Skip to main content

Time-frequency analysis-based deep interference classification for frequency hopping system

Abstract

It is known that interference classification plays an important role in protecting the authorized communication system and avoiding its performance degradation in the hostile environment. In this paper, the interference classification problem for the frequency hopping communication system is discussed. Considering the possibility of the presence of multiple interferences in the frequency hopping system, in order to fully extract effective features of the interferences from the received signals, the linear and bilinear transform-based composite time-frequency analysis method is adopted. Then, the time-frequency spectrograms obtained from the time-frequency analysis are constructed as matching pairs and input to the deep neural network for classification. In particular, the Siamese neural network is used as the classifier, where the paired spectrograms are input into the two sub-networks of the deep networks, and these two sub-networks extract the features of the paired spectrograms for interference-type classification. The simulation results confirm that the proposed algorithm can obtain higher classification accuracy than both traditional single time-frequency representation-based approach and the AlexNet transfer learning or convolutional neural network-based methods.

1 Introduction

Anti-jamming plays an important role in protecting wireless-based communication system, especially in the hostile environment [1], and interference classification is the prerequisite for realizing the anti-jamming. That is, only by knowing the type of interference that the wireless system is suffering, then it is possible to develop effective method for interference suppression or elimination. Till now, though lots of works have been done for the interference classification problem and many algorithms have been proposed for various wireless systems [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20]. However, currently, the emergence of many new interference waveforms seriously degrade the performance of these algorithms [15,16,17,18,19,20]. At the same time, with the development of deep learning these years [21], the capability of extracting effective features from samples has been enhanced. Therefore, with deep learning, how to design interference classification algorithm with higher accuracy is an important research topic, especially in the complicated interference environment, which is the focus of this paper.

By considering the systems’ coexisting over the ISM bands, interference classification and avoiding is an important issue for these systems which has been well-discussed yet. Specifically, in [3], the WLAN interference classification under factory environments was discussed, where scalogram time-frequency images were computed from the collected received signal strength (RSS) data, and then a convolutional neural network (CNN) was trained to recognize the spectral features and enable the interference classification. In [4], the authors presented a semi-supervised deep learning (DL)-based wireless interference identification (WII) algorithm which combined temporal ensembling technique with CNN network to exploit unlabeled data to improve the performance. In [5], a deep neural network-based interference-classification method was proposed, in which both the power-spectral density (PSD) and the cyclic spectrum of the received signal were treated as input features to the network. The computer experiments showed that the accuracy with the received signal PSD outperforms that with its cyclic spectrum. Motivated by the increasing need for on-device interference detection and identification (IDI) for wireless coexistence, [6] developed a lightweight and efficient method targeting interference identification already at the level of single interference bursts which exploited real-time extraction of envelope and model-aided spectral features, specifically designed considering the physical properties of the signals captured with commercial off-the-shelf (COTS) hardware. [7] studied the problem of interference source identification, through the lens of recognizing one of 15 different channels under which three different wireless technologies, i.e., Bluetooth, Zigbee, and WiFi. A few works have demonstrated the effectiveness of deep learning in classifications, such as CNN, ResNet, CLDNN, and LSTM [8,9,10,11]. In [8], a real-time external interference source classification method for an 802.15.4-based wireless sensor network using convolutional neural network was proposed, which used RSSI sampling for collecting training and test data in an office environment, experimental results confirmed that the proposed framework can classify the major interference types with high accuracy. Similarly, the authors of [9, 10] proposed a wireless interference identification (WII) approach based upon a deep convolutional neural network (CNN) which classified multiple IEEE 802.15.1, IEEE 802.11 b/g and IEEE 802.15.4 interfering signals in the presence of a utilized signal, with a classification accuracy of approximately 90 % at least. In [11], an unsupervised learning method and the unknown interference classifier were proposed based on the self-organizing map (SOM) neural network, the simulation results demonstrated that when the SNR reached 5 dB, the accuracy of unknown interference classification exceeded 94%. More studies about the interference identification problems for WLAN and cellular systems can be found in [12,13,14, 22] for the interference identification in the WiFi system, inter-femtocell network and the C-RAN networks, respectively.

Besides the studies for traditional commercial networks, the interference classification for private or special wireless networks also has drawn wide attentions, especially for the applications in the hostile or multi-dimensional and complicated electromagnetic interference environments [23, 24], i.e., the frequency hopping or the direct sequence spreading spectrum (DSSS)-based system. Specifically, in [15], for the time-slotted channel hopping (TSCH)-based industrial wireless sensor and actuator networks (IWSANs), a centralized interference classifier based on support vector machines (SVMs) was introduced. In [16], an iterative anti-interference method based on interference power cognition was proposed, where the interference was broadband digital modulation signal and desired signal was direct sequence spreading spectrum signal. In [17], a blind user identification detection (UID) and interference identification scheme based on linear prediction algorithm for asynchronous direct-sequence code-division multiple-access systems over multipath fading channels was solved. Similarly, the work in [18] extracted 3dB bandwidth, time-domain peak-to-average ratio and other features from the time-frequency domain information of the interference signal, and used decision tree and deep network classifiers to complete the classification of the interference signal. [19] proposed an interference recognition scheme based on a self-organizing map neural network, which improved the classification accuracy of known interference by 3.44%, and reached an accuracy of 94% when the interference was unknown at the SNR of 5dB. Different from the aforementioned methods, while the traditional statistical characteristics are calculated as classification features, [20] used linear time-frequency analysis to extract time-frequency features of the mixed interference signals and then the transfer learning-based classifier was designed, it has higher accuracy but with a problem of lower time-frequency resolution during signal interleaving, and also the demand for training samples is higher. Still for the complicated electromagnetic environments, that is, the possible interference signals are mixed by two different kinds of interferences, by fully analyzing the features of the interference signals, several common classifiers, such as random forest, gradient boosting, and a neural network, are designed to identify these complicated interferences in [25]. In [26], the deep convolutional neural networks (CNN)-based wireless interference identification (WII) approach was proposed, in which the CNN naively learns its features through self-optimization during an extensive data-driven GPU-based training process.

We observe that there are still many shortcomings for the above-mentioned existing studies, especially for the frequency hopping wireless communication systems, which motivates the work of this paper. In practice and for the frequency hopping system, there may be multiple interferences presented in the system, i.e., in hostile environment with adversarial interference waveform. Under this condition, the existing algorithms which only calculate traditional higher-order statistics or single time-frequency characteristics may become invalid. Therefore, in order to improve the classification accuracy over complexity environments, especially for the frequency hopping system with multiple or composite interferences, we try to explore more effective methods for feature extracting and classification. In this paper, the interference classification problem for the frequency hopping communication systems is discussed and then a composite time-frequency analysis and deep learning-based algorithm is proposed. Specifically, the contributions of this paper are summarized as follows.

