In the proposed protocol,no TTP is involved,and the key update and de-synchronization attack are realized.Compared with similar protocols,this protocol is more concise and effective.The formal analysis of the BAN logic proves that the protocol satisfies the mutual authentication.The analysis of security characteristics shows that the proposed protocol satisfies anti-replay attack,anti-de-synchronization attack,forward security,untraceabitility,confidentiality and denial of service attack,etc.

Table and Figures | Reference | Related Articles | Metrics
Cross-domain authentication and the key agreement protocol in VANETs
LI Xiaowei,YANG Dengqi,ZHENG Xin,ZHU Xingwen,CHEN Benhui,ZHANG Yuqing
Journal of Xidian University    2021, 48 (1): 141-148.   DOI: 10.19665/j.issn1001-2400.2021.01.016
Abstract436)   HTML27)    PDF(pc) (1403KB)(120)       Save

Aiming at the problem that vehicle-to-vehicle (V-2-V) authentication and key agreement of cross-domain in VANETs (vehicular ad hoc networks) can be accomplished by the participation of servers,a cross-domain V-2-V password-based authentication and key agreement protocol without server participation is proposed.The protocol uses the method of distributing authentication credentials to achieve cross-authentication,and enhances the security of passwords by combining smart cards with passwords.The security of the protocol is proved under the hard problem of ECCDH (Elliptic Curve Computational Diffie-Hellman).Compared with the existing cross-domain authentication and key agreement protocol that requires server participation,the proposed protocol does not involve server participation,thus avoiding the communication delay caused by the server’s inability to process a large number of authentication requests.

Table and Figures | Reference | Related Articles | Metrics
TargetedFool:an algorithm for achieving targeted attacks
ZHANG Hua,GAO Haoran,YANG Xingguo,LI Wenmin,GAO Fei,WEN Qiaoyan
Journal of Xidian University    2021, 48 (1): 149-159.   DOI: 10.19665/j.issn1001-2400.2021.01.017
Abstract396)   HTML22)    PDF(pc) (3195KB)(109)       Save

With the development of artificial intelligence technology,deep neural networks are widely used in fields such as face recognition,voice recognition,image recognition,and autonomous driving.In recent years,experiments have proved that slight perturbations can cause misclassification of deep neural networks (DNNs) and achieving specific attack effects in a limited time is one of the focuses of research in the field of adversarial attacks.The DeepFool algorithm has a wide range of applications in machine learning platforms such as cleverhans.However,there is still room for research on targeted attacks using the DeepFool algorithm.To solve the problem that generating perturbations takes a long time and that the perturbation is easy for the human eye to observe,this paper proposes the TargetedFool algorithm based on the DeepFool algorithm for generating targeted adversarial examples on typical convolution neural networks (CNNs).Extensive experimental results show that the algorithm proposed in this paper can achieve targeted attacks on the MNIST,CIFAR-10 and ImageNet.The targeted attack described in this paper can achieve a 99.8% deception success rate in an average time of 2.84 s on the ImageNet.In addition,this paper analyzes the reason why the attack algorithm based on the DeepFool cannot generate targeted universal adversarial perturbations.

Table and Figures | Reference | Related Articles | Metrics
Optimal method for the generation of the attack path based on the Q-learning decision
LI Teng,CAO Shijie,YIN Siwei,WEI Dawei,MA Xindi,MA Jianfeng
Journal of Xidian University    2021, 48 (1): 160-167.   DOI: 10.19665/j.issn1001-2400.2021.01.018
Abstract452)   HTML22)    PDF(pc) (1791KB)(85)       Save

The main research purpose of this paper is to generate a dynamic approach to finding the optimal attack path based on the Q-learning algorithm in machine learning,and to improve the efficiency and adaptability of this approach.The method,based on the Q-learning algorithm and by the reference network connectivity and partition,uses the delete inaccessible path in the network topology reduction method,and simulated by machine learning hacker attacks,combines state and action,in keep learning to improve their ability of adaptation and decision-making,so as to generate the optimal attack path efficiently.Finally,through experiments,the established simulated attacker can obtain the state-value table in the Q-learning method in the environment with the IDS alarm device,and can obtain the optimal attack path sequence from the source host to the destination host by traversing the Q table,which verifies the validity and accuracy of the model and algorithm.At the same time,by analyzing the host reachability in advance,the redundant nodes are greatly reduced,a great advantage in large network topology.

