Federated Transfer Learning Aided Interference Classification in GNSS Signals

Min Jiang1, Ziqiang Ye1, Yue Xiao1 and Xiaogang Gou2 2The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang, 050050, China. 1National Key Laboratory of Wireless Communications
University of Electronic Science and Technology of China, Chengdu, 611731, China Email: [email protected]
Abstract

This study delves into the classification of interference signals to global navigation satellite systems (GNSS) stemming from mobile jammers such as unmanned aerial vehicles (UAVs) across diverse wireless communication zones, employing federated learning (FL) and transfer learning (TL). Specifically, we employ a neural network classifier, enhanced with FL to decentralize data processing and TL to hasten the training process, aiming to improve interference classification accuracy while preserving data privacy. Our evaluations span multiple data scenarios, incorporating both independent and identically distributed (IID) and non-identically distributed (non-IID), to gauge the performance of our approach under different interference conditions. Our results indicate an improvement of approximately 8%percent88\%8 % in classification accuracy compared to basic convolutional neural network (CNN) model, accompanied by expedited convergence in networks utilizing pre-trained models. Additionally, the implementation of FL not only developed privacy but also matched the robustness of centralized learning methods, particularly under IID scenarios. Moreover, the federated averaging (FedAvg) algorithm effectively manages regional interference variability, thereby enhancing the regional communication performance indicator, C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT, by roughly 5dBHz5dBHz5\text{dB}\cdot\text{Hz}5 dB ⋅ Hz compared to isolated setups.

Index Terms:
GNSS interference, federated learning, transfer learning, communication performance, data privacy, interference classification

I Introduction

GNSS receivers are widely used in both industrial and civilian domains, thanks to their all-weather capability, robust real-time performance, and precise navigation and timing[1]. However, the GNSS jamming signals, particularly within the L-band spectrum, can disrupt a GNSS receiver to the point of disabling its operation[2]. Research has identified jamming as the primary reason for outages in GNSS-based services[3]. Thus, incorporating defenses against such attacks is considered an essential feature for GNSS receivers[4]. Furthermore, the considerable distance of GNSS satellites from Earth reduces the signal power reaching the receiver due to path loss, rendering it highly susceptible to interference[5], while most intentional interferences originate from personal privacy devices, which, despite being illegal, are readily available online[6]. Therefore, these interference devices may cause incorrect positioning, navigation and timing services. As results, interference signals can lower receiver performance by decreasing the carrier to noise ratio (C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT), potentially leading to service interruptions.

With the increasing prevalence of interference signals, safeguarding GNSS receivers against such disruptions has become imperative. Accurate interference recognition enables the detection, characterization, and subsequent elimination of interference, utilizing interference parameter models in tandem with relevant techniques. Recently, solutions for interference mitigation have expanded to detection[7], mitigation[8], localization[9]. In [10], the authors proposed a predictor based on neural networks for global positioning system (GPS) anti-interference. Additionally, [11] assessed machine learning algorithms, including support vector machine (SVM), neural network, and random forest (RF), for detecting interference in wireless communication systems. Furthermore, authors in [12] proposed an intelligent radar anti-interference decision-making method based on deep deterministic policy gradient and multi-agent deep deterministic policy gradient to cope with changes in the interference aircraft’s strategies.

While considerable progress has been made in interference mitigation, research specifically targeting interference classification remains relatively sparse. In [2], the authors used SVM and CNN for interference classification, both methods achieved accuracies over 90%percent9090\%90 %. Building upon this work, [13] enhances GNSS interference signal classification accuracy using signal representation concatenation and transfer learning, evaluating classifiers like SVM, RF, and logistic regression (LR). Most GNSS interference research relies on synthetic data, however, collecting authentic data is crucial for training effective GNSS interference classifiers. Traditional crowdsourcing methods, which often require clients to record and directly share data with central servers, pose significant privacy threats[4]. Federated learning (FL) addresses this challenge by decentralizing data, enabling models to be trained on local devices and transmitting only updated model parameters to a central server. Thus, leveraging FL in the classification network enables indirect data exchange between clients and the central server, significantly enhancing both resource efficiency and privacy.

The effectiveness of collaborative management in mitigating GNSS interference was demonstrated by the authors in [14]. Furthermore, FL was utilized for interference classification in [4], achieving performance comparable to centralized learning. However, none of these studies dealt with the identified interference or analyzed the impact of interference on the performance of the communication system. For addressing the above-mentioned issue,the contributions of this paper are summarized as follows:

  • We propose a neural network-based interference classifier that prioritizes data privacy via federated learning (FL) and accelerates training using transfer learning (TL).

  • Within a wireless communication area, each local client efficiently manages changes in interference strategies and accomplishes classification tasks using a small training dataset. This is achieved by exchanging model parameters with the central server, thereby minimizing the impact on the GNSS receiver performance metric C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT.

  • We evaluate the effectiveness of our interference classifiers under various data distribution scenarios, including both independent and identically distributed (IID) and non-IID settings.

The paper is structured as follows: Section II outlines the system model for interference classification in GNSS and provides an overview of different types of jamming. Section III elaborates on the FL technique utilized. Simulation results are presented in Section IV, followed by conclusions drawn in Section V.

