How AI Will Help Radar Detect Drones

Small drones are becoming a big problem. Here’s how next-generation neural networking techniques could help.

Long before the U.S. Navy fried an Iranian drone over the Strait of Hormuz, the Pentagon was highlighting the difficulties of fending off small unmanned aircraft. The farther away you can spot them, the better. But as drones get smaller, detecting at distance isn’t easy.

A team of researchers from South Korea and California has figured out how to detect incredibly small disturbances in radar returns that could indicate the presence of small drones, perhaps as far as three kilometers away — enough to give airports, police, and militaries a big hand in stopping them. 

The researchers, from the Daegu Gyeongbuk Institute of Science and Technology and California State University at Fresno, paired an active electronically scanned array, or AESA, radar, with a neural networking tool called a Generative Adversarial Network, or GAN.

AESA radars, which steer its multiple radar beams electronically instead of using physical gimbals, have been around for years. The real innovation lies in training software to detect objects, including objects as small as DJI’s popular Mavic drones, in radar imagery. But there’s very little imagery data to train a machine learning algorithm on how to see something that small. What’s needed is a dataset of extremely small modulations in the echoes of radar signals.

The researchers used a GAN to turn a small bit of available training data into an abundance. A GAN pits two conventional neural networks against one another. For instance, one network might learn how to recognize an object — say, a cat — by looking at many slightly varying examples. The second network in a GANreverses that process. So if a conventional network learns that a certain combination of white pixels against a dark background represents a cat, the GAN starts with the finished image and then learns about the combination of white or dark pixels that the first network to its determination. 

As the second network does its work, it creates slightly varying versions of the data — which themselves can be used for training. That’s how the researchers turned their small mini-Doppler dataset into something robust enough to be useful.

“To train a deep neural network, we need to use a large training data set that contains diverse target features. If the data is lacking, then an overfitting issue occurs. GANs were used to augment the data set by producing fake data that have similar distributions with the original data. We expect that the GANs data increase the target feature diversity,” said Youngwook Kim, a professor of electrical and computer engineering at California State University at Fresno. 

“It is reasonable to say that our system can ‘detect’ a drone more than 3km, However, it will not be a fact if we say we can identify a drone with the help pf a GAN at this point. The fact is that we have constructed a platform/idea to be used for the classification, but diverse tests are needed to be done in the future,” said Kim.

Recent Articles

Hackers Install Secret Backdoor on Thousands of Microsoft SQL Servers

Cybersecurity researchers today uncovered a sustained malicious campaign dating back to May 2018 that targets Windows machines running MS-SQL servers to deploy...

COVID-19: SentinelOne Offers Free Platform Access

As the world battles COVID-19, enterprises are coping with immediate work-from-home needs and the challenges of protection beyond the network perimeter, says...

XSS vulnerability in the HTML Data Processor for CKEditor 4.0

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web...

Unpatchable Flaw Affects All Intel CPUs Released in Last 5 Years

All Intel processors released in the past 5 years contain an unpatchable vulnerability that could allow hackers to compromise almost every hardware-enabled...

Photon: Light and Fast Web Crawler

Photon is a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target. 160 requests per second while extensive...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox