暂无分享,去创建一个
[1] Hui Jiang,et al. Fast speaker adaptation of hybrid NN/HMM model for speech recognition based on discriminative learning of speaker code , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] K. Åström,et al. Comparison of Riemann and Lebesgue sampling for first order stochastic systems , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..
[3] Branislav Bosanský,et al. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.
[4] Ling Shi,et al. An event-triggered approach to state estimation with multiple point- and set-valued measurements , 2014, Autom..
[5] Robin J. Evans,et al. A Markov Decision Process-Based Opportunistic Spectral Access , 2016, IEEE Wireless Communications Letters.
[6] Sandra Hirche,et al. An Iterative Algorithm for Optimal Event-Triggered Estimation , 2012, ADHS.
[7] Yu Hu,et al. Trust Region-Based Optimization for Maximum Mutual Information Estimation of HMMs in Speech Recognition , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[8] Ali A. Chowdhury,et al. Fundamentals of Probability and Statistics , 2009 .
[9] Fangfei Li,et al. Event-Triggered Risk-Sensitive State Estimation for Hidden Markov Models , 2019, IEEE Transactions on Automatic Control.
[10] Haralambos Mouratidis,et al. From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks , 2018, Evol. Syst..
[11] Michael I. Jordan,et al. An HDP-HMM for systems with state persistence , 2008, ICML '08.
[12] Hugo Van hamme,et al. Weakly Supervised Learning of Hidden Markov Models for Spoken Language Acquisition , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[13] Lior Rokach,et al. Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis , 2016, 2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE).
[14] Mircea Lazar,et al. Event Based State Estimation With Time Synchronous Updates , 2012, IEEE Transactions on Automatic Control.
[15] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[16] Ling Shi,et al. On the nonexistence of event-based triggers that preserve Gaussian state in presence of package-drop , 2017, 2017 American Control Conference (ACC).
[17] Kenneth Rose,et al. Iterative decoding of two-dimensional hidden Markov models , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[18] Pierre Ambrosini,et al. A Hidden Markov Model for 3D Catheter Tip Tracking With 2D X-ray Catheterization Sequence and 3D Rotational Angiography , 2017, IEEE Transactions on Medical Imaging.
[19] Yves Normandin,et al. Hidden Markov models, maximum mutual information estimation, and the speech recognition problem , 1992 .
[20] John B. Moore,et al. On-line identification of hidden Markov models via recursive prediction error techniques , 1994, IEEE Trans. Signal Process..
[21] M. Plummer,et al. CODA: convergence diagnosis and output analysis for MCMC , 2006 .
[22] Patrick Dewilde,et al. Subspace model identification Part 1. The output-error state-space model identification class of algorithms , 1992 .
[23] Jia Liu,et al. HMMs based masquerade detection for network security on with parallel computing , 2020, Comput. Commun..
[24] Gang George Yin,et al. Recursive algorithms for estimation of hidden Markov models and autoregressive models with Markov regime , 2002, IEEE Trans. Inf. Theory.
[25] Abbas Ghaemi Bafghi,et al. Real time alert correlation and prediction using Bayesian networks , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[26] Su Ruan,et al. Segmenting Multi-Source Images Using Hidden Markov Fields With Copula-Based Multivariate Statistical Distributions , 2017, IEEE Transactions on Image Processing.
[27] Ya-Jun Pan,et al. Hidden-Markov-Model-Based Asynchronous Filter Design of Nonlinear Markov Jump Systems in Continuous-Time Domain , 2019, IEEE Transactions on Cybernetics.
[28] Tzuu-Hseng S. Li,et al. Recognition System for Home-Service-Related Sign Language Using Entropy-Based $K$ -Means Algorithm and ABC-Based HMM , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[29] Xuedong Huang,et al. Semi-continuous hidden Markov models for speech signals , 1990 .
[30] Lalit R. Bahl,et al. A new algorithm for the estimation of hidden Markov model parameters , 1988, ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing.