  • Considering the presence of multiple and compound interference in the frequency hopping system, in order to fully extract effective features of the interferences from the received signals to perform high precision interference classification, a composite time-frequency analysis method based on both the linear transformation and bilinear transformation is proposed.

  • In addition, in order to realize high-precision interference classification with small samples, the Siamese neural network is adopted as the classifier, where the paired spectrograms are input into two sub-networks of the Siamese neural network, and these two sub-networks extract the features of the paired spectrograms. Then, the Siamese neural network is trained and tested for interference type classification via calculating the gap between the generated features.

The rest of this paper is organized as follows. We briefly introduce the proposed interference classification method in Sect. 2. The details of the preprocessing steps for the interference classification algorithm, i.e., the composite time-frequency analysis, normalization, binarization, cropping and resizing are presented in Sect. 3. We illustrate the architecture of the used Siamese neural network and its pre-training process in Sect. 4. The performance of the proposed algorithm is evaluated and discussed in Sect. 5 and then we conclude at last.

2 Method: time-frequency analysis-based deep interference classification

A typical frequency hopping communication system includes a frequency hopping transmitter, wireless channel and a frequency hopping receiver, where the frequency hopping transmitter radiates the signal through the antenna after preprocessing and frequency hopping modulation. The frequency hopping signal transmitted over the wireless channel would be affected by noise and interference. Therefore, the signal received by frequency hopping receiver is composed of frequency hopping modulated signal, interference and noise as [2,3,4, 18]

$$\begin{aligned} r\left( t\right) ={s_1}\left( t\right) +\sum \limits _{j=1}^N{{J_j}\left( t\right) }+n\left( t\right) , \end{aligned}$$
(1)

where \({s_1}(t)\) is the received desired frequency hopping signal, \({J_j}(t),i=1,\ldots ,N\) denote the potential interference signals received at the receiver, which including fixed interference, periodic pulse interference, comb spectrum interference, periodic sweep interference and the mixed interferences. Specifically, the forms of these interference signals are given in Appendix, and n(t) denotes the noise signal.

Fig. 1
figure 1

 Flowchart of interference classification

In general, with the receiving signal (1), the frequency hopping receiver directly performs decoding after demodulation. However, if interference presents in the system, the receiver will face severe interferences and direct signal demodulation may experience worse decoding performance [18]. Therefore, in order to protect the system and avoid performance degradation caused by potential interference, we need to perform interference classification and then interference suppression. While interference classification clarify the type of interference and obtain the parameters of the interference signals. As mentioned earlier, in this paper, we focus on identifying the type of interference signals presented in the system. The proposed classification process is shown in Fig. 1. At first, we implement a composite time-frequency analysis to obtain the spectrograms of the received signals. Based on that we then construct the matching pairs of the obtained spectrograms, and the paired spectrograms are input into two sub-networks of the Siamese neural network. These two sub-networks extract the features of the paired spectrograms. Finally, the Siamese neural network is trained and tested for interference classification by calculating the gap between the generated features. Herein, the spectrograms input to the subnet1 and subnet2 of the Siamese neural network may come from the same or different kinds of interference signals, which will affect the value of label used during the training phase. That is, during the training phase, two spectrograms of the interference signals are input to the subnet1 and subnet2, respectively. If these two spectrograms are from the same kind of interference signals, the label shown in Fig. 1 takes value of 0, otherwise, it takes value of 1. While during the testing phase, we firstly obtain the spectrogram of the interference signal to be identified, then this spectrogram together with another spectrogram from the sample sets are input to the subnet1 and subnet2, respectively. If these two spectrograms are from the same kind of (combinational) interference signals, the output is 0, otherwise the output is 1. Therefore, in order to finish an identification for one kind of (combinational) interference signals, the Siamese neural network-based identification process should be implemented multiple times, and the time depends on the number of combinations of interference signal types. In the sequel, the details of the composite time-frequency analysis and Siamese neural network-based interference classification method are presented.

3 Details of the method: the composite time-frequency analysis

As mentioned earlier, in order to implement interference classification, we should extract effective features from the interference signal. However, as we know that if the interference signals are compounded with different types and also they are coincided with the frequency hopping signal, interference classification based on signal statistical characteristics such as instantaneous or high-order statistics will be greatly affected. This comes from the fact that with compound interference signals, various time-domain, frequency-domain and instantaneous features of these interference signals and also the frequency hopping signals are affected or even canceled by each other [27]. Thus it is difficult to effectively extract the typical time or frequency-domain features for these signals. To handle this issue, we propose a multi-channel composite time-frequency-based method to achieve the feature extraction for the compound interference signals to assist interference classification. The core idea is that both linear and bilinear time-frequency analysis methods are used to calculate the spectrograms of the received signals, and these spectrograms are used as features for classification. This is similar to the colored image recognition with ‘RGB’ multiple channels, three carefully chosen time-frequency analysis methods are adopted to formulate the ‘RGB’ channels for the interference classification, which takes the advantages of the complementarity of the capabilities of different time-frequency analysis tools. In this section, the details of the proposed multi-channel composite time-frequency method are presented.

3.1 Linear and bilinear time-frequency transforms

In this paper, both the linear and bilinear transform time-frequency methods are used to extract the features of the received signals. For the linear time-frequency transform, though there is no cross-term, due to the existence of window functions, the resolution of time-frequency transform will be limited. Taking the short-time Fourier transform (STFT) as an example, the window function of STFT will affect both time resolution and frequency resolution; therefore, it is difficult to choose an optimal window function and set the appropriate parameters. Compared with STFT, wavelet transform can more effectively focus on the instantaneous structure of the signal [28]. In addition, compared with the linear time-frequency transform, though the Cohen-like bilinear time-frequency transform introduces the cross-terms, different time-frequency analysis effects can be obtained with different kernel functions. Therefore, in order to sufficiently extract enough time-frequency features, both the linear and the Cohen-like bilinear time-frequency transforms are adopted, i.e., we choose wavelet transform, MHD and BJD bilinear time-frequency transforms to obtain the spectrograms of the composite interference signals as follows, separately.

3.1.1 Wavelet transform

Wavelets are wave-like transients that can be interpreted as sinusoids for short duration. Decompositions of a signal on the basis functions are called wavelet transforms (WTs). For the WTs, the width of the wavelet basis changes with frequency, i.e., if the frequency of the basis becomes larger, the time window width will automatically be narrowed to improve the resolution. Its principle is similar to a zoom camera [29]. Define the wavelet transform of a signal s(t) as follows [30]:

$$\begin{aligned} CW{T_s}\left( {a,b} \right) = \frac{1}{{\sqrt{a} }}\int _{ - \infty }^{ + \infty } {s\left( t \right) \varphi \left( {\frac{{t - b}}{a}} \right) dt}, \end{aligned}$$
(2)

where a and b are the scale (dilation) and translation parameters, respectively, and the function \(\varphi (t)\) is the basis function called the mother wavelet, and it is similar to the window function of the STFT. \(\varphi ({\frac{{t - b}}{a}})\) is obtained by \(\varphi (t)\) after translation and expansion transformation, and the basis function \(\varphi (t)\) satisfies the following condition.

$$\begin{aligned} \int _{ - \infty }^{ + \infty } {{{\left| {\varphi \left( t \right) } \right| }^2}dt} < \infty . \end{aligned}$$
(3)

For the wavelet transform, in order to obtain the desired transform results, the wavelet basis function plays an import role. Till now, lots of wavelet basis functions with different characteristics have been proposed, such as the Haar wavelet basis, Daubechies wavelet basis, Symlet wavelet basis, Coiflet wavelet basis and Morlet wavelet basis et al. These wavelet basis functions have different characteristics, such as support width, symmetry, vanishing moment and regularity. For our considered applications, we have no specific requirements on the wavelet basis functions but only demand that it has limited support width, thus we choose the Morlet wavelet basis function, and it has the form [31]

$$\begin{aligned} \varphi \left( t \right) = \pi ^{-1/4} e^{-j{w_0}t}e^{-t^2/2}. \end{aligned}$$
(4)

3.1.2 Margenau-hill distribution (MHD) bilinear transform

It is a time-frequency analysis method with many excellent features. Specifically, MHD has true marginality, weak supporting and better time-frequency aggregation [32]. MHD-based bilinear transform can be characterized as follows [31]:

$$\begin{aligned} \begin{aligned} MH{D_s}\left( {t,f} \right) = \iiint _{-\infty }^{+\infty }&{s\left( {t + {{}^{\tau } \!\big / \!{}_{2}}} \right) } {s^ * } \left( {t - {{}^{\tau } \!\big / \!{}_{2}}} \right) \cos \left( {{{\eta \tau } \big / 2}} \right) \cdot {e^{ - j2\pi \left( {\eta t + f\tau - \eta u} \right) }}d\tau . \end{aligned} \end{aligned}$$
(5)

From the above, we can note that the kernel function of MHD is \(\phi (\eta ,\tau )=\cos (\eta \tau /2)\) , and it is more complexity than that for Wigner-Ville distribution (WVD). Similar to pseudo-Wigner-Ville distribution (PWVD), if the time domain window function \(h(\tau )\) is added to the time domain variable \(\tau\), the cross-term of MHD can be suppressed to a certain extent and which forms a pseudo-Margenau-Hill distribution (PMHD) [33].

3.1.3 Born-Jordan distribution (BJD) bilinear transform

The kernel function of BJD is \(\phi ({\eta ,\tau })=\sin ({\pi \tau \eta })/{\pi \tau \eta }\). Compared with other Cohen-like time-frequency analysis methods, BJD has higher time-frequency resolution. Its expression is [34]

$$\begin{aligned} \begin{aligned} BJ{D_s}\left( {t,f} \right) = \frac{1}{{2a}}\int _{ - \infty }^{ + \infty } \frac{1}{{\left| \tau \right| }}\int _{t - a\left| \tau \right| }^{t + a\left| \tau \right| }&{s\left( {u + {{}^{\tau } \!\big / \!{}_{2}}} \right) } {s^ * }\left( {u - {{}^{\tau } \!\big / \!{}_{2}}} \right) \cdot {e^{ - j2\pi f\tau }}dud\tau , \end{aligned} \end{aligned}$$
(6)

where a is constant.

Therefore, for the received signals, above linear and bilinear time-frequency analysis methods, i.e., the wavelet transform, MHD transform and BJD transform, are used to calculate the spectrograms to formulate the inputs for the three channels of the deep network, as shown in Fig. 2. In specific, the gray-scale images obtained from these three time-frequency transforms are mapped to the red, green and blue (RGB) sub-images, respectively. Subsequently, during the phase of deep network training, these RGB sub-images form the input of the deep network, that is, the red sub-image, the green sub-image and the blue sub-image each as one channel of the deep network. Herein, in order to better extract the features and perform training and classification by the deep network, some preprocessing steps are required, i.e., the image normalized, binarized, cropped and resized, which will be explained as below.

Fig. 2
figure 2

 Flowchart of composite time-frequency analysis

3.2 Image normalization

Due to the fact that by performing time-frequency transform, the pixel value of the gray-scale spectrogram I(xy) for different kinds of interference signals may significantly different, and the data (image) with larger pixel value will have a greater impact on training, thereby destroying the balance of the data set. In order to reduce the imbalance of the data set, the gray-scale spectrogram is normalized before inputting into the deep network. That is, for the gray-scale spectrogram \(I_1(x,y)\), the normalization method is

$$\begin{aligned} \begin{aligned} {I_1}(x,y)={\left\{ \begin{array}{ll} 0,&{}I(x,y)\le {a_{\min }}\\ \frac{I(x,y)-a_{\min }}{a_{\max }-a_{\min }},&{}a_{\min }< I(x,y)< a_{\max }\\ 1,&{}I(x,y)\ge a_{\max },\\ \end{array}\right. } \end{aligned} \end{aligned}$$
(7)

where \(a_{\min }\) and \(a_{\max }\) are the minimum and maximum thresholds. That is, the pixel value smaller than \(a_{\min }\) is set to 0, and the pixel value larger than \(a_{\max }\) is set to 1. In this article, \(a_{\min }\) and \(a_{\max }\) are set to 0 and 137, respectively.

3.3 Image binarization

After the normalization of the image, in order to reduce the negative effects of the noise, we should further perform the binarization to denoise before the step of image cropping and resizing. The binarization algorithm used in this paper is based on a global threshold [35]. In particular, the binarization algorithm is summarized in Algorithm 1.

figure a

From the above, we can note that the core of the algorithm is to calculate the binarization threshold T, and after the binarization, the value of each pixel is either 0 or 1.

3.4 Image cropping and resizing

From Fig. 2, we note that most areas of the image after binarization contain no useful features. Therefore, in order to reduce redundant information of the image, part of the image which has no useful information is cropped. That is, we carry out frequency domain clipping according to the start and end frequencies of the frequency hopping signal and also the highest and lowest frequencies of the interference signal, but does not cut in the time domain. In addition, in order to further reduce the amount of data and adapt to the input of the deep network, the size of the cropped image is adjusted so that all the images generated by the time-frequency transforms have the same size. Specifically, we use the nearest neighbor interpolation algorithm in image resizing as [36].