Refer to caption
Figure 1: A simple system model for jamming signal classification: A movable jammer, such as unmanned aerial vehicle (UAV), generates interference signals across regions, employing diverse interference strategies.

II System Model

II-A System Outline

In this article, we focus on the potential occurrence of signal interference in M𝑀Mitalic_M wireless communication zones, denoted as ={1,2,,M}12𝑀\mathcal{M}=\{1,2,\cdots,M\}caligraphic_M = { 1 , 2 , ⋯ , italic_M }. Each zone is connected to a central cloud server (CCS), which facilitates information sharing with each base station across each zone. As shown in Fig. 1, we utilize a UAV as a mobile jammer, serving as the source of interference. This UAV potentially disrupts wireless communication signals in these zones through various strategies denoted as \mathcal{L}caligraphic_L. The interference strategy lmsubscript𝑙𝑚l_{m}\in\mathcal{L}italic_l start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ∈ caligraphic_L varies with different zone m𝑚mitalic_m, including different types of signals transmitted within the zones. This means that the jamming UAV may emit a specific or multiple jamming signal types in one specific area, while in another area, the UAV may transmit a completely different signal. We assume the UAV’s position varies within each zone, generating interference jmsubscript𝑗𝑚j_{m}italic_j start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT in zone m𝑚mitalic_m, where jm𝒥subscript𝑗𝑚𝒥j_{m}\in\mathcal{J}italic_j start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ∈ caligraphic_J, which varies due to different interference strategies lmsubscript𝑙𝑚l_{m}italic_l start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT. Each zone is equipped with interference detectors constructed with convolutional neural networks (CNNs), denoted as Dmsubscript𝐷𝑚D_{m}italic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, where m𝑚mitalic_m represents the zone index. Employing the FL strategy, base station Bmsubscript𝐵𝑚B_{m}italic_B start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT in zone m𝑚mitalic_m shares network model parameters with the CCS to accomplish the task of interference recognition. Subsequently, based on the recognition results, appropriate measures are implemented to mitigate the interference.

The presence of interference signals amplifies the system’s cumulative noise power, thereby reducing the C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT and adversely affecting communication system performance[15]. Precise characterization of interference types enables a neural network classifier to initiate appropriate countermeasures against interference signals, mitigating their adverse effects on the C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT of communication systems.

If the jammer is not detected under a specific region m𝑚m\in\mathcal{M}italic_m ∈ caligraphic_M, we define the carrier-to-noise ratio under interference jmsubscript𝑗𝑚j_{m}italic_j start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT as C/N0m,j𝐶subscriptsubscript𝑁0𝑚𝑗C/{N_{0}}_{m,j}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT. Otherwise, C/N0m,j~~𝐶subscriptsubscript𝑁0𝑚𝑗\tilde{C/{N_{0}}_{m,j}}over~ start_ARG italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG in the absence of interference, which includes conditions following successful interference recognition and elimination. Consequently, the corresponding C/N0m𝐶subscriptsubscript𝑁0𝑚C/{N_{0}}_{m}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT is calculated as follows:

C/N0m=jm𝒥ηC/N0m,j~+(1η)C/N0m,j,𝐶subscriptsubscript𝑁0𝑚subscriptsubscript𝑗𝑚𝒥𝜂~𝐶subscriptsubscript𝑁0𝑚𝑗1𝜂𝐶subscriptsubscript𝑁0𝑚𝑗C/{N_{0}}_{m}=\sum_{j_{m}\in\mathcal{J}}\eta\tilde{C/{N_{0}}_{m,j}}+(1-\eta)C/% {N_{0}}_{m,j},italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ∈ caligraphic_J end_POSTSUBSCRIPT italic_η over~ start_ARG italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG + ( 1 - italic_η ) italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT , (1)

where η𝜂\etaitalic_η denotes the classification recognition accuracy.

Following [16], the relationship between C/N0m,j𝐶subscriptsubscript𝑁0𝑚𝑗C/{N_{0}}_{m,j}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT and SNR is calculated as follows:

C/N0m,j=SNRm,j×B,𝐶subscriptsubscript𝑁0𝑚𝑗subscriptSNR𝑚𝑗𝐵C/{N_{0}}_{m,j}=\text{SNR}_{m,j}\times B,italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT = SNR start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT × italic_B , (2)

where SNRm,jsubscriptSNR𝑚𝑗\text{SNR}_{m,j}SNR start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT represents signal-to-noise ratio for base station Bmsubscript𝐵𝑚B_{m}italic_B start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT under undetected interference jmsubscript𝑗𝑚j_{m}italic_j start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, B𝐵Bitalic_B denotes the bandwidth of the received signal for Bmsubscript𝐵𝑚B_{m}italic_B start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT. Similarly, we can calculate the C/N0m,j~~𝐶subscriptsubscript𝑁0𝑚𝑗\tilde{C/{N_{0}}_{m,j}}over~ start_ARG italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG as

C/N0m,j~=SNRm,j~×B,~𝐶subscriptsubscript𝑁0𝑚𝑗~subscriptSNR𝑚𝑗𝐵\tilde{C/{N_{0}}_{m,j}}=\tilde{\text{SNR}_{m,j}}\times B,over~ start_ARG italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG = over~ start_ARG SNR start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG × italic_B , (3)

where SNRm,j~~subscriptSNR𝑚𝑗\tilde{\text{SNR}_{m,j}}over~ start_ARG SNR start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG represents signal-to-noise ratio for Bmsubscript𝐵𝑚B_{m}italic_B start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT under detected interference jmsubscript𝑗𝑚j_{m}italic_j start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT.

II-B Classification of Jamming

We roughly model the received signal as follows:

r(t)=s(t)+j(t)+w(t).𝑟𝑡𝑠𝑡𝑗𝑡𝑤𝑡r(t)=s(t)+j(t)+w(t).italic_r ( italic_t ) = italic_s ( italic_t ) + italic_j ( italic_t ) + italic_w ( italic_t ) . (4)

where s(t)𝑠𝑡s(t)italic_s ( italic_t ) represents the useful signal, j(t)𝑗𝑡j(t)italic_j ( italic_t ) denotes the interference signal generated by UAV interference sources, and we assume the noise signal is additive white Gaussian noise (AWGN), represented by w(t)𝑤𝑡w(t)italic_w ( italic_t ). If there is no interference, j(t)𝑗𝑡j(t)italic_j ( italic_t ) is set to 00. This paper utilizes the interferences provided in [2], which include various signal types:

1) Amplitude modulation (AM) jamming: it is expressed as:

j(t)=k=1nPJkej(2πfJkt+θJk).𝑗𝑡superscriptsubscript𝑘1𝑛subscript𝑃subscript𝐽𝑘superscript𝑒𝑗2𝜋subscript𝑓subscript𝐽𝑘𝑡subscript𝜃subscript𝐽𝑘j(t)=\sum_{k=1}^{n}\sqrt{P_{J_{k}}}e^{j(2\pi f_{J_{k}}t+\theta_{J_{k}})}.italic_j ( italic_t ) = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT square-root start_ARG italic_P start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG italic_e start_POSTSUPERSCRIPT italic_j ( 2 italic_π italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_t + italic_θ start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT . (5)

AM interference manifests as continuous wave (CW) interference. When n=1𝑛1n=1italic_n = 1, it constitutes single-tone interference, while for n>1𝑛1n>1italic_n > 1, it transforms into multi-tone interference. Here, PJksubscript𝑃subscript𝐽𝑘P_{J_{k}}italic_P start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT represents the power of the kthsuperscript𝑘𝑡k^{th}italic_k start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT interference component, fJksubscript𝑓subscript𝐽𝑘f_{J_{k}}italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT signifies its corresponding frequency and θJksubscript𝜃subscript𝐽𝑘\theta_{J_{k}}italic_θ start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT is the phase.

2) Chirp jamming: it is expressed as:

j(t)=PJej(2πfJt+πb(fmaxfmin)Tswpt2+θJ).𝑗𝑡subscript𝑃𝐽superscript𝑒𝑗2𝜋subscript𝑓𝐽𝑡𝜋𝑏subscript𝑓maxsubscript𝑓minsubscript𝑇swpsuperscript𝑡2subscript𝜃𝐽j(t)=\sqrt{P_{J}}e^{j\left(2\pi f_{J}t+\pi b\frac{(f_{\text{max}}-f_{\text{min% }})}{T_{\text{swp}}}{t^{2}}+\theta_{J}\right)}.italic_j ( italic_t ) = square-root start_ARG italic_P start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT end_ARG italic_e start_POSTSUPERSCRIPT italic_j ( 2 italic_π italic_f start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT italic_t + italic_π italic_b divide start_ARG ( italic_f start_POSTSUBSCRIPT max end_POSTSUBSCRIPT - italic_f start_POSTSUBSCRIPT min end_POSTSUBSCRIPT ) end_ARG start_ARG italic_T start_POSTSUBSCRIPT swp end_POSTSUBSCRIPT end_ARG italic_t start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_θ start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT . (6)

This is a type of signal whose frequency is linearly modulated with time, achieved by scanning frequencies over a certain time range and frequency range. b=1𝑏1b=1italic_b = 1, it indicates upward linear frequency modulation, whereas b=1𝑏1b=-1italic_b = - 1 signifies downward linear frequency modulation. PJsubscript𝑃𝐽P_{J}italic_P start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT denotes the interference power, fJsubscript𝑓𝐽f_{J}italic_f start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT represents the interference frequency, fminsubscript𝑓minf_{\text{min}}italic_f start_POSTSUBSCRIPT min end_POSTSUBSCRIPT and fmaxsubscript𝑓maxf_{\text{max}}italic_f start_POSTSUBSCRIPT max end_POSTSUBSCRIPT signify the scanning start and end frequencies, respectively, Tswpsubscript𝑇swpT_{\text{swp}}italic_T start_POSTSUBSCRIPT swp end_POSTSUBSCRIPT denotes the scanning period and θJsubscript𝜃𝐽\theta_{J}italic_θ start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT represents the initial phase.