Table and Figures | Reference | Related Articles | Metrics
Adaptive fast and targeted adversarial attack for speech recognition
ZHANG Shudong,GAO Haichang,CAO Xiwen,KANG Shuai
Journal of Xidian University    2021, 48 (1): 168-175.   DOI: 10.19665/j.issn1001-2400.2021.01.019
Abstract307)   HTML20)    PDF(pc) (910KB)(66)       Save

Adversarial examples are malicious inputs designed to induce deep learning models to produce erroneous outputs,which make humans imperceptible by adding small perturbations to the input.Most research on adversarial examples is in the domain of image.Recently,studies on adversarial examples have expanded into the automatic speech recognition domain.The state-of-art attack on the ASR system comes from C &W,which aims to obtain the minimum perturbation that causes the model to be misclassified.However,this method is inefficient since it requires the optimization of two terms of loss functions at the same time,and usually requires thousands of iterations.In this paper,we propose an efficient approach based on strategies that maximize the likelihood of adversarial examples and target categories.A large number of experiments show that our attack achieves better results with fewer iterations.

Table and Figures | Reference | Related Articles | Metrics
Fast network intrusion detection system using adaptive binning feature selection
LIU Jingmei,GAO Yuanbo
Journal of Xidian University    2021, 48 (1): 176-182.   DOI: 10.19665/j.issn1001-2400.2021.01.020
Abstract341)   HTML22)    PDF(pc) (864KB)(87)       Save

Aiming at the problems of the low detection rate of traditional intrusion detection systems and the long training and detection time of intrusion detection systems based on deep learning,an adaptive binning feature selection algorithm using the information gain is proposed,which is combined with LightGBM to design a fast network intrusion detection system.First,the original data set is preprocessed to standardize the data;then the redundant features and noise in the original data are removed through the adaptive binning feature selection algorithm,and the original high-dimensional data are reduced to the low-dimensional data,thereby improving the accuracy of the system and reducing the training and detection time;finally,LightGBM is used for model training on the training set selected by the characteristics to train an intrusion detection system that can detect attack traffic.Through verification on the NSL-KDD data set,the proposed feature selection algorithm only takes 27.35 seconds in feature selection,which is 96.68% lower than that by the traditional algorithm.The designed intrusion detection system has an accuracy rate of 93.32% on the test set,and its training time is low.Compared with the existing network intrusion detection system,the accuracy rate of the proposed system is higher,and its model training speed is faster.

Table and Figures | Reference | Related Articles | Metrics
Method for assessment of network security situation with deep learning
YANG Hongyu,ZENG Renyun
Journal of Xidian University    2021, 48 (1): 183-190.   DOI: 10.19665/j.issn1001-2400.2021.01.021
Abstract655)   HTML58)    PDF(pc) (1584KB)(169)       Save

The traditional methods for assessment of network security situation rely on manual label and evaluation.When faced with a large amount of data,there appearsome problems such as low efficiency and poor flexibility.First,we propose a Deep Autoencoder-Deep Neural Network (DAEDNN) model to identify all kinds of attacks on the network.Then,the Under-Over Sampling Weighted (UOSW) algorithm is designed to improve the detection rate of the model on categories with a few training samples.Finally,we conduct model testing and calculate the attack probability.Besides,we determine the impact score of each type of attack and calculate the network security situation value.Experimental results show that the precision and recall of the proposed model are better than those of the compared models,and that the proposed model has a better performance in accuracy and efficiency.

Table and Figures | Reference | Related Articles | Metrics
Editorial:Introduction to the special issue on advances in radar technology
LIU Hongwei,SHUI Penglang,KONG Lingjiang,WEI Yinsheng,LIU Yongxiang,WANG Yu,LI Gang,CHEN Bo
Journal of Xidian University    2021, 48 (2): 1-6.   DOI: 10.19665/j.issn1001-2400.2021.02.001
Abstract1120)   HTML1159)    PDF(pc) (968KB)(325)       Save
Reference | Related Articles | Metrics
Radar HRRP based few-shot target recognition with CNN-SSD
GUO Zekun,TIAN Long,HAN Ning,WANG Penghui,LIU Hongwei,CHEN Bo
Journal of Xidian University    2021, 48 (2): 7-14.   DOI: 10.19665/j.issn1001-2400.2021.02.002
Abstract737)   HTML76)    PDF(pc) (1911KB)(216)       Save