To sum up, for each sample signal (received by the frequency hopping receiver), at first, we perform the wavelet-based linear time-frequency transform, MHD- and BJD-based bilinear time-frequency transforms to obtain three gray-scale spectrograms. Then aforementioned normalization, binarization, cropping and size adjustment are sequentially used for the three gray-scale spectrograms. In order to make full use of the characteristics of linear and Cohen-like bilinear time-frequency transforms, the three single-channel gray-scale time-frequency images are transferred to the red-, green- and blue-colored images, respectively, to formulate the three-channels RGB color spectrograms and finally input into the deep neural network for classification.

4 Details of the method: the Siamese neural network

The Siamese neural network was first introduced by Bromley and LeCun in the early 1990s to solve the problem of signature verification in the form of image matching [37]. The Siamese neural network is composed by two sub-networks that accept different inputs and a top energy function. The energy function at the top calculates the distance between the topmost output feature representations of the sub-networks on both sides. The parameters between the two sub-networks are bound, so that the two sub-networks calculate the characteristics of their respective input samples according to the same rules [38]. In the following, the architecture and the parameters of the Siamese neural network used in this paper are presented.

4.1 Architecture of the Siamese neural network

Fig. 3
figure 3

 Architecture of the Siamese neural network

Fig. 4
figure 4

 Architecture of the sub-network of the Siamese neural network

The architecture of the Siamese neural network is shown in Fig. 3. It contains L layers, and each layer of the sub-network contains \(N_l\) neurons, where \(\mathbf {h}_{1,l}\) represents the hidden layer vector of the lth layer of sub-network 1, and \(\mathbf {h}_{2,l}\) represents the hidden layer vector of the lth layer of sub-network 2. The rectified linear unit (ReLU) is used as the activation function in the first \(L-1\) layers of the Siamese neural network. Therefore, \(\forall l\in \{1,\ldots ,L-1\}\), we have the following relationship for the Siamese neural network,

$$\begin{aligned} h_{1,m}= & {} \max (0,{\mathbf {W}_{l-1,l}^T}{\mathbf {h}_{1,(l-1)}}+{\mathbf {b}_l}), \end{aligned}$$
(8)
$$\begin{aligned} h_{2,m}= & {} \max (0,{\mathbf {W}_{l-1,l}^T}{\mathbf {h}_{2,(l-1)}}+{\mathbf {b}_l}). \end{aligned}$$
(9)

\({\mathbf {W}_{l-1,l}}\) represents the shared weight matrix of the two sub-networks connecting the \(N_{l-1}\) neurons of the \(l-1\)th layer and the \(N_l\) neurons of the lth layer, the size is \({N_{l-1}}\times {N_l}\), and \({\mathbf {b}_l}\) is the bias vector of the lth layer.

After the \(L-1\) layers feed forward network, we then use the distance layer to quantify the difference of the eigenvectors \(\mathbf {h}_{1,L-1}\) and \(\mathbf {h}_{2,L-1}\) calculated by the two sub-networks. The distance function used by the distance layer is

$$\begin{aligned} {p=\sigma \left( \sum \nolimits _j{\alpha _j}\left| {\mathbf {h}_{1,l}^{(j)}- {\mathbf {h}_{2,l}^{(j)}}}\right| \right) , } \end{aligned}$$
(10)

where \(\sigma (\cdot )\) is the sigmoidal activation function. This final distance layer induces a metric on the learned feature space of the \(L-1\)th hidden layer, and scores the similarity between the two feature vectors, and finally obtains the predicted score p. \(\alpha _j\) are additional parameters learned by the model during the training process, which weighting the importance of the component-wise distance. This defines a final Lth fully connected layer for the network which joints the two Siamese twins.

4.2 Parameters of the Siamese neural network

The sub-network architecture of the Siamese neural network used in this paper is shown in Fig. 4. The parameters of the two sub-networks are bounded and they have the same network architecture. That is, each sub-network is composed of four convolutional layers. Each convolutional layer uses a different size of convolution kernel, and the fixed step size is 1. The number of convolution kernels is designated as a multiple of 16, which can facilitate the training process and optimize the performance. The middle convolutional layer of the sub-network uses the ReLU function as the activation function to perform output feature mapping, and then it is followed by a maximum pooling layer with a step size of 2. While after the last convolutional layer is a fully connected layer, the sigmoidal activation function is used for mapping for the fully connected layer. The Adam optimizer [39] is adopted for the sub-network training, and the learning rate is dynamically adjusted. By gradually reducing the learning rate, the network can more easily converge to a minimum.

5 Results and discussion

In this section, the performance of the proposed compound time-frequency analysis and Siamese neural network-based interference classification algorithm is evaluated and analyzed. Herein, we first introduce the training parameters for the Siamese neural network and the parameters used to generate the interference signal data set. Then, we present some time-frequency analysis results of the interference signals under different scenarios and analyze how does the spectrograms are affected by the system parameters. Finally, the interference classification performance of the proposed algorithm is verified and analyzed by simulations.

5.1 Simulation parameters and data set construction

5.1.1 Siamese network training parameters

The parameters used for training of Siamese neural network are listed in Table  1. The parameters adopted by the two sub-networks are bounded and updated synchronously to perform fairly feature mapping for the input images. Herein, \(N(\mu ,\sigma ^2)\) represents a normal distribution with mean value \(\mu\) and variance \(\sigma ^2\).

Table 1 Training parameters of the Siamese network

5.1.2 Parameters for signal sample generation

Without special instructions, the parameters used in the simulations for the frequency hopping communication system are shown in Table  2, as [20], we consider a low-speed frequency hopping system.

Table 2 Parameters of frequency hopping signal

While the parameters for the interference signals are set as Table  3 [20], in which U[ab] represents the uniform distribution on the interval [ab]. Four kinds of interference are considered, i.e., fixed frequency interference, periodic linear sweep interference, periodic pulse interference and comb spectrum interference.