[31] Bruno Sinopoli,et al. Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.
[32] Timothy Chadza,et al. Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks , 2020, Future Gener. Comput. Syst..
[33] Joan-Andreu Sánchez,et al. Recognition of on-line handwritten mathematical expressions using 2D stochastic context-free grammars and hidden Markov models , 2014, Pattern Recognit. Lett..
[34] Robert J. Elliott,et al. On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[35] Tongwen Chen,et al. Energy-based event-triggered state estimation for hidden Markov models , 2017, Autom..
[36] M. Lemmon,et al. Event-triggered state estimation in vector linear processes , 2010, Proceedings of the 2010 American Control Conference.
[37] M. Verhaegen. Subspace model identification Part 2. Analysis of the elementary output-error state-space model identification algorithm , 1992 .
[38] Paulo Tabuada,et al. An introduction to event-triggered and self-triggered control , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[39] L. Baum,et al. Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .
[40] Dan Ye,et al. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.
[41] John S. Baras,et al. Adaptive Sampling for Linear State Estimation , 2009, SIAM J. Control. Optim..
[42] Weiyi Liu,et al. Markov Chain Approximation Algorithm for Event-Based State Estimation , 2015, IEEE Transactions on Control Systems Technology.
[43] Michael I. Jordan,et al. Factorial Hidden Markov Models , 1995, Machine Learning.
[44] Julián A. Pucheta,et al. A new image segmentation framework based on two-dimensional hidden Markov models , 2015, Integr. Comput. Aided Eng..
[45] David Bruce Wilson,et al. How to Get a Perfectly Random Sample from a Generic Markov Chain and Generate a Random Spanning Tree of a Directed Graph , 1998, J. Algorithms.
[46] Munther A. Dahleh,et al. Minimal Realization Problems for Hidden Markov Models , 2014, IEEE Transactions on Signal Processing.
[47] Catherine Lu. Recognition of Online Handwritten Mathematical Expressions , 2013 .
[48] Kenneth Rose,et al. Deformable Registration of Biomedical Images Using 2D Hidden Markov Models , 2016, IEEE Transactions on Image Processing.
[49] Meir Kalech,et al. Cyber-attack detection in SCADA systems using temporal pattern recognition techniques , 2019, Comput. Secur..
[50] Ling Shi,et al. Event-Based State Estimation of Hidden Markov Models Through a Gilbert–Elliott Channel , 2017, IEEE Transactions on Automatic Control.
[51] Ling Shi,et al. Stochastic event-triggered sensor scheduling for remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.
[52] Heiga Zen,et al. Speech Synthesis Based on Hidden Markov Models , 2013, Proceedings of the IEEE.
[53] Cheng-Der Fuh,et al. Asymptotic Bayesian Theory of Quickest Change Detection for Hidden Markov Models , 2016, IEEE Transactions on Information Theory.
[54] Robert J. Elliott,et al. Event-based state estimation of discrete-state hidden Markov models , 2016, Autom..
[55] Ling Shi,et al. Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.
[56] A. Hussain,et al. Speaker Verification using Vector Quantization and Hidden Markov Model , 2007, 2007 5th Student Conference on Research and Development.
[57] Sherif Abdelwahed,et al. A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[58] T. Başar,et al. Optimal Estimation with Limited Measurements , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[59] Ling Shi,et al. A Stochastic Event-Triggering Approach , 2016 .
[60] Yan Liu,et al. Refined learning of hidden Markov models with a modified Baum-Welch algorithm and informative components , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.
[61] Joris Sijs,et al. Relevant Sampling Applied to Event-Based State-Estimation , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.
[62] Junfeng Wu,et al. On the Nonexistence of Event Triggers That Preserve Gaussian State in Presence of Packet-Drop , 2020, IEEE Transactions on Automatic Control.
[63] Dan Ye,et al. False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach , 2020, Autom..