The development of radar high resolution range profile(HRRP)non-cooperative targets recognition technology is mainly limited by two aspects:(1) Due to the low observation frequency of non-cooperative targets,the number of labeled HRRPs is insufficient,making non-cooperative HRRP based target recognition a typical few-shot recognition problem,which is still a hot and difficult issue without definite conclusion in the academia.(2) The existing HRRP based target recognition methods are mostly based on the hypothesis of complete dataset,making them mismatch with non-cooperative target recognition in few-shot setting.In this paper,we put aside the complete hypothesis and propose an HRRP based few-shot target recognition method with CNN-SSD.The proposed method first uses a complete training HRRP containing 45 classes of cooperative targets to learn an initial category-independent feature extractor,on the basis of which we further utilize the model sequential self-distillation mechanism to obtain a more generalized feature extractor.Finally,the generalization ability of the extracted features is evaluated on unseen non-cooperative targets during training.Experimental results on self-simulated HRRP dataset reveal that the proposed method can achieve an average recognition rates of 61.26%,84.69% and 92.52% respectively when only 1,5 and 10 annotated HRRPs of non-cooperative targets are available.

Table and Figures | Reference | Related Articles | Metrics
Knowledge-based adaptive detection of radar targets in sea clutter background
XU Shuwen,WANG Zhexiang,SHUI Penglang
Journal of Xidian University    2021, 48 (2): 15-26.   DOI: 10.19665/j.issn1001-2400.2021.02.003
Abstract621)   HTML49)    PDF(pc) (3635KB)(145)       Save

This paper focuses on the problem of radar targets detection in the compound-Gaussian sea clutter on the condition with the limited secondary data.The texture is modeled by the generalized inverse Gaussian distribution.Two adaptive detectors based on a priori knowledge of the speckle covariance matrix are proposed.First,the inverse complex Wishart distribution is exploited to model the speckle covariance matrix,and then an adaptive detector without using the secondary data is designed according to the generalized likelihood ratio.According to the maximum posterior test criterion,the secondary data are used to design an adaptive detector with secondary data and prior knowledge.Experimental results show that when the number of secondary cells is small,the two detectors proposed in this paper have a better detection performance than the GLRT-GIG detector.With different numbers of secondary cells,the proposed adaptive detector depending on the secondary data and a prior knowledge has the best performance.

Table and Figures | Reference | Related Articles | Metrics
Improved probabilistic multi-hypothesis tracker via the Poisson point process
ZHANG Yichen,SHUI Penglang
Journal of Xidian University    2021, 48 (2): 27-34.   DOI: 10.19665/j.issn1001-2400.2021.02.004
Abstract350)   HTML36)    PDF(pc) (1857KB)(80)       Save

Optimal data association is the main task of multi-target tracking due to the similarity of the tracker’s filtering parts.Traditional Multi-target tracking methods pick up the optimal data association from all possible associations that account for the complexity exponentially increasing with the number of targets and limiting the maximum number of targets which can be stably tracked.This paper proposes an efficient and accurate method where the measurement points raised by targets and clutter are modeled as the Poisson point process and the expectation maximisation algorithm is utilized to estimate the target states recursively.Independent data association and mixing probability decrease the computational complexity.Furthermore,Doppler information refers to the fact that the target feature has been used in association and filtering stage to improve tracking performance without adding complexity.The experiment with simulation data show that the performance of the proposed method is better than that of the traditional method with a shorter operation time.

Table and Figures | Reference | Related Articles | Metrics
Improved ionospheric clutter classification method based on fuzzy C-means clustering
ZHOU Jianyu,WEI Yinsheng,XU Rongqing
Journal of Xidian University    2021, 48 (2): 35-41.   DOI: 10.19665/j.issn1001-2400.2021.02.005
Abstract294)   HTML22)    PDF(pc) (2366KB)(77)       Save

The ionospheric clutter is a time-varying,non-stationary and non-Gaussian complex clutter in the high-frequency surface-wave radar(HFSWR) system and its suppression is a daunting task.Due to the complexity of the ionospheric clutter,the single clutter suppression algorithm cannot suppress the clutter effectively.Classification of the complex ionospheric clutter according to different characteristics can improve the performance of ionospheric clutter suppression significantly.After a complete analysis of the characteristics of ionospheric clutter,this paper proposes an improved ionospheric clutter classification method based on fuzzy C-means clustering.Experimental results show that the proposed method has a better performance than the traditional algorithm in clustering the ionospheric clutter.