Table 3 Parameters of interference signal

Also, in simulations, the interference signal strength is measured by the jamming-to-signal power ratio (JSR) defined as (11), where \(V_{Jamming}\) and \(V_{Signal}\) denote the average amplitudes of the interference signal and the frequency hopping signal, respectively.

$$\begin{aligned} {{\mathrm{JSR} = - 20}}\lg \frac{{{V_{Jamming}}}}{{{V_{Signal}}}} \end{aligned}$$
(11)

To generate signal sample and data set, the value of JSR varies from -10dB to 20dB with an interval of 5dB, i.e., we have seven values of JSR. In addition, besides the singularity interference shown in Table  3, we also consider the combination interference in the simulations. However, for the combination interference, we only discuss a combination of two kinds of interference. Therefore, there are \(C_4^1+C_4^2=10\) types of interference. Unless otherwise stated, the training data set is generated as follows, for each value of JSR and the type of interference, 100 signal samples are randomly generated, i.e., we totally have \(7\times 10\times 100=7000\) signal samples. In addition, when generating the data set, the amplitudes of all interference signals are uniformly distributed over [0.5, 1.5]. It should be noted that the data input to the Siamese network is in the paired form. In particular, we randomly select two samples in the training set as the matching pairs. If the two samples of the matching pair have the same type, the label of the matching pair is 1, otherwise the label of the matching pair is 0. Furthermore, the Siamese neural network is iteratively trained 2000 times, and 180 matching pairs are randomly generated from the training set for each iterative training, so a total of 360,000 training matching pairs are included.

5.2 Time-frequency spectrogram for the signals

In this subsection, the time-frequency spectrograms of the composite interference signals are analyzed. To facilitate the analysis of the simulation results, the number of hopping frequencies for the considered system is only set to 4. Herein, the number of hopping frequencies sets to 4 but not 16 is just for more convenient observation.

5.2.1 The time-frequency spectrogram for different time-frequency methods

First, taking the frequency hopping signal interfered by the periodic linear sweep interference signal as an example, we analyze the time-frequency features extracted by different time-frequency analysis methods, i.e., wavelet, MHD and BJD, in which the JSR is set to 0dB. The results are shown in Fig. 5. The horizontal axis of the time-frequency spectrogram is time, and the vertical axis is frequency. The gradation of the color in the spectrogram indicates the normalized power intensity of the signal. Figure 5 shows that for all the mentioned time-frequency analysis methods, the spectrograms of the frequency hopping signal exhibit the characteristics of time-varying and frequency hopping in the time-frequency domain, while the linear frequency sweeping signal shows the characteristic of linearly frequency changing with time in the time-frequency domain. Therefore, all the above-mentioned time-frequency analysis methods can extract the frequency hopping characteristics of the frequency hopping signal and the frequency gradual change characteristics of the periodic linear frequency sweep signal. Moreover, we can note that the main difference among the spectrograms obtained by different time-frequency analysis methods is that when the signals overlap, the Cohen-like bilinear time-frequency representations, especially the BJD time-frequency transform using the kernel function \(\phi ({\eta ,\tau })=\sin ({\pi \tau \eta })/{(\pi \tau \eta )}\), has abundant cross-terms. This is confirmed by the overlap part of the frequency hopping and frequency sweep signals in Fig. 5c. Compared with the features shown in Fig. 5a, BJD time-frequency analysis has more crossover features and fine image branches. In addition, for the proposed composite time-frequency analysis, the characteristics of linear and nonlinear time-frequency analysis are retained as that shown in Fig. 5d, which can be used to enhance the classification performance.

Fig. 5
figure 5

 Spectrogram images of interference signals with different TFD

5.2.2 Time-frequency spectrogram for different kinds of interference

Now, the time-frequency spectrogram of the signals interfered by one of the aforementioned four kinds of singularity interferences or two kinds of composite interferences are analyzed. Herein, the JSR of the signals are set to 0dB and the wavelet transform is taken as an example. The results are shown in Fig. 6. In which, Fig. 6a is the case that the signal is interfered by fixed-frequency interference. And from the time-frequency spectrogram, we can observe single or multiple interference signals on one fixed frequency or multiple frequencies, they are corresponding to single-tone and multi-tone interferences, respectively. We note that this type of interference has a great impacts for the frequency hopping signal appearing in its frequency range. For periodic linear frequency sweep interference, as shown in 6b, the interference signal is continuous in frequency domain and appears as a diagonal band in the spectrogram, which can interfere with a wide range of frequencies. The periodic pulse interference shown in Fig. 6c contains multiple frequency bands with gradual power intensity in the spectrogram. The pulse period affects the distance between frequency bands in the spectrogram, and the duty cycle affects the distribution of distance between frequency bands in the spectrogram. For comb spectrum interference, as shown in Fig. 6d, in the interference frequency band, continuous interference frequency bands appear, corresponding to each comb tooth of comb spectrum interference.

Fig. 6
figure 6

 Spectrogram images of different interference signals

In the case of multiple interferences coexisting, the time-frequency spectrogram will contain multiple interference characteristics. If the time-frequency characteristics of different types of interferences are significant different, it is still easy to perform interference classification, such as that shown in Fig. 6e, where the interference is composite by fixed frequency and linear frequency sweep signals. The problem becomes challenge as the composite interferences have similar time-frequency characteristics, such as that shown in Fig. 6f where the interference is composite by periodic pulse and comb spectrum signals.

5.2.3 The influence of JSR

At last, we analyze how does the time-frequency spectrogram is affected by interference signal intensity by varying the value of JSR and the result is shown in Fig.7. Herein, taking the frequency hopping system is interfered by the composite of sweeping and fixed frequency interferences as an example, and using wavelet transform as the time-frequency analysis tool. It can be seen from the figure that with the increase of JSR, the color of the interference signal in the time-frequency spectrogram becomes darker and covers each other, especially as JSR=20dB, that is, the interferences are strong enough so that the features of different kinds of interferences are overlapped, thus the interference signal aliasing in the spectrogram and seriously reducing the distinguishability of them. While as JSR=-10dB, the interference intensity is low, now the interference is not obvious in the spectrogram and thus it is more difficult to distinguish the interference signals with similar characteristics. In fact, if JSR is small, there is no need to perform interference classification as it may not interfere the authorized communication system.

Fig. 7
figure 7

 Spectrogram images of interference signals at different JSRs

5.3 Performance of the algorithm

In this subsection, the performance of the proposed interference classification algorithm is evaluated. At first, we explore how does the algorithm performance is affected by different time-frequency transforms. We then evaluate and analyze the algorithm performance by comparing it with traditional convolutional neural network and AlexNet transfer learning-based interference identification algorithms [20, 40, 41]. Herein, to accelerate the training of the AlexNet, transfer learning is used, that is, only small sample sets are used to train a pre-trained AlexNet [40]. Finally, we further discuss the impact of sample data set size on the performance of the interference identification algorithm.

