Learning Hidden Markov Models for Linear Gaussian Systems with Applications to Event-based State Estimation

This work attempts to approximate a linear Gaussian system with a finite-state hidden Markov model (HMM), which is found useful in solving sophisticated event-based state estimation problems. An indirect modeling approach is developed, wherein a state space model (SSM) is firstly identified for a Gaussian system and the SSM is then used as an emulator for learning an HMM. In the proposed method, the training data for the HMM are obtained from the data generated by the SSM through building a quantization mapping. Parameter learning algorithms are designed to learn the parameters of the HMM, through exploiting the periodical structural characteristics of the HMM. The convergence and asymptotic properties of the proposed algorithms are analyzed. The HMM learned using the proposed algorithms is applied to event-triggered state estimation, and numerical results on model learning and state estimation demonstrate the validity of the proposed algorithms.

[1]  Hui Jiang,et al.  Fast speaker adaptation of hybrid NN/HMM model for speech recognition based on discriminative learning of speaker code , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  K. Åström,et al.  Comparison of Riemann and Lebesgue sampling for first order stochastic systems , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..

[3]  Branislav Bosanský,et al.  Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.

[4]  Ling Shi,et al.  An event-triggered approach to state estimation with multiple point- and set-valued measurements , 2014, Autom..

[5]  Robin J. Evans,et al.  A Markov Decision Process-Based Opportunistic Spectral Access , 2016, IEEE Wireless Communications Letters.

[6]  Sandra Hirche,et al.  An Iterative Algorithm for Optimal Event-Triggered Estimation , 2012, ADHS.

[7]  Yu Hu,et al.  Trust Region-Based Optimization for Maximum Mutual Information Estimation of HMMs in Speech Recognition , 2011, IEEE Transactions on Audio, Speech, and Language Processing.

[8]  Ali A. Chowdhury,et al.  Fundamentals of Probability and Statistics , 2009 .

[9]  Fangfei Li,et al.  Event-Triggered Risk-Sensitive State Estimation for Hidden Markov Models , 2019, IEEE Transactions on Automatic Control.

[10]  Haralambos Mouratidis,et al.  From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks , 2018, Evol. Syst..

[11]  Michael I. Jordan,et al.  An HDP-HMM for systems with state persistence , 2008, ICML '08.

[12]  Hugo Van hamme,et al.  Weakly Supervised Learning of Hidden Markov Models for Spoken Language Acquisition , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[13]  Lior Rokach,et al.  Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis , 2016, 2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE).

[14]  Mircea Lazar,et al.  Event Based State Estimation With Time Synchronous Updates , 2012, IEEE Transactions on Automatic Control.

[15]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[16]  Ling Shi,et al.  On the nonexistence of event-based triggers that preserve Gaussian state in presence of package-drop , 2017, 2017 American Control Conference (ACC).

[17]  Kenneth Rose,et al.  Iterative decoding of two-dimensional hidden Markov models , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[18]  Pierre Ambrosini,et al.  A Hidden Markov Model for 3D Catheter Tip Tracking With 2D X-ray Catheterization Sequence and 3D Rotational Angiography , 2017, IEEE Transactions on Medical Imaging.

[19]  Yves Normandin,et al.  Hidden Markov models, maximum mutual information estimation, and the speech recognition problem , 1992 .

[20]  John B. Moore,et al.  On-line identification of hidden Markov models via recursive prediction error techniques , 1994, IEEE Trans. Signal Process..

[21]  M. Plummer,et al.  CODA: convergence diagnosis and output analysis for MCMC , 2006 .

[22]  Patrick Dewilde,et al.  Subspace model identification Part 1. The output-error state-space model identification class of algorithms , 1992 .

[23]  Jia Liu,et al.  HMMs based masquerade detection for network security on with parallel computing , 2020, Comput. Commun..

[24]  Gang George Yin,et al.  Recursive algorithms for estimation of hidden Markov models and autoregressive models with Markov regime , 2002, IEEE Trans. Inf. Theory.

[25]  Abbas Ghaemi Bafghi,et al.  Real time alert correlation and prediction using Bayesian networks , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).

[26]  Su Ruan,et al.  Segmenting Multi-Source Images Using Hidden Markov Fields With Copula-Based Multivariate Statistical Distributions , 2017, IEEE Transactions on Image Processing.

[27]  Ya-Jun Pan,et al.  Hidden-Markov-Model-Based Asynchronous Filter Design of Nonlinear Markov Jump Systems in Continuous-Time Domain , 2019, IEEE Transactions on Cybernetics.