3) Frequency modulation (FM) jamming: it is expressed as:

j(t)=k=1nPJkej(2πfJkt+βksin(2πfJkt)).𝑗𝑡superscriptsubscript𝑘1𝑛subscript𝑃subscript𝐽𝑘superscript𝑒𝑗2𝜋subscript𝑓subscript𝐽𝑘𝑡subscript𝛽𝑘2𝜋subscript𝑓subscript𝐽𝑘𝑡j(t)=\sum_{k=1}^{n}\sqrt{P_{J_{k}}}e^{j(2\pi f_{J_{k}}t+\beta_{k}\sin({2\pi f_% {J_{k}}t}))}.italic_j ( italic_t ) = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT square-root start_ARG italic_P start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG italic_e start_POSTSUPERSCRIPT italic_j ( 2 italic_π italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_t + italic_β start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT roman_sin ( 2 italic_π italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_t ) ) end_POSTSUPERSCRIPT . (7)

FM interference signals also include both single-tone and multi-tone scenarios, with their carrier frequency influenced by the modulation factor βksubscript𝛽𝑘\beta_{k}italic_β start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and changing over time. Here, PJksubscript𝑃subscript𝐽𝑘P_{J_{k}}italic_P start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT represents the power of the kthsuperscript𝑘𝑡k^{th}italic_k start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT interference component, while fJksubscript𝑓subscript𝐽𝑘f_{J_{k}}italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT denotes its frequency.

4) Pulse jamming or distance measurement equipment (DME)-like jamming: it is expressed as:

j(t)=PJpτ(t)k=1nδ(tkfrk)ej(2πfJkt).𝑗𝑡tensor-productsubscript𝑃𝐽subscript𝑝𝜏𝑡superscriptsubscript𝑘1𝑛𝛿𝑡𝑘subscript𝑓subscript𝑟𝑘superscript𝑒𝑗2𝜋subscript𝑓subscript𝐽𝑘𝑡j(t)=\sqrt{P_{J}}p_{\tau}(t)\otimes\sum_{k=1}^{n}\delta(t-\frac{k}{f_{r_{k}}})% e^{j(2\pi f_{J_{k}}t)}.italic_j ( italic_t ) = square-root start_ARG italic_P start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT end_ARG italic_p start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ( italic_t ) ⊗ ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_δ ( italic_t - divide start_ARG italic_k end_ARG start_ARG italic_f start_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG ) italic_e start_POSTSUPERSCRIPT italic_j ( 2 italic_π italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_t ) end_POSTSUPERSCRIPT . (8)

Pulse interference refers to signals that are active only within a specific time interval, with the ratio of active time to the total period termed the duty cycle. Here, PJsubscript𝑃𝐽P_{J}italic_P start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT denotes the interference power, pτ(t)subscript𝑝𝜏𝑡p_{\tau}(t)italic_p start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ( italic_t ) denotes a rectangular pulse with a duty cycle of τ𝜏\tauitalic_τ, frksubscript𝑓subscript𝑟𝑘f_{r_{k}}italic_f start_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT is the repetition frequency of the pulse and fJksubscript𝑓subscript𝐽𝑘f_{J_{k}}italic_f start_POSTSUBSCRIPT italic_J start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT is the interference frequency.

5) Narrow band (NB) jamming: it is expressed as:

j(t)=PJcos(2πfJt+β0tn(ζ)𝑑ζ+θJ).𝑗𝑡subscript𝑃𝐽2𝜋subscript𝑓𝐽𝑡𝛽superscriptsubscript0𝑡𝑛𝜁differential-d𝜁subscript𝜃𝐽j(t)=\sqrt{P_{J}}\cos{(2\pi f_{J}t+\beta\int_{0}^{t}n(\zeta)d\zeta+\theta_{J})}.italic_j ( italic_t ) = square-root start_ARG italic_P start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT end_ARG roman_cos ( 2 italic_π italic_f start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT italic_t + italic_β ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT italic_n ( italic_ζ ) italic_d italic_ζ + italic_θ start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT ) . (9)

Narrow-band interference operates within a relatively narrow frequency range of the signal. Here, PJsubscript𝑃𝐽P_{J}italic_P start_POSTSUBSCRIPT italic_J end_POSTSUBSCRIPT represents the interference power, β𝛽\betaitalic_β is the modulation index, and n(ζ)𝑛𝜁n(\zeta)italic_n ( italic_ζ ) is a stationary random process with a mean of 00 and a variance of σζ2superscriptsubscript𝜎𝜁2\sigma_{\zeta}^{2}italic_σ start_POSTSUBSCRIPT italic_ζ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT.

Following [2], this paper excludes wide band (WB) jamming from consideration due to the difficulty in detecting its presence. The expressions for these five types of interference signals are detailed in [2]. By applying short-time frequency spectrum transformation, the spectrogram of r(t)𝑟𝑡r(t)italic_r ( italic_t ) is generated and rendered as a black-and-white image.

In this paper, we employ a FL strategy, whereby the central cloud server aggregates interference detector models from the M=5𝑀5M=5italic_M = 5 regions. Ultimately, the interference detectors across regions share their model parameters with the central server, thus completing the recognition of interference signals.

III Federated Learning Methodology

In conventional machine learning, centralized learning is a common methodology that focuses on training models on a central server. FL is distinguished by its emphasis on privacy, similar to distributed learning, which spreads data across various nodes. Many clients independently train model parameters and then collaborate with a central server to update the global model parameters. FedAvg, a widely used FL algorithm, leverages this approach by allowing each client to independently train its local model. The global model parameters are then improved by calculating the weighted average of the local model parameters[17].