5.3.1 Analysis of the effect of composite time-frequency analysis method

In order to verify the effect of the composite time-frequency analysis method on improving the performance of the interference classification algorithm, we analyze the classification accuracy of the algorithm based on linear, Cohen bilinear and composite time-frequency analysis method. The parameters used for training of the Siamese network and also the data set generation are as described in Sect. 5.1. Figure 8 shows the trend of the loss objective function during the training process of the Siamese network. It can be seen from the figure that after batch training, the loss function value gradually stabilizes, and the Siamese network gradually converges.

Fig. 8
figure 8

 Training loss of the Siamese network

Figure 9 shows how the classification accuracy is affected by different time-frequency analysis methods, where the average classification accuracy is calculated herein, and it is an average accuracy for identifying ten kinds of interference. It can be seen from the figure that if JSR does not exceed 15dB, as JSR increases, the classification accuracy of different time-frequency analysis methods are all gradually improved, i.e., the intensity of interference increases and the features of the interference signals become obvious which facilitates the classification. While if JSR exceeds 15dB, the classification accuracy decreases. This phenomenon comes from the fact that if JSR becomes larger, the interference signal intensity will be too larger so that a large area of the spectrogram is covered by the high-power signal features and the pixels color of the spectrogram becomes darker, i.e., part of the unique features of interference signal will be concealed, especially when the interferences are overlapped. This has been verified by time-frequency spectrogram shown in Sect. 5.2.

Fig. 9
figure 9

 Classification accuracy of different time-frequency analysis methods versus JSR

From Fig. 9, we can observe that MHD-based method has the lowest classification accuracy, followed by wavelet-based method, and BJD-based method obtains the highest accuracy among the single time-frequency analysis-based methods. Also we note that when the interference signal intensity is large, i.e., JSR\(\ge\)0dB, the composite time-frequency analysis-based interference classification algorithm obtains the highest classification accuracy. While the situation becomes worse as JSR0dB, that is, as the interference signal intensity is too weak, the classification accuracy of the compound time-frequency analysis-based method is slightly lower than the BJD time-frequency analysis-based method. This result comes from the fact that as the interference signal intensity is very low, the cross-term generated by the BJD time-frequency transform can enhance the distinguishability of different kinds of interferences. However, though BJD, MHD and wavelet transforms are combined in our composite time-frequency analysis method, the features obtained from this composite time-frequency analysis may be ignored thus achieve worse performance. In spite of this, this result still confirms that in most cases, the proposed composite time-frequency analysis-based algorithm can obtain better performance than the other single time-frequency analysis-based approaches.

5.3.2 Analysis of the effect of Siamese network

In order to fully characterize the performance of the proposed algorithm, we further analyze the effect of Siamese network and its performance by comparing it with the AlexNet transfer learning and the convolutional neural network-based algorithms. The parameters of AlexNet can be found in [40]. The core idea of the AlexNet transfer learning-based interference classification algorithm is that we use the pre-trained AlexNet network and adaptive the last three layers of the network to our interference classification problem, and then the same data set are used to fine-tune the parameters of obtained AlexNet network. The configurations for the convolutional neural network are three convolutional layers with an ReLU active function for each convolutional layer, then followed by a maximum pooling layer, and the last layer of the whole network is a fully connected layer. By comparison, the same data set described in Section V-A is used by the three networks for testing and training.

Fig. 10
figure 10

 Classification accuracy of different neural network versus JSR

Figure 10 shows the classification results of aforementioned three networks. Still, it can be seen from the figure that as JSR does not exceed 15dB, as JSR increases, the classification accuracy of all algorithms gradually increases. While as JSR exceeds 15dB, the classification accuracy of all three networks are reduced. This phenomenon is consistent with that shown in Fig. 9 and has the same reasons thus omitted for simplification. In addition, we also can note that the Siamese network-based algorithm obtains the highest classification accuracy, followed by the AlexNet transfer learning-based algorithm, and the convolutional neural network-based algorithm has the lowest classification accuracy. This result verifies the dominated performance of the proposed Siamese network-based algorithm over the AlexNet transfer learning and the convolutional neural network-based algorithms.

5.3.3 Analysis of the impact of sample data set size

In order to evaluate the performance of the algorithm on small data sets, we further demonstrate the classification performance of the Siamese network with different training matching pairs. Under the condition that the total number of training samples is unchanged, Table  4 shows how does the classification accuracy is varying with the training matching pairs of the Siamese network. The average classification accuracy in the table is an average interference classification accuracy under various JSR. One can note that as the number of matching pairs decreases, the average classification accuracy decreases, while as the number of iterations and the number of matching pairs in each batch of training decreases, the classification accuracy also decreases. However, the reduction in the number of matching pairs does not significantly reduce the classification accuracy. In addition, it is worth mentioning that the average classification accuracy of the aforementioned two comparison algorithms, namely the AlexNet transfer learning and the convolutional neural network-based algorithms are 82.79% and 72.14%, respectively. It can be seen that even if fewer matching pairs are used by the Siamese network during the training process, its interference classification accuracy is still higher than the AlexNet transfer learning and the convolutional neural network-based algorithms. The main reason is that in order to generate training matching pair samples, the random matching is used by the Siamese network, thus the trained Siamese network is more robust in interference classification than the AlexNet transfer learning and the convolutional neural network-based algorithms. This result also shows the dominated performance of the proposed Siamese network-based algorithm.

Table 4 Effects of the number of training sample and matching pair on Siamese network

6 Conclusions

In this paper, the interference classification for the frequency hopping communication system is studied and then a composite time-frequency analysis and Siamese neural network-based interference classification algorithm is proposed. Specifically, in order to fully extract the characteristics of various interferences, at first, a composite time-frequency analysis algorithm has been designed to calculate the time-frequency distribution of the received signals. Both the linear time-frequency transform, i.e., wavelet transform, and the bilinear time-frequency transform, i.e., MHD and BJD transforms, are used to extract the time-frequency representations of the received signals, and thus three-channel time-frequency spectrograms are obtained. Then before the multi-channel time-frequency spectrograms are input to the deep network for classification, they are normalized, binarized, resized and cropped. Finally, the Siamese network is selected as the classifier. In which, the twin sub-network of the Siamese neural network calculates two distance vectors of the input samples on each sub-network to determine whether the two inputs are the same type of samples. The matching and classification of the samples are realized after repeated training. From the simulation results, we found that the classification accuracy of the proposed algorithm based on composite time-frequency analysis is better than the method based on single time-frequency transformation in most cases. In addition, through comparison, we also have noted that the proposed algorithm obtains higher classification accuracy than both the AlexNet transfer learning and the convolutional neural network-based methods.

