学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 董春曦的留言板
学术论文

-英文/SCI论文

[1]Y. Dong, C. Dong, W. Liu, M. Liu and Z. Tang, "Scaling Transform Based Information Geometry Method for DOA Estimation," in IEEE Transactions on Aerospace and Electronic Systems, vol. 55, no. 6, pp. 3640-3650, Dec. 2019.
doi: 10.1109/TAES.2019.2910363
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8686110&isnumber=8924784

[2]X. Chang, C. Dong, Z. Tang and Y. Dong, "Mosaic scene deception jamming based on 2D separation modulation against SAR," in IET Radar, Sonar & Navigation, vol. 13, no. 2, pp. 310-315, 2 2019.
doi: 10.1049/iet-rsn.2018.5166
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8646809&isnumber=8646723

[3]X. Chang and C. Dong, "A Barrage Noise Jamming Method Based on Double Jammers Against Three Channel SAR GMTI," in IEEE Access, vol. 7, pp. 18755-18763, 2019.
doi: 10.1109/ACCESS.2019.2897043
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8632917&isnumber=8600701

[4]Y. Dong, C. Dong, W. Liu, M. Liu and Z. Tang, "A Structure-Aware DOA Estimation Method for Sources With Short Known Waveforms," in IEEE Access, vol. 6, pp. 71271-71278, 2018.
doi: 10.1109/ACCESS.2018.2881684
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8537892&isnumber=8274985

[5]C. Dong and X. Chang, "A Novel Scattered Wave Deception Jamming Against Three Channel SAR GMTI," in IEEE Access, vol. 6, pp. 53882-53889, 2018.
doi: 10.1109/ACCESS.2018.2871518
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8468314&isnumber=8274985

[6]Y. Dong, C. Dong, W. Liu, M. Liu and Z. Tang, "Robust DOA Estimation for Sources With Known Waveforms Against Doppler Shifts via Oblique Projection," in IEEE Sensors Journal, vol. 18, no. 16, pp. 6735-6742, 15 Aug.15, 2018.
doi: 10.1109/JSEN.2018.2851099
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8398434&isnumber=8418874

[7]J. Xu, B. Bai, C. Dong and G. Zhao, "A Novel Passive Jamming Method Against ISAR Based on Resonance Absorption Effect of Metamaterials," in IEEE Access, vol. 6, pp. 18142-18148, 2018.
doi: 10.1109/ACCESS.2018.2817064
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8320003&isnumber=8274985

[8]J. Xu, B. Bai, C. Dong, Y. Dong, Y. Zhu and G. Zhao, "Evaluations of Plasma Stealth Effectiveness Based on the Probability of Radar Detection," in IEEE Transactions on Plasma Science, vol. 45, no. 6, pp. 938-944, June 2017.
doi: 10.1109/TPS.2017.2700012
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7944976&isnumber=7938812

[9]Y. Dong, C. Dong, W. Liu, H. Chen and G. Zhao, "2-D DOA Estimation for L-Shaped Array With Array Aperture and Snapshots Extension Techniques," in IEEE Signal Processing Letters, vol. 24, no. 4, pp. 495-499, April 2017.
doi: 10.1109/LSP.2017.2676124
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7867763&isnumber=7858832

[10]J. Xu, B. Bai, C. Dong, Y. Zhu, Y. Dong and G. Zhao, "A Novel Plasma Jamming Technology Based on the Resonance Absorption Effect," in IEEE Antennas and Wireless Propagation Letters, vol. 16, pp. 1056-1059, 2017.
doi: 10.1109/LAWP.2016.2619671
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7604099&isnumber=7855842

[11]Y. Dong, C. Dong, J. Xu and G. Zhao, "Computationally Efficient 2-D DOA Estimation for L-Shaped Array With Automatic Pairing," in IEEE Antennas and Wireless Propagation Letters, vol. 15, pp. 1669-1672, 2016.
doi: 10.1109/LAWP.2016.2521785
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7393474&isnumber=7398195