As demonstrated in [4], FL has shown promising results in the field of image classification, with its classification outcomes comparable to state-of-the-art centralized classification. M𝑀Mitalic_M clients collaboratively train a neural classification network, the model is defined as follows:

𝐲=𝐡(𝐗;𝝎),𝐲𝐡𝐗𝝎\mathbf{y=h(X;\boldsymbol{\omega})},bold_y = bold_h ( bold_X ; bold_italic_ω ) , (10)

where 𝐲C𝐲superscript𝐶\mathbf{y}\in\mathbb{R}^{C}bold_y ∈ blackboard_R start_POSTSUPERSCRIPT italic_C end_POSTSUPERSCRIPT is the classification result, which consists of elements p(y=l|𝐗)𝑝𝑦conditional𝑙𝐗p(y=l|\mathbf{X})italic_p ( italic_y = italic_l | bold_X ), l{AM,Chirp,FM,DME,NB,No}𝑙𝐴𝑀𝐶𝑖𝑟𝑝𝐹𝑀𝐷𝑀𝐸𝑁𝐵𝑁𝑜l\in\{AM,Chirp,FM,DME,NB,No\}italic_l ∈ { italic_A italic_M , italic_C italic_h italic_i italic_r italic_p , italic_F italic_M , italic_D italic_M italic_E , italic_N italic_B , italic_N italic_o }, C𝐶Citalic_C is the number of interference types, 𝐗𝐗\mathbf{X}bold_X is the input image and 𝝎𝝎\boldsymbol{\omega}bold_italic_ω represents the parameters of the global model. Each client contributes its local dataset 𝒟m,m{1,,M}subscript𝒟𝑚𝑚1𝑀\mathcal{D}_{m},m\in\{1,...,M\}caligraphic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , italic_m ∈ { 1 , … , italic_M } to the overall dataset 𝒟𝒟\mathcal{D}caligraphic_D. We denote the size of each dataset 𝒟msubscript𝒟𝑚\mathcal{D}_{m}caligraphic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT as Dmsubscript𝐷𝑚D_{m}italic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT and the size of overall dataset 𝒟𝒟\mathcal{D}caligraphic_D is D=m=1MDm𝐷superscriptsubscript𝑚1𝑀subscript𝐷𝑚D=\sum_{m=1}^{M}D_{m}italic_D = ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT. Based on the FedAvg algorithm, the purpose of training is to minimize the loss function, which is defined as:

min𝝎(𝝎)where(𝝎)=m=1Mm(𝝎)=m=1MDmDm(𝝎).subscript𝝎𝝎where𝝎superscriptsubscript𝑚1𝑀subscript𝑚𝝎superscriptsubscript𝑚1𝑀subscript𝐷𝑚𝐷subscript𝑚𝝎\min\limits_{\boldsymbol{\omega}}\mathcal{L}(\boldsymbol{\omega})\quad\text{% where}\quad\mathcal{L}(\boldsymbol{\omega})=\sum_{m=1}^{M}\mathcal{F}_{m}(% \boldsymbol{\omega})=\sum_{m=1}^{M}\frac{D_{m}}{D}\mathcal{L}_{m}(\boldsymbol{% \omega}).roman_min start_POSTSUBSCRIPT bold_italic_ω end_POSTSUBSCRIPT caligraphic_L ( bold_italic_ω ) where caligraphic_L ( bold_italic_ω ) = ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT caligraphic_F start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( bold_italic_ω ) = ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT divide start_ARG italic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_ARG start_ARG italic_D end_ARG caligraphic_L start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( bold_italic_ω ) . (11)

Specifically, (𝝎)𝝎\mathcal{L}(\boldsymbol{\omega})caligraphic_L ( bold_italic_ω ) is the global model loss function, and m(𝝎)subscript𝑚𝝎\mathcal{F}_{m}(\boldsymbol{\omega})caligraphic_F start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( bold_italic_ω ) is the local model loss function for zone m𝑚mitalic_m. m(𝝎)=1Dmn𝒟mfn(𝝎)subscript𝑚𝝎1subscript𝐷𝑚subscript𝑛subscript𝒟𝑚subscript𝑓𝑛𝝎\mathcal{L}_{m}(\boldsymbol{\omega})=\frac{1}{D_{m}}\sum_{n\in{\mathcal{D}_{m}% }}f_{n}(\boldsymbol{\omega})caligraphic_L start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( bold_italic_ω ) = divide start_ARG 1 end_ARG start_ARG italic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_ARG ∑ start_POSTSUBSCRIPT italic_n ∈ caligraphic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_italic_ω ), in which fn(𝝎)subscript𝑓𝑛𝝎f_{n}(\boldsymbol{\omega})italic_f start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_italic_ω ) is the loss function of the sample n𝑛nitalic_n. The optimization process of the Eq.(11) can be expressed as follows. Before the start of the first iteration, the central server initializes a global model. During each iteration, the central server assigns the global model to each participating client in federated learning as its local model. Subsequently, each client conducts training on its local model using its local dataset to update local parameters, as denoted in:

𝝎mt+1=argmin𝝎m,t(𝝎).superscriptsubscript𝝎𝑚𝑡1subscript𝝎subscript𝑚𝑡𝝎\boldsymbol{\omega}_{m}^{t+1}=\arg\min_{\boldsymbol{\omega}}\mathcal{L}_{m,t}(% \boldsymbol{\omega}).bold_italic_ω start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t + 1 end_POSTSUPERSCRIPT = roman_arg roman_min start_POSTSUBSCRIPT bold_italic_ω end_POSTSUBSCRIPT caligraphic_L start_POSTSUBSCRIPT italic_m , italic_t end_POSTSUBSCRIPT ( bold_italic_ω ) . (12)

Following this, the central server aggregates the local model parameters by applying weight coefficients as:

𝝎t+1=m=1MDmD𝝎mt+1,superscript𝝎𝑡1superscriptsubscript𝑚1𝑀subscript𝐷𝑚𝐷superscriptsubscript𝝎𝑚𝑡1\boldsymbol{\omega}^{t+1}=\sum_{m=1}^{M}\frac{D_{m}}{D}\boldsymbol{\omega}_{m}% ^{t+1},bold_italic_ω start_POSTSUPERSCRIPT italic_t + 1 end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT divide start_ARG italic_D start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_ARG start_ARG italic_D end_ARG bold_italic_ω start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t + 1 end_POSTSUPERSCRIPT , (13)

where 𝝎mt+1superscriptsubscript𝝎𝑚𝑡1\boldsymbol{\omega}_{m}^{t+1}bold_italic_ω start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t + 1 end_POSTSUPERSCRIPT is the updated local parameters and 𝝎t+1superscript𝝎𝑡1\boldsymbol{\omega}^{t+1}bold_italic_ω start_POSTSUPERSCRIPT italic_t + 1 end_POSTSUPERSCRIPT is the updated global parameters. After the aggregation, the local model parameters together form the update for the global model. The central server utilizes these updates to refresh the global model. Ultimately, this iterative process is repeated a predefined number of times, indicated by T𝑇Titalic_T.

IV Simulation Results

IV-A Preprocessing procedure

In our experiments, we use the dataset from [2]. The dataset contains 61,8006180061,80061 , 800 binary images with a resolution of 512×512512512512\times 512512 × 512 pixels and 600600600600 DPI (Dots Per Inch). The dataset’s images are spectrum plots of various interference signals, obtained via short-time Fourier transform. The authors of [2] used 6,00060006,0006 , 000 images, 1,00010001,0001 , 000 per jammer type for training, 1,80018001,8001 , 800 images, 300300300300 per type for validation, and 54,0005400054,00054 , 000 images, 9,00090009,0009 , 000 images per type for testing. To simplify training and save computational resources, we exclude the validation set in this study. Consequently, The dataset consists exclusively of 75%percent7575\%75 % training and 25%percent2525\%25 % testing sets. The training set comprises 10,8001080010,80010 , 800 image, 1,80018001,8001 , 800 images per jammer type, while the testing set comprises 3600360036003600 images, 600600600600 images per jammer type. For faster training during data preprocessing, we downscale image dimensions from 512×512512512512\times 512512 × 512 to both 256×256256256256\times 256256 × 256 and 224×224224224224\times 224224 × 224.

IV-B Data distribution

In this study, we model the diverse interference strategies of the movable UAV jammer on GNSS receivers across M=5𝑀5M=5italic_M = 5 regions by intentionally creating a non-IID training dataset. This approach ensures that movable UAV jammer emits specific interference patterns in each region, aligning with different interference strategies and fitting the system model. Making the dataset non-IID effectively simulates the diversity and complexity of data from various real-world participants, enhancing the model’s robustness and adaptability. As discussed in [4], the authors achieved non-IID by modeling client data to conform to a Dirichlet distribution. Each client receives different categories of interference signals based on probabilities generated by the Dirichlet distribution. These probabilities are determined by the concentration parameter β𝛽\betaitalic_β, where a larger value results in a more uniform distribution with less disparity among components. Conversely, a smaller concentration parameter leads to greater disparities among components, causing the distribution to focus on specific components. In this research, we select a concentration parameter of 0.10.10.10.1 to highlight the data distribution imbalance among clients, ensuring that each client has only specific categories of interference signals. Fig. 2 illustrates the distribution of data quantities corresponding to each interference category for each client when M=5𝑀5M=5italic_M = 5. Clearly, the data distribution shows significant diversity, with each client having only a limited number of interference categories. This accurately reflects the diverse interference strategies employed by drones in different regions.

Refer to caption
Figure 2: Number of data points per class for each of the clients in non-IID scenario

Furthermore, this study examines the model’s performance during training with client data sampled from an IID distribution, contrasting these results with non-IID data scenarios. This comparative analysis enhances our understanding of the system model’s resilience to interference, especially when client data distribution shows significant diversity. Under IID conditions, where each of the client encounters an equal number of interference signals, the sample size totals 360360360360.

IV-C Model Setting

Authors in [2] used a basic CNN to conduct classification tasks, yielding favorable outcomes. In our study, we first adopt a similar CNN architecture, comprising a convolutional layer, a ReLU layer, a pooling layer, and a fully connected layer. Specifically, the convolutional layer uses 16161616 filters, each with dimensions of 12×12×11212112\times 12\times 112 × 12 × 1. The ReLU layer reduces redundant computations by kee** positive inputs and zeroing out negative ones. The pooling layer has a size of 2×2222\times 22 × 2. Subsequently, the fully connected layer integrates features across the network. The softmax layer outputs class probabilities, enabling predictions across different categories. During training, we set a learning rate of 0.010.010.010.01 and use the stochastic gradient descent (SGD) optimizer [18].

Furthermore, we utilize TL with the VGGNet architecture[19] for classification. The VGG-16 model includes 13131313 convolutional layers with 3×3333\times 33 × 3 kernels, 5555 max-pooling layers, and 3333 fully connected layers. In this study, we apply TL by adjusting the sixth fully connected layer’s output size of VGG-16 to match our six classification categories. We use both pre-trained and untrained network models for interference classification. During training, we employed the Adam optimizer [20] with a learning rate of 1×1051superscript1051\times 10^{-5}1 × 10 start_POSTSUPERSCRIPT - 5 end_POSTSUPERSCRIPT, while using the cross-entropy function to calculate the loss.

IV-D Results

Figure 3 shows a comparison of interference classification accuracy using three different network models. Among these, the CNN model [2] achieves an accuracy of 88.86%percent88.8688.86\%88.86 %. In contrast, the untrained VGGnet model improves accuracy by about 8%percent88\%8 % to 96.69%percent96.6996.69\%96.69 %. Additionally, when comparing the convergence of pre-trained and untrained VGGnet models, the pre-trained model converge faster, achieving 95.92%percent95.9295.92\%95.92 % accuracy. This demonstrates the quicker convergence of pre-trained models on target tasks in transfer learning. Moreover, the untrained model’s slightly higher convergence accuracy than the pre-trained model suggests that untrained models can adapt more flexibly to specific tasks.

Refer to caption
Figure 3: Accuracy in 340340340340 rounds under different models

Figure 4 shows the classification accuracy of the FedAvg algorithm for two different data distributions and the accuracy in the Solo scenario. In the Solo scenario, training occurs on data from a single region, with the dataset containing just two interference types and no model parameter exchange with other regions. The accuracy of the centralized training model network serves as the baseline (with an accuracy of 96.69%percent96.6996.69\%96.69 %). Both the FedAvg and Solo scenario use an untrained VGGnet model. Under IID conditions, the FedAvg algorithm’s classification accuracy closely matches centralized training at about 96.69%percent96.6996.69\%96.69 %. However, with non-IID datasets, accuracy drops slightly to 94.38%percent94.3894.38\%94.38 %, indicating the increased challenge of learning from diverse data distributions. Additionally, in the Solo scenario, classification accuracy falls to 32.89%percent32.8932.89\%32.89 %, only identifying the two types of interference in its dataset. This shows that the FedAvg algorithm can recognize different interference types without direct data exchange, even as the UAV jammer’s interference strategies change, unlike in the Solo scenario, where the classifier struggles with unencountered interference types.

Refer to caption
Figure 4: FedAvg accuracy under different data settings and Solo accuracy in 220220220220 rounds

Suppose that a movable UAV interference source in a given zone m𝑚mitalic_m emits random types of interference at each moment. Fig. 5 illustrates the C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT values across various interference models and time instances. Assume C/N0m,j𝐶subscriptsubscript𝑁0𝑚𝑗C/{N_{0}}_{m,j}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT is 40dBHz40dBHz40\text{dB}\cdot\text{Hz}40 dB ⋅ Hz and C/N0m,j~~𝐶subscriptsubscript𝑁0𝑚𝑗\tilde{C/{N_{0}}_{m,j}}over~ start_ARG italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m , italic_j end_POSTSUBSCRIPT end_ARG is 48dBHz48dBHz48\text{dB}\cdot\text{Hz}48 dB ⋅ Hz. Considering the non-uniform distribution of interference across regions, we assess the FedAvg model’s performance with non-IID datasets. With interferences, the C/N0m𝐶subscriptsubscript𝑁0𝑚C/{N_{0}}_{m}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT value with the FedAvg algorithm is 47.52dBHz47.52dBHz47.52\text{dB}\cdot\text{Hz}47.52 dB ⋅ Hz, comparable to centralized learning models at 47.68dBHz47.68dBHz47.68\text{dB}\cdot\text{Hz}47.68 dB ⋅ Hz. However, in the Solo scenario, facing three untrained interference types, the C/N0m𝐶subscriptsubscript𝑁0𝑚C/{N_{0}}_{m}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT drops to 42.56dBHz42.56dBHz42.56\text{dB}\cdot\text{Hz}42.56 dB ⋅ Hz, as expected. This shows that the FedAvg algorithm improves the regional C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT by about 5dBHz5dBHz5\text{dB}\cdot\text{Hz}5 dB ⋅ Hz over the Solo scenario in interference conditions.

Refer to caption
Figure 5: Sum of C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT for each zone under different classification models.