Interference classification is the premise of interference confrontation, due to the jamming strategies are getting more sophisticated and intelligent, how to obtain a high precision interference classification is still a challenge issue, especially over complex adversarial environment. Therefore, there are still many problems can be discussed for the interference classification. For us, from a practical application point of view, how to obtain high precision interference classification with limited system resources, such as CPU- or GPU-based computing resources, and also with small sample sets are more interesting, i.e., the design of compress or finite precision bit quantization-based classification models.

Availability of data and materials

The original data are not applicable. Besides, if the original code is needed, please contact author Changzhi Xu or Jingya Ren for data requests.

Abbreviations

ISM:

Industrial scientific medical

WLAN:

Wireless local area network

RSS:

Received signal strength

CNN:

Convolutional neural network

DL:

Deep learning

WII:

Wireless interference identification

PSD:

Power-spectral density

IDI:

Interference detection and identification

COTS:

Commercial off-the-shelf

CLDNN:

Convolutional, long-short-term-memory, full connected deep neural networks

LSTM:

Long-short-term-memory

SOM:

Self-organizing map

COTS:

Commercial off-the-shelf

C-RAN:

Cloud or centralized radio access network

DSSS:

Direct sequence spreading spectrum

TSCH:

Time-slotted channel hopping

IWSANs:

Industrial wireless sensor and actuator networks

SVMs:

Support vector machines

UID:

User identification detection

STFT:

Short-time Fourier transform

WTs:

Wavelet transforms

MHD:

Margenau-Hill distribution

WVD:

Wigner-Ville distribution

PWVD:

Pseudo-Wigner-Ville distribution

PMHD:

Pseudo-Margenau-Hill distribution

BJD:

Born-Jordan distribution

RGB:

Red, green and blue

ReLU:

Rectified linear unit

JSR:

Jamming-to-signal power ratio

References

  1. W. Zhang, Handbook of Cognitive Radio (Springer, Singapore, 2017)

    Book  Google Scholar 

  2. J. Kim, S. Lee, Y. Kim, S. Kim, Classification of interference signal for automotive radar systems with convolutional neural network. IEEE Access 8, 176717–176727 (2020)

    Article  Google Scholar 

  3. J. Webber et al., WLAN interference identification using a convolutional neural network for factory environments. J. Commun. 8(7), 276–283 (2021)

    Article  Google Scholar 

  4. J. Huang et al., Semi-supervised Deep Learning Based Wireless Interference Ifor IIOT Networks, in VTC-Fall, 2020, pp. 1–5

  5. J. Yu, M. Alhassoun, and R. M. Buehrer, Interference Classification Using Deep Neural Networks, in VTC-Fall, 2020, pp. 1–6

  6. S. Grimaldi, A. Mahmood, M. Gidlund, Real-time interference identification via supervised learning: embedding coexistence awareness in iot devices. IEEE Access 7, 835–850 (2019)

    Article  Google Scholar 

  7. X. Zhang et al., Deep Learning for Interference Identification: Band, Training Snr, and Sample Selection, in SPAWC, 2019, pp. 1–5

  8. S. Yi, H. Wang, W. Xue, X. Fan, L. Wang, J. Tian, and R. Matsukura, Interference Source Identification for IEEE 802.15.4 Wireless Sensor Networks Using Deep Learning, in 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sep., 09-12, Bologna, Italy, 2018, pp. 1–7

  9. S. Grunau, D. Block, U. Meier, Multi-label Wireless Interference Classification with Convolutional Neural Networks, in INDIN, 2018, pp. 187–192

  10. M. Schmidt, D. Block, U. Meier, Wireless Interference Identification with Convolutional Neural Networks, in INDIN, 2017, pp. 180–185

  11. G. Wang et al., Classification methods with signal approximation for unknown interference. IEEE Access 8, 37933–37945 (2020)

    Article  Google Scholar 

  12. Z. Yang, Y. Wang, L. Zhang, Y. Shen, Indoor Interference Classification Based on Wifi Channel State Information, in SpaCCS, 2018, pp. 136–145

  13. C.-J. Liu, P. Huang, L. Xiao, A.-H. Esfahanian, Inter-femtocell interference identification and resource management. IEEE Trans. Mob. Comput. 19(1), 116–129 (2020)

    Article  Google Scholar 

  14. Y. Guo et al., Regression-based Uplink Interference Identification and Sinr Prediction for 5g Ultra-dense Network, in ICC, 2020, pp. 1–6

  15. S. Grimaldi, A. Mahmood, M. Gidlund, An SVM-based method for classification of external interference in industrial wireless sensor and actuator networks. J. Sens. Actuar. Netw. 6(2), 9 (2017)

    Article  Google Scholar 

  16. T. Mo, Z. Hao, Y. Tang, Iterative DS-CDMA Anti-interference Technique Based on Interference Power Cognition, in WICON, 2011, pp. 117–124

  17. X. Liu, K.C. Teh, E. Gunawan, Interference identification and blind multiuser detection for asynchronous CDMA systems with multipath fading. IEEE Trans. Commun. 55(12), 2257–2260 (2007)

    Article  Google Scholar 

  18. L. Li, Research and implementation of interference recognition. Xidian Univ. (2014) (in Chinese)

  19. G. Wang et al., Classification methods with signal approximation for unknown interference. IEEE Access 8, 37933–37945 (2020)

    Article  Google Scholar 

  20. X. Liu, Research on scenario recognition based on deep learning in wireless communication. Xidian Univ. (2018) (in Chinese)

  21. I. Goodfellow, Y. Bengio, A. Courville, Deep Learning (MIT Press, Cambridge, 2016)

    MATH  Google Scholar 

  22. Y. Lin, Y. Tu, Z. Dou, L. Chen, S. Mao, Contour stella image and deep learning for signal recognition in the physical layer. IEEE Trans. Cogn. Commun. Netw. 7(1), 34–46 (2021)

    Article  Google Scholar 

  23. S. Guo, Y. Wang, R. Liu, Y. Gao, Multi-dimensional and complicated electromagnetic interference hardware-in-the-loop simulation method. J. Syst. Eng. Electron. 26(6), 1142–1148 (2015)

    Article  Google Scholar 

  24. J. Li, G. Liu, C. Wang, Effects of complicated interference environment on the outage probability of the frequency hopping system. J. Xidian Univ. 4, 137–142 (2018)

    Google Scholar 

  25. Y. Wang, Y. Huang, Z. Chen, S. Fan, Z. Liu, H. Xu, Complicated interference identification via machine learning methods. 2021 IEEE 4th international conference on electronic information and communication technology (ICEICT), 18–20 August 2021

  26. M. Schmidt, D. Block, U. Meier, Wireless interference identification with convolutional neural networks. 2017 IEEE 15th international conference on industrial informatics (INDIN), 24–26 July 2017