[28]  Tzuu-Hseng S. Li,et al.  Recognition System for Home-Service-Related Sign Language Using Entropy-Based $K$ -Means Algorithm and ABC-Based HMM , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[29]  Xuedong Huang,et al.  Semi-continuous hidden Markov models for speech signals , 1990 .

[30]  Lalit R. Bahl,et al.  A new algorithm for the estimation of hidden Markov model parameters , 1988, ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing.

[31]  Bruno Sinopoli,et al.  Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.

[32]  Timothy Chadza,et al.  Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks , 2020, Future Gener. Comput. Syst..

[33]  Joan-Andreu Sánchez,et al.  Recognition of on-line handwritten mathematical expressions using 2D stochastic context-free grammars and hidden Markov models , 2014, Pattern Recognit. Lett..

[34]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[35]  Tongwen Chen,et al.  Energy-based event-triggered state estimation for hidden Markov models , 2017, Autom..

[36]  M. Lemmon,et al.  Event-triggered state estimation in vector linear processes , 2010, Proceedings of the 2010 American Control Conference.

[37]  M. Verhaegen Subspace model identification Part 2. Analysis of the elementary output-error state-space model identification algorithm , 1992 .

[38]  Paulo Tabuada,et al.  An introduction to event-triggered and self-triggered control , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[39]  L. Baum,et al.  Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .

[40]  Dan Ye,et al.  Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.

[41]  John S. Baras,et al.  Adaptive Sampling for Linear State Estimation , 2009, SIAM J. Control. Optim..

[42]  Weiyi Liu,et al.  Markov Chain Approximation Algorithm for Event-Based State Estimation , 2015, IEEE Transactions on Control Systems Technology.

[43]  Michael I. Jordan,et al.  Factorial Hidden Markov Models , 1995, Machine Learning.

[44]  Julián A. Pucheta,et al.  A new image segmentation framework based on two-dimensional hidden Markov models , 2015, Integr. Comput. Aided Eng..

[45]  David Bruce Wilson,et al.  How to Get a Perfectly Random Sample from a Generic Markov Chain and Generate a Random Spanning Tree of a Directed Graph , 1998, J. Algorithms.

[46]  Munther A. Dahleh,et al.  Minimal Realization Problems for Hidden Markov Models , 2014, IEEE Transactions on Signal Processing.

[47]  Catherine Lu Recognition of Online Handwritten Mathematical Expressions , 2013 .

[48]  Kenneth Rose,et al.  Deformable Registration of Biomedical Images Using 2D Hidden Markov Models , 2016, IEEE Transactions on Image Processing.

[49]  Meir Kalech,et al.  Cyber-attack detection in SCADA systems using temporal pattern recognition techniques , 2019, Comput. Secur..

[50]  Ling Shi,et al.  Event-Based State Estimation of Hidden Markov Models Through a Gilbert–Elliott Channel , 2017, IEEE Transactions on Automatic Control.

[51]  Ling Shi,et al.  Stochastic event-triggered sensor scheduling for remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[52]  Heiga Zen,et al.  Speech Synthesis Based on Hidden Markov Models , 2013, Proceedings of the IEEE.

[53]  Cheng-Der Fuh,et al.  Asymptotic Bayesian Theory of Quickest Change Detection for Hidden Markov Models , 2016, IEEE Transactions on Information Theory.

[54]  Robert J. Elliott,et al.  Event-based state estimation of discrete-state hidden Markov models , 2016, Autom..

[55]  Ling Shi,et al.  Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.

[56]  A. Hussain,et al.  Speaker Verification using Vector Quantization and Hidden Markov Model , 2007, 2007 5th Student Conference on Research and Development.

[57]  Sherif Abdelwahed,et al.  A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[58]  T. Başar,et al.  Optimal Estimation with Limited Measurements , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[59]  Ling Shi,et al.  A Stochastic Event-Triggering Approach , 2016 .

[60]  Yan Liu,et al.  Refined learning of hidden Markov models with a modified Baum-Welch algorithm and informative components , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[61]  Joris Sijs,et al.  Relevant Sampling Applied to Event-Based State-Estimation , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[62]  Junfeng Wu,et al.  On the Nonexistence of Event Triggers That Preserve Gaussian State in Presence of Packet-Drop , 2020, IEEE Transactions on Automatic Control.

[63]  Dan Ye,et al.  False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach , 2020, Autom..