[12]Y. Dong, C. Dong, Z. Shen and G. Zhao, "Conjugate Augmented Spatial Temporal Technique for 2-D DOA Estimation With L-Shaped Array," in IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 1622-1625, 2015.
doi: 10.1109/LAWP.2015.2414935
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7064716&isnumber=7024204

[13]S. Liu, C. Dong, J. Xu, G. Zhao and Y. Zhu, "Analysis of Rotating Cross-Eye Jamming," in IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 939-942, Dec. 2015.
doi: 10.1109/LAWP.2014.2387423
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7001191&isnumber=7024204

[14]L. Huang, C. Dong, Z. Shen and G. Zhao, "The Influence of Rebound Jamming on SAR GMTI," in IEEE Geoscience and Remote Sensing Letters, vol. 12, no. 2, pp. 399-403, Feb. 2015.
doi: 10.1109/LGRS.2014.2345091
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6880363&isnumber=6881788

[15]D. Chunxi, Y. Shaoquan, Z. Guoqing and Z. Yu, "Effect of Noise FM Jamming against ISAR Imaging," 2006 CIE International Conference on Radar, Shanghai, 2006, pp. 1-3.
doi: 10.1109/ICR.2006.343518
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4148495&isnumber=4118064

-中文/EI论文

[1]孙霆,董春曦.传感器参数误差下的运动目标TDOA/FDOA无源定位算法[J/OL].航空学报:1-12[2020-02-08].http://kns.cnki.net/kcms/detail/11.1929.V.20191008.1042.010.html.

[2]孙霆,董春曦,董阳阳,刘明明.一种基于观测站数目最小化的TDOA/FDOA无源定位算法[J].航空学报,2019,40(09):265-275.

[3]畅鑫,董春曦,唐峥钊,董阳阳,刘明明.基于双站幅度调制的虚假运动场景对SAR-GMTI的欺骗方法[J].电子与信息学报,2018,40(09):2190-2197.

[4]唐峥钊,董春曦,畅鑫,刘明明,赵国庆.基于拖曳式干扰机的ISAR微动散射波干扰方法[J].航空学报,2018,39(07):185-191.

[5]畅鑫,董春曦,唐峥钊,董阳阳,刘明明.对SAR的脉间周期式移频调制干扰[J].电子与信息学报,2018,40(02):470-478.

[6]王琦琦,董春曦.基于相关算法的PSK信号载频和码速率估计方法研究[J].舰船DZDK,2017,40(06):83-86.

[7]朱颖童,董春曦,董阳阳,许锦,赵国庆.去中心化时差频差直接定位方法[J].航空学报,2017,38(05):238-250.

[8]董春曦,畅鑫.对SAR的二维多普勒移频间歇采样干扰[J].西安电子科技大学学报,2017,44(02):178-184.

[9]刘松杨,董春曦,董阳阳,赵国庆,艾小凡.旋转的正交多点源反向交叉眼干扰分析[J].电子与信息学报,2016,38(06):1424-1430.

[10]闫浩,董春曦,赵国庆.基于压缩感知的分数阶Fourier域LFM信号检测[J].微波学报,2016,32(02):84-89.

[11]刘松杨,董春曦,朱颖童,赵国庆,许锦.基于角度参数特定边界值的旋转交叉眼干扰容限研究[J].电子与信息学报,2016,38(04):906-912.

[12]董春曦,沈志博,刘松杨.基于压缩感知的雷达信号分选方法[J].北京邮电大学学报,2016,39(02):82-87.

[13]付鹏,董春曦,耿晓宇.重频抖动雷达信号跟踪性能分析[J].航天DZDK,2015,31(06):51-53.

[14]朱颖童,董春曦,刘松杨,董阳阳,赵国庆.存在观测站位置误差的转发式时差无源定位[J].航空学报,2016,37(02):706-716.

[15]沈志博,董春曦,黄龙,赵国庆.信源数未知情况下基于嵌套阵列的DOA估计算法[J].航天DZDK,2015,31(03):40-43+55.