In conclusion, our findings indicate that using the VGGnet model via TL improves interference classification accuracy by approximately 8%percent88\%8 % over the convolutional network described in [2]. Furthermore, when client datasets are IID, the FedAvg algorithm’s classification accuracy closely matches that of centralized learning, with only a slight 3%percent33\%3 % difference under the Dirichlet distribution. Additionally, using the FedAvg algorithm in interference-affected regions can increase the regional C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT by about 5dBHz5dBHz5\text{dB}\cdot\text{Hz}5 dB ⋅ Hz over the Solo scenario. This approach not only protects regional users’ privacy but also lessens the negative effects of interference on communication performance.

V Conclusion

This paper presented a study on identifying and classifying GNSS interference signals from the movable UAV jammer in five wireless communication regions. The simulation offered insights into classifying six potential interference spectrogram in GNSS systems under various models. Using TL with VGGnet, we achieved an approximate 8%percent88\%8 % improvement in classification accuracy over the CNN model[2]. Notably, pretrained networks are demonstrated to converge faster than untrained models. Furthermore, the FL framework shows performance comparable to centralized learning, especially when datasets follow an IID pattern. Additionally, the FedAvg approach, compared to the Solo scenario in individual regions, not only protects regional privacy but also effectively tackles interference recognition amidst evolving interference strategies, as this approach significantly enhanced the regional communication performance metric, C/N0𝐶subscript𝑁0C/N_{0}italic_C / italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT, by about 5dBHz5dBHz5\text{dB}\cdot\text{Hz}5 dB ⋅ Hz.

References

  • [1] K. J. Silva Lorraine and M. Ramarakula, “A comprehensive survey on GNSS interferences and the application of neural networks for anti-jamming,” IETE Journal of Research, vol. 69, no. 7, pp. 4286–4305, 2023.
  • [2] R. Morales Ferre, A. de la Fuente, and E. S. Lohan, “Jammer classification in GNSS bands via machine learning algorithms,” Sensors, vol. 19, no. 22, p. 4841, 2019.
  • [3] G. X. Gao, M. Sgammini, M. Lu, and N. Kubo, “Protecting GNSS receivers from jamming and interference,” Proceedings of the IEEE, vol. 104, no. 6, pp. 1327–1338, 2016.
  • [4] P. Wu, H. Calatrava, T. Imbiriba, and P. Closas, “Jammer classification with Federated Learning,” in 2023 IEEE/ION Position, Location and Navigation Symposium (PLANS).   IEEE, 2023, pp. 228–234.
  • [5] A. Grant, P. Williams, N. Ward, and S. Basker, “GPS jamming and the impact on maritime navigation,” The Journal of Navigation, vol. 62, no. 2, pp. 173–187, 2009.
  • [6] H. Elghamrawy, M. Karaim, M. Korenberg, and A. Noureldin, “High-resolution spectral estimation for continuous wave jamming mitigation of GNSS signals in autonomous vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 7881–7895, 2021.
  • [7] E. Axell, F. M. Eklöf, P. Johansson, M. Alexandersson, and D. M. Akos, “Jamming detection in GNSS receivers: Performance evaluation of field trials,” NAVIGATION: Journal of the Institute of Navigation, vol. 62, no. 1, pp. 73–82, 2015.
  • [8] W.-L. Mao, “Robust set-membership filtering techniques on GPS sensor jamming mitigation,” IEEE Sensors Journal, vol. 17, no. 6, pp. 1810–1818, 2016.
  • [9] L. Strizic, D. M. Akos, and S. Lo, “Crowdsourcing GNSS jammer detection and localization,” in Proceedings of the 2018 International Technical Meeting of The Institute of Navigation, 2018, pp. 626–641.
  • [10] M. Mosavi and F. Shafiee, “Narrowband interference suppression for GPS navigation using neural networks,” GPS solutions, vol. 20, pp. 341–351, 2016.
  • [11] Y. Arjoune, F. Salahdine, M. S. Islam, E. Ghribi, and N. Kaabouch, “A novel jamming attacks detection approach based on machine learning for wireless communication,” in 2020 International Conference on Information Networking (ICOIN).   IEEE, 2020, pp. 459–464.
  • [12] J. Wei, Y. Wei, L. Yu, and R. Xu, “Radar anti-jamming decision-making method based on DDPG-MADDPG algorithm,” Remote Sensing, vol. 15, no. 16, p. 4046, 2023.
  • [13] C. J. Swinney and J. C. Woods, “GNSS jamming classification via CNN, transfer learning & the novel concatenation of signal representations,” in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).   IEEE, 2021, pp. 1–9.
  • [14] M. Nicola, G. Falco, R. Morales Ferre, E.-S. Lohan, A. De La Fuente, and E. Falletti, “Collaborative solutions for interference management in GNSS-based aircraft navigation,” Sensors, vol. 20, no. 15, p. 4085, 2020.
  • [15] R. Poisel, Modern communications jamming principles and techniques.   Artech house, 2011.
  • [16] M. Ding, W. Chen, and W. Ding, “Performance analysis of a normal GNSS receiver model under different types of jamming signals,” Measurement, vol. 214, p. 112786, 2023.
  • [17] B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics.   PMLR, 2017, pp. 1273–1282.
  • [18] N. Qian, “On the momentum term in gradient descent learning algorithms,” Neural networks, vol. 12, no. 1, pp. 145–151, 1999.
  • [19] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
  • [20] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014.