  27. Y. Wang, G. Gui, H. Gacanin, T. Ohtsuki, O.A. Dobre, H.V. Poor, An efficient specific emitter identification method based on complex-valued neural networks and network compression. IEEE J. Sel. Areas Commun. 39(8), 2305–2317 (2021)

    Article  Google Scholar 

  28. L. Cohen, Generalized phase-space distribution functions. J. Math. Phys. 7(5), 781–786 (1966)

    Article  MathSciNet  Google Scholar 

  29. W. Heisenberg, The actual content of quantum theoretical kinematics and mechanics. Zhurnal Physik 43(3–4), 172–198 (1983)

    MATH  Google Scholar 

  30. Y. Luan, Y. Huang, X. Zheng, J. Cheng, Seismic time-frequency analysis based on entropy-optimized paul wavelet transform. IEEE Geosci. Remote Sens. Lett. 17(2), 342–346 (2020)

    Article  Google Scholar 

  31. B. Boashash, Time-Frequency Signal Analysis and Processing A Comprehensive Reference (Academic Press, London, 2015)

    Google Scholar 

  32. M. Hatami, M. Farrokhifard, M. Parniani, A non-stationary analysis of low-frequency electromechanical oscillations based on a refined margenau-hill distribution. IEEE Trans. Power Syst. 31(2), 1567–1578 (2016)

    Article  Google Scholar 

  33. X. Zeng, Automatic modulation classification of radar signals using the Pseudo Margenau-Hill distribution. Proceedings of the 2018 10th international conference on computer and automation engineering (ICCAE 2018), pp. 120-123, February 2018

  34. E. Cordero, M. Gosson, M. Dorfler, F. Nicola, Generalized Born-Jordan distributions and applications. Adv. Comput. Math. 46(4), 4–15 (2020)

    Article  MathSciNet  Google Scholar 

  35. M. Zhang, M. Diao, L. Guo, Convolutional neural networks for automatic cognitive radio waveform recognition. IEEE Access 5, 11074–11082 (2017)

    Article  Google Scholar 

  36. R.C. Gonzalez, R.E. Woods, Digital Image Processing (Prentice Hall International, Hoboken, 2008), pp.484–486

    Google Scholar 

  37. J. Bromley, I. Guyon, Y. Lecun, E. Sckinger, R. Shah, Signature Verification Using a Siamese Time Delay Neural Network, in NIPS, 1993

  38. G. Koch, R. Zemel, R. Salakhutdinov et al., Siamese Neural Networks for One-shot Image Recognition, in ICML, pp. 1–8, 2015

  39. D. Kingma and J. Ba, Adam: A Method for Stochastic Optimization, arXiv preprint arXiv:1412.6980, 2014

  40. A. Krizhevsky, I. Sutskever, G. Hinton, Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84–90 (2017)

    Article  Google Scholar 

  41. S. Lu, Z. Lu, Y.-D. Zhang, Pathological brain detection based on AlexNet and transfer learning. J. Comput. Sci. 30, 41–47 (2019)

    Article  Google Scholar 

Download references

Acknowledgements

Thanks for the suggestions provided by Prof. Z. Xiong from SUTD and Dr. J. Nie from NTU about how to improve the representations of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (No. 61801377).

Author information

Authors and Affiliations

Authors

Contributions

CX collected the data set, optimized the model and added new experiments and solved the problems in the simulations. JR and WY put forward the concept of this paper, built the model, made the performance simulations, and wrote part of the paper. XW wrote part of the paper. Other authors assisted in related work. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Changzhi Xu.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices: Typical interference patterns

Appendices: Typical interference patterns

According to the interference pattern, there are four kinds of interferences for the wireless communication system, i.e., fixed interference, sweep interference, periodic pulse interference and comb spectrum interference. The forms of these interference signals are presented below.

Fixed interference: It performs continuous interference at a specific frequency, the interference signal form is

$$\begin{aligned} J(t)=\sum _{i=1}^{N} A_i\cos (2\pi f_it+\phi _i), \end{aligned}$$
(12)

where N denotes the number of interference frequencies, if \(N=1\), it is degenerated to the monophonic interference, while if \(N>1\), it is termed as multi-tone interference. In addition, \(A_i\), \(f_i\) and \(\phi _i\) represent the amplitude, frequency and initial phase of the ith interference signal, respectively. The key parameters for the fixed frequency interference are \(f_i\), N and \(A_i\).

Sweep interference: It is a suppressive interference that scans each frequency in a designated frequency band to destroy all the authorized signals over this frequency band. In this paper, we only consider the periodic linear sweep interference and the signal form with single period is

$$\begin{aligned} J(t)= A\cos (2 \pi f_0 t + \pi \mu _0 t^2 + \phi _0). \end{aligned}$$
(13)

where A, \(f_0\), \(\mu _0\) and \(\phi _0\) denote the amplitude, initial frequency, sweep slope and initial phase of the sweep interference, respectively. In practical, the sweep interference is periodically performed over a designated frequency band and the main parameters are the scanning cycle and sweep slope.

Periodic pulse interference: It is an interference signal composed of a narrow pulse sequence. The signal form is

$$\begin{aligned} J(t)= \sum _{i} Ag_{\tau }(t-iT), \end{aligned}$$
(14)

where A and T denote the amplitude and pulse repetition period of the periodic pulse interference signal, respectively, and \(g_{\tau }(.)\) represents a rectangular pulse with pulse width \(\tau\). In addition, for the periodic pulse interference, there is an inexplicit parameter, i.e., the duty factor \(\gamma\), and it is defined as \(\gamma =\tau /T\). The key parameters for the periodic pulse interference signals are the pulse width \(\tau\), repetition period T and the duty factor \(\gamma\).

Comb spectrum interference: It is a kind of discrete blocking interference and it has multiple discrete narrow band interferences over a designated frequency band. The signal form is

$$\begin{aligned} J(t)= \sum _{i=1}^{N} A_i(t)\cos (2\pi f_i t+\phi _i(t)), \end{aligned}$$
(15)

where N, \(A_i(t)\), \(f_i\) and \(\phi _i(t)\) represent the number of comb, envelope, comb frequency and phase of the comb frequency interference signals, respectively. We can note that the comb frequency interference is a superposition of N narrow band interference signals. For the comb interference signals, the bandwidth, envelope, the gap among the combs are all adjustable parameters.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, C., Ren, J., Yu, W. et al. Time-frequency analysis-based deep interference classification for frequency hopping system. EURASIP J. Adv. Signal Process. 2022, 90 (2022). https://doi.org/10.1186/s13634-022-00913-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-022-00913-z

Keywords