Table and Figures | Reference | Related Articles | Metrics
Recognition of operation modes of airborne fire control radar using amplitude rearrangement
YANG Qiu,GU Jie,WEI Ping
Journal of Xidian University    2021, 48 (2): 42-48.   DOI: 10.19665/j.issn1001-2400.2021.02.006
Abstract447)   HTML27)    PDF(pc) (3312KB)(76)       Save

Recognizing the operation modes of airborne fire control radar quickly and accurately,especially in the high threat mod,is the important part of airborne electronic countermeasures.For the restricted application conditions of existing methods,a new method using amplitude rearrangement is proposed in this paper after a large amount of analysis of each mode.This method makes full use of the characteristics of amplitude distribution to identify tracking signals.First,all the signals are rearranged by the size of signal’s amplitude,and then the first-order difference of the rearranged amplitude iscalculated.Finally,the track and search mode and single target tracking mode are recognized effectively according to the special notch character of the rearranged amplitude.Simulation results prove the good real-time and accuracy rate performance of the proposed method.More importantly,the new method is not sensitive to the pulse deletion and interference.Owing to the above advantages,the proposed method has a good potential in the practical engineering application.

Table and Figures | Reference | Related Articles | Metrics
Radar HRRP target recognition based on the multiplicative RNN model
XU Bin,ZHANG Yongshun,ZHANG Qin,WANG Fuping,ZHENG Guimei
Journal of Xidian University    2021, 48 (2): 49-54.   DOI: 10.19665/j.issn1001-2400.2021.02.007
Abstract331)   HTML30)    PDF(pc) (1215KB)(65)       Save

The traditional HRRP recognition methods do not consider the temporal correlation,and the azimuth sensitivity of HRRP results in the temporal variation of the samples.This paper proposes a multiplicative recurrent neural network.In this paper,HRRP samples are converted into the sequence form first,which is used to consider the correlation between range cells.In order to alleviate the mismatch between the HRRP sequence variation caused by azimuth sensitivity and the model with fixed parameters,the model adaptively selects the corresponding parameters according to the input data,and extracts robust features from the HRRP sequence.Finally,the voting strategy is adopted to fuse the information at all time steps and predict the sample categories.Experimental results with measured data show that the current model can effectively extract discriminative features and identify targets.

Table and Figures | Reference | Related Articles | Metrics
Improved SVD-FRFT sea clutter suppression method
LIANG Zhuang,WEN Liwu,DING Jinshan
Journal of Xidian University    2021, 48 (2): 55-63.   DOI: 10.19665/j.issn1001-2400.2021.02.008
Abstract452)   HTML44)    PDF(pc) (2414KB)(100)       Save

The returns of slow and dim targets,which have high energy and a wide frequency spectrum,are often submerged in the sea clutter.This paper proposes a new SVD-FRFT-based sea clutter suppression method using time-frequency information.The proposed method adopts the strategy of block processing and overall judgment.First,the long echo sequence is divided into sub-pulse blocks,with the first Q-order signal components of each sub-pulse block being respectively extracted and inter-block signal correlation performed to realize the preliminary separation of the target and clutter.Then an adaptive segmented SVD-FRFT processing is used to achieve further purification of the signal components of each order.Finally,the normalized ime-frequency ridge quadratic fitting error is used to judge the components of each order.In this way,the target is retained while the sea clutter is suppressed.The effectiveness and robustness of this approach is verified by the real sea clutter data.Compared with the classical sea clutter suppression methods,the proposed method can effectively suppress the sea clutter and extract target signals regardless of signal-to-clutter ratio(SCR),especially for the multi-target.