[16]沈志博,董春曦,黄龙,赵国庆.一种基于稀疏分解的窄带信号频率估计算法[J].电子与信息学报,2015,37(04):907-912.

[17]黄龙,董春曦,沈志博,赵国庆.多天线干扰机对抗InSAR双通道干扰对消的研究[J].电子与信息学报,2015,37(04):913-918.

[18]闫浩,董春曦,赵国庆.基于压缩感知的线性调频信号参数估计[J].电波科学学报,2015,30(03):449-456.

[19]沈志博,董春曦,黄龙,赵国庆.基于压缩感知的宽频段二维DOA估计算法[J].电子与信息学报,2014,36(12):2935-2941.

[20]黄龙,董春曦,赵国庆.利用多干扰机对抗SAR双通道干扰对消技术的研究[J].电子与信息学报,2014,36(04):903-907.

[21]黄龙,董春曦,赵国庆,沈志博.多干扰机InSAR欺骗干扰方法[J].航空学报,2014,35(06):1714-1723.

[22]沈志博,赵国庆,董春曦,黄龙.基于压缩感知的频率和DOA联合估计算法[J].航空学报,2014,35(05):1357-1364.

[23]杜蒙蒙,任百玲,董春曦.基于Blackfin532和Netchip2272的USB接口设计[J].电子科技,2010,23(08):77-80.

[24]杨少华,赵国庆,董春曦.远程预警雷达中的航迹处理技术[J].电子科技,2009,22(10):66-69.

[25]刘(王莹),董春曦.基于AT89C5131的接口设计[J].现代电子技术,2009,32(12):28-30.

[26]顾明超,董春曦,饶鲜,赵国庆.雷达和雷达干扰实验仪的设计[J].仪器仪表用户,2008(02):33-34.

[27]杨小帅,董春曦,魏青.基于无源定位系统的航迹起始算法[J].航天DZDK,2008(01):61-64.

[28]张煜,杨绍全,董春曦,郑文秀.对线性调频雷达的正弦加权调频干扰技术[J].系统工程与电子技术,2007(04):544-547.

[29]饶鲜,杨绍全,魏青,董春曦.核的最近邻算法及其仿真[J].系统工程与电子技术,2007(03):470-471.

[30]张煜,董春曦,崔艳鹏,杨绍全.对解线调处理的ISAR的相干干扰技术[J].电子学报,2006(09):1590-1594.

[31]饶鲜,杨绍全,魏青,董春曦.基于熵的入侵检测特征参数选择[J].系统工程与电子技术,2006(04):599-601+610.

[32]董春曦,杨绍全,饶鲜,汤建龙.支持向量机推广能力估计方法比较[J].电路与系统学报,2004(04):86-91+96.

[33]董春曦,饶鲜,杨绍全,徐松涛.径向基支持向量机推广能力快速估计算法[J].西安电子科技大学学报,2004(04):557-561.

[34]董春曦,饶鲜,杨绍全,徐松涛.支持向量机参数选择方法研究[J].系统工程与电子技术,2004(08):1117-1120.

[35]魏青,杨绍全,陈俊丽,董春曦.对合成孔径雷达的干扰效果度量方法研究[J].西安电子科技大学学报,2004(03):383-387.

[36]董春曦. 支持向量机及其在入侵检测中的应用研究[D].西安电子科技大学,2004.

[37]董春曦,饶鲜,杨绍全.基于重复训练提高SVM识别率的算法[J].系统工程与电子技术,2003(10):1292-1294.

[38]饶鲜,董春曦,杨绍全.应用支持向量机实现计算机入侵检测[J].西安电子科技大学学报,2003(03):353-356+373.

[39]饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003(04):798-803.

[40]杨绍全,徐松涛,陈卫东,董春曦.无源单脉冲雷达多干扰源目标分辨方法[J].电子与信息学报,2002(10):1346-1351.

[41]陈卫东,杨绍全,董春曦,徐松涛.多径信道中MPSK信号的调制识别算法[J].通信学报,2002(06):14-21.