Table and Figures | Reference | Related Articles | Metrics
Inshore ambiguity clutter suppression method aided by clutter classification
DUAN Chongdi,HAN Chaolei,YANG Zhiwei,ZHANG Qingjun
Journal of Xidian University    2021, 48 (2): 64-71.   DOI: 10.19665/j.issn1001-2400.2021.02.009
Abstract360)   HTML23)    PDF(pc) (4804KB)(55)       Save

To address the problem that the clutter suppression performance is reduced for the multichannel synthetic aperture radar(SAR) because of the ambiguous component of the land clutter in the inshore area,we propose an inshore ambiguity clutter suppression method aided by on clutter classification.First,a multi-look interference feature covariance matrix(MIFCM) for each range-Doppler unit is constructed,which includes multi-look interference magnitude/phase and multi-look interference magnitude gradient information.Next,with the affine invariant riemannian(AIR) distance measure of MIFCMs,the clutter classification result can be acquired.Finally,with the clutter classification result,we select independent and identically distributed(IID) training samples to estimate the clutter covariance matrix in the ambiguous clutter region,with clutter suppression performed in the multichannel SAR image domain.Simulation result shows that the proposed method can accurately classify and suppress the azimuth ambiguous clutter in the inshore area.

Table and Figures | Reference | Related Articles | Metrics
Three-dimensional scattering center modeling and a fast SAR simulation method for ship targets
HU Liping,YAN Hua,ZHONG Weijun,YIN Hongcheng,WANG Chao
Journal of Xidian University    2021, 48 (2): 72-83.   DOI: 10.19665/j.issn1001-2400.2021.02.010
Abstract717)   HTML34)    PDF(pc) (5398KB)(173)       Save

The direct SAR imaging method has a low efficiency when used for realizing the target echo simulation and SAR imaging,which will meet,with difficulty,the requirement of rapid SAR generation in the closed-loop verification process of sea detection guidance.In this paper,we propose a SAR simulation method based on three-dimensional(3D) scatter centers.First of all,the 3D scattering centers of a ship target from different perspectives are obtained by the 3D fast imaging based on the ray tube integral and 3D scattering center extraction based on the CLEAN algorithm.Then,the target SAR echo data and image aggregation processing are quickly calculated to obtain the SAR complex image through the geometric modeling of SAR imaging from the corresponding perspective.The method makes comprehensive use of electromagnetic scattering center extraction and complete SAR processing flow,which can significantly improve the efficiency and flexibility of target imaging simulation under the condition of maintaining the electromagnetic calculation accuracy.The calculation accuracy,efficiency,and flexibility of the proposed method are verified by taking a typical ship target as an example.

Table and Figures | Reference | Related Articles | Metrics
Ship length distribution modeling on China offshore and ability evaluation of radar ship classification
LI Shan,ZHNAG Kun,SHUI Penglang
Journal of Xidian University    2021, 48 (2): 84-91.   DOI: 10.19665/j.issn1001-2400.2021.02.011
Abstract267)   HTML28)    PDF(pc) (1648KB)(38)       Save

Radial size estimation using radar high-resolution range profiles(HRRPs) and heading angle estimation are the main means for ship classification.The classification ability is closely related to the range resolution of the radar,precision of radial size estimation,and prior distribution of ship lengths in different offshore areas.We collected the AIS information on about 30 000 ships and their lengths in the four offshore areas of China in the ship information net of China.By fitting the data of ship lengths in each offshore area,it is found that the Weibull distributions provide good-of-fitness to the ship lengths and the parameters in individual area are rather different.Based on the prior distributions of ship lengths,we derived the quantitative relationship between the correct classification probability of big-moderate-small ships and the estimate error of ship radial size.The results indicate that the condition for the big-moderate-small correct classification probability in the offshore areas of China to be up to 90% is that the estimate errors of the ship radial size estimates falls into the interval(-12.67 m,9.41 m) when the heading angle of the ship is between ±75 degrees.

Table and Figures | Reference | Related Articles | Metrics
Fuzzy data association algorithm assisted by historical features
HAN Zhuoxi,WANG Feng,CHEN Pei,LI Zhuolun
Journal of Xidian University    2021, 48 (2): 92-98.   DOI: 10.19665/j.issn1001-2400.2021.02.012
Abstract275)   HTML26)    PDF(pc) (1476KB)(57)       Save

Aiming at the problem of strong ambiguity and uncertainty in the observed data,the author proposes a fuzzy data association algorithm based on the historical features of high-resolution one-dimensional range profile.First,for the high-resolution one-dimensional range profile's attitude,amplitude,and time-shift sensitivity,feature extraction is performed to obtain low-sensitivity features.Then,the features of the track initiation are used to construct the initial feature sample database;the features of the historical moment are utilized to construct the historical feature sample database,and the feature sample database is updated in real time.The feature weight is obtained by the interval entropy weight method and the fuzzy membership of the measurement,and the target is calculated to construct a fuzzy matrix.Finally,fuzzy data association is completed based on the principle of maximum fuzzy membership.Experimental results show that,in both the maneuvering and non-maneuvering scenarios of the target,the association performance of the proposed algorithm is better than that of the fuzzy data association algorithm.And with the increase in the clutter density,the association performance of the two algorithms is gradually decreased,but the association performance of the proposed algorithm becomes better.

Table and Figures | Reference | Related Articles | Metrics
Ultra-high resolution imaging method for the distributed small satellite MIMO-SAR
YANG Jun,ZHOU Fang
Journal of Xidian University    2021, 48 (2): 99-108.   DOI: 10.19665/j.issn1001-2400.2021.02.013
Abstract346)   HTML25)    PDF(pc) (2332KB)(70)       Save

Aiming at the spotlight mode of the distributed small satellite multiple-input multiple-output synthetic aperture radar(MIMO-SAR),an ultra-high resolution imaging method is proposed to reduce the storage pressure and imaging load of the satellite in a multi-channel high-resolution mode.The full-aperture signal of each channel is divided into sub-aperture signals.The sub-aperture signal is deblurred,and then the large bandwidth signal is obtained by using the improved time domain bandwidth synthesis method.Then the sub-aperture image coherent fusion algorithm is used to obtain the ultra-high resolution image.Simulation results show that the improved time domain bandwidth synthesis method can synthesize bandwidth effectively,and the imaging effect of the proposed method is excellent.The validity and reliability of the method are verified.

Table and Figures | Reference | Related Articles | Metrics
Separation and imaging of the anisotropic scattering targets in the wide-angle SAR
WANG Xin,CHANG Guiqing,CHI Chenchen
Journal of Xidian University    2021, 48 (2): 109-116.   DOI: 10.19665/j.issn1001-2400.2021.02.014
Abstract222)   HTML27)    PDF(pc) (3989KB)(47)       Save

In the wide-angle synthetic aperture radar(SAR),the scattering behavior of many illuminated objects might vary with the observation angle,which results in the degradation of the resolution and interpretability of the reconstructed imagery.To solve this problem,a sparse-based source separation and imaging method is proposed in this paper.The distinct scattering behaviors of the isotropic and anisotropic scattering targets are employed to formulate a composite projection operator.Then,the sparse constraint is utilized to suppress the cross-projection energy and imaging of the mix-received wide-angle SAR data is realized.Finally,the imagery of the anisotropic scattering targets can be derived with improved focal quality and interpretability.Numerical simulation verifies the validity of the proposed methodology.The resolution and resolution of the reconstructed image have been significantly improved.

Table and Figures | Reference | Related Articles | Metrics
Edge diffraction correction for 3D scattering center modeling based on the shooting and bouncing ray technique
LU Jinwen,YAN Hua,YIN Hongcheng,ZHANG Lei,DONG Chunzhu
Journal of Xidian University    2021, 48 (2): 117-124.   DOI: 10.19665/j.issn1001-2400.2021.02.015
Abstract276)   HTML22)    PDF(pc) (2436KB)(45)       Save

In the traditional scattering center extraction method based on the shooting and bouncing ray(SBR) technique,only the physical optics contribution of the target is considered.However,the physical optics method is unable to describe the contribution of the actual edge diffraction.By comprehensively considering the specular reflection and edge diffraction contribution of the target,an edge diffraction correction method for 3D scattering center modeling based on the SBR technique is proposed.Using the SBR technique and combining the image domain ray tube integration and equivalent edge currents method,the edge diffraction correcting formula for the 3D inverse synthetic aperture radar image is derived.Simulation results show that the proposed method is able to effectively improve the modeling accuracy of the 3D scattering center.

Table and Figures | Reference | Related Articles | Metrics
Study of game strategy between multiple targets and multistatics radars
HE Bin,SU Hongtao
Journal of Xidian University    2021, 48 (2): 125-132.   DOI: 10.19665/j.issn1001-2400.2021.02.016
Abstract419)   HTML27)    PDF(pc) (1703KB)(54)       Save

Aiming at the conflict game between multistatic multiple-input multiple-output(MIMO) radars and multiple targets,a joint technology of power allocation and beamforming for a multistatic MIMO radar system is studied.The main purpose of the multistatic radar system is to minimize the total transmit power under a certain signal to interference noise ratio(SINR) constraint,and to suppress the cross-channel interference to improve the accuracy of target detection.Based on the strategic non-cooperative game between radars,the existence and uniqueness of the Nash equilibrium solution are proved.Then,according to the theoretical analysis,a joint beamforming and power allocation algorithm is proposed and converges to the Nash equilibrium.Meanwhile,the receive beamformers of multistatic radars are obtained by using the linearly constrained minimum variance(LCMV) criterion to suppress the mutual radar interference.Numerical results show that the proposed algorithm has a better interference suppression ability and less power consumption than the related game algorithm.

Table and Figures | Reference | Related Articles | Metrics
Method for discrimination of false targets in multistation radar systems based on the deep neural network
LIU Jieyi,GONG Maoguo,ZHAN Tao,LI Hao,ZHANG Mingyang
Journal of Xidian University    2021, 48 (2): 133-138.   DOI: 10.19665/j.issn1001-2400.2021.02.017
Abstract267)   HTML27)    PDF(pc) (1018KB)(69)       Save

For the existing jamming discrimination methods for multistation radar systems,only the single feature of target echo space correlation is utilized as the metric,which leads to insufficient comprehensiveness of feature extraction,so that effectiveness and universality are insufficient for the discrimination algorithm.In this paper,an identification method in multistatic radar systems based on the deep neural network is proposed.This method combines the characteristics of multistatic radar systems cooperative detection technology,which has many available resources and strong scheduling ability in space,time and frequency domain,with the strong model learning and feature representation ability in the process of information processing on the deep neural network,so that it can effectively apply to the field of anti-deception jamming.Full use is made of unknown information about echo data to obtain more multi-dimensional,more comprehensive,more complete and deeper feature differences besides correlation,so as to achieve a better jamming discrimination effect.Simulation results show that the proposed method can effectively reduce the influence of noise and pulse number on the jamming discrimination performance.At the same time,the limitation of the target echo correlation coefficient on anti-jamming technology under nonideal conditions is alleviated,which broadens the boundary conditions of the application process.

Table and Figures | Reference | Related Articles | Metrics
Interrupted sampling repeater jamming suppression based on time-frequency analysis and band-pass filtering
SUN Zhengyang,DONG Mei,CHEN Baixiao
Journal of Xidian University    2021, 48 (2): 139-146.   DOI: 10.19665/j.issn1001-2400.2021.02.018
Abstract307)   HTML24)    PDF(pc) (2231KB)(89)       Save

Interrupted sampling repeater jamming is a new type of coherent jamming that generates a single or multiple false target groups,which cannot be effectively suppressed using conventional signal processing methods.To solve this problem,the received signals of several pulse repetition cycles are first accumulated in the time-frequency domain to enhance the time-frequency information on the signals.Then,the distribution of jamming signal is extracted accurately on the time-frequency surface based on the image processing algorithm,and the target echo is roughly reconstructed according to the time-frequency domain filtering method.Finally,based on the reconstructed time-domain signal,a band-pass filter is constructed to suppress the interference and noise.Simulation results indicate that compared with other methods,this scheme can effectively suppress various types of interrupted sampling repeater jamming in a low signal-to-noise ratio and multi-target environment with robustness and accuracy.

Table and Figures | Reference | Related Articles | Metrics
Optimum placement method of multistatic radar barrier coverage
LI Haipeng,FENG Dazheng,ZHOU Yongwei
Journal of Xidian University    2021, 48 (2): 147-155.   DOI: 10.19665/j.issn1001-2400.2021.02.019
Abstract281)   HTML23)    PDF(pc) (1016KB)(38)       Save

In order to solve the problem of optimizing deployment for multistatic radar,an optimum deployment method adopting unequal barrier coverage is proposed.This method employs the relationship among the unequal coverage barriers to construct constraints,and divides the optimization problem into two sub-problems:the optimization problem of a single deployment line and the optimization problem of the combination of unequal barriers.Then,based on the optimal deployment condition of a single deployment line,the exhaustive method is used to solve this optimal deployment problem of a single deployment line.Moreover,according to the minimum deployment cost criterion,the integer linear programming is used to solve the optimization problem of the unequal barrier combination.Meanwhile the optimal deployment parameters are determined.Simulation results reveal that,compared with the existing similar methods,the proposed optimum deployment method can achieve lower deployment costs and requires fewer transmitters.

Table and Figures | Reference | Related Articles | Metrics