{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T18:03:19Z","timestamp":1772474599404,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11424-021-1247-1","type":"journal-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T04:02:42Z","timestamp":1635220962000},"page":"1801-1820","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Hidden Markov Models: Inverse Filtering, Belief Estimation and Privacy Protection"],"prefix":"10.1007","volume":"34","author":[{"given":"In\u00eas","family":"Louren\u00e7o","sequence":"first","affiliation":[]},{"given":"Robert","family":"Mattila","sequence":"additional","affiliation":[]},{"given":"Cristian R.","family":"Rojas","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Wahlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"key":"1247_CR1","doi-asserted-by":"publisher","unstructured":"Wahlberg B, Hjalmarsson H, and Annergren M, On optimal input design in system identification for control, 49th IEEE Conference on Decision and Control (CDC), pages 2010, 5548\u20135553. DOI: https:\/\/doi.org\/10.1109\/CDC.2010.5717863.","DOI":"10.1109\/CDC.2010.5717863"},{"issue":"2","key":"1247_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCS.2016.2643243","volume":"37","author":"M Annergren","year":"2017","unstructured":"Annergren M, Larsson C A, Hjalmarsson H, et al., Application-oriented input design in system identification: optimal input design for control [applications of control], IEEE Control Systems Magazine, 2017, 37(2): 31\u201356, DOI: https:\/\/doi.org\/10.1109\/MCS.2016.2643243.","journal-title":"IEEE Control Systems Magazine"},{"issue":"1","key":"1247_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1115\/1.3653115","volume":"86","author":"R E Kalman","year":"1964","unstructured":"Kalman R E, When is a linear control system optimal?, Journal of Basic Engineering, 1964, 86(1): 51\u201360.","journal-title":"Journal of Basic Engineering"},{"key":"1247_CR4","doi-asserted-by":"publisher","first-page":"108593","DOI":"10.1016\/j.automatica.2019.108593","volume":"110","author":"H Zhang","year":"2019","unstructured":"Zhang H, Umenberger J, and Hu X, Inverse optimal control for discrete-time finite-horizon Linear quadratic regulators, Automatica, 2019, 110: 108593.","journal-title":"Automatica"},{"key":"1247_CR5","doi-asserted-by":"crossref","unstructured":"Zhang H, Li Y, and Hu X, Discrete-time inverse linear quadratic optimal control over finite time-horizon under noisy output measurements, Control Theory and Technology, 2021.","DOI":"10.1007\/s11768-021-00066-8"},{"key":"1247_CR6","doi-asserted-by":"publisher","first-page":"108977","DOI":"10.1016\/j.automatica.2020.108977","volume":"117","author":"Y Li","year":"2020","unstructured":"Li Y, Yao Y, and Hu X, Continuous-time inverse quadratic optimal control problem, Automatica, 2020, 117: 108977.","journal-title":"Automatica"},{"key":"1247_CR7","first-page":"2","volume":"1","author":"A Y Ng","year":"2000","unstructured":"Ng A Y, Russell S J, and others, Algorithms for inverse reinforcement learning, Proccedings of the International Conference on Machine Learning (ICML), 2000, 1: 2.","journal-title":"Proccedings of the International Conference on Machine Learning (ICML)"},{"key":"1247_CR8","doi-asserted-by":"crossref","unstructured":"Abbeel P and Ng A Y, Apprenticeship learning via inverse reinforcement learning, Proceedings of the Twenty-First International Conference on Machine Learning, 2004, 1.","DOI":"10.1145\/1015330.1015430"},{"key":"1247_CR9","unstructured":"Mattila R, Rojas C, Krishnamurthy V, et al., Inverse filtering for hidden Markov models, Advances in Neural Information Processing Systems (NIPS) 2017, 2017, 30."},{"key":"1247_CR10","doi-asserted-by":"publisher","unstructured":"Mattila R, Rojas C R, Krishnamurthy V, et al., Inverse filtering for hidden Markov models with applications to counter-adversarial autonomous systems, IEEE Transactions on Signal Processing, 2020, DOI: https:\/\/doi.org\/10.1109\/TSP.2020.3019177.","DOI":"10.1109\/TSP.2020.3019177"},{"key":"1247_CR11","doi-asserted-by":"crossref","unstructured":"Mattila R, Rojas C R, Krishnamurthy V, et al., Inverse filtering for linear Gaussian state-space models, 2018 IEEE Conference on Decision and Control (CDC), pages 5556\u20135561. IEEE, 2018.","DOI":"10.1109\/CDC.2018.8619013"},{"issue":"3","key":"1247_CR12","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1109\/LCSYS.2019.2911802","volume":"3","author":"R Mattila","year":"2019","unstructured":"Mattila R, Louren\u00e7o I, Rojas C R, et al., Estimating private beliefs of bayesian agents based on observed decisions, IEEE Control Systems Letters, 2019, 3(3): 523\u2013528.","journal-title":"IEEE Control Systems Letters"},{"key":"1247_CR13","doi-asserted-by":"crossref","unstructured":"Louren\u00e7o I, Mattila R, Rojas C R, et al., How to protect your privacy? A framework for counter-adversarial decision making, Proceedings of the 59th IEEE Conference in Decision and Control (CDC), 2020, 1785\u20131791.","DOI":"10.1109\/CDC42340.2020.9304114"},{"key":"1247_CR14","doi-asserted-by":"crossref","unstructured":"Mattila R, Louren\u00e7o I, Krishnamurthy V, et al., What did your adversary believe? Optimal filtering and smoothing in counter-adversarial autonomous systems, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020, 5495\u20135499.","DOI":"10.1109\/ICASSP40776.2020.9053943"},{"key":"1247_CR15","volume-title":"Markov Chains","author":"J R Norris","year":"1998","unstructured":"Norris J R, Markov Chains, Cambridge University Press, Cambridge, 1998."},{"key":"1247_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316471104","volume-title":"Partially Observed Markov Decision Processes: From Filtering to Controlled Sensing","author":"V Krishnamurthy","year":"2016","unstructured":"Krishnamurthy V, Partially Observed Markov Decision Processes: From Filtering to Controlled Sensing, Cambridge University Press, Cambridge, 2016."},{"key":"1247_CR17","volume-title":"Optimal Filtering","author":"B D O Anderson","year":"1979","unstructured":"Anderson B D O and Moore J B, Optimal Filtering, Prentice-Hall, Upper Saddle River, New Jersey, 1979."},{"key":"1247_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-28982-8","volume-title":"Inference in Hidden Markov Models","author":"O Capp\u00e9","year":"2005","unstructured":"Capp\u00e9 O, Moulines E, and Ryd\u00e9n T, Inference in Hidden Markov Models, Springer, New York, 2005."},{"issue":"5","key":"1247_CR19","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1016\/j.jcss.2011.12.025","volume":"78","author":"D Hsu","year":"2012","unstructured":"Hsu D, Kakade S M, and Zhang T, A spectral algorithm for learning hidden Markov models, Journal of Computer and System Sciences, 2012, 78(5): 1460\u20131480.","journal-title":"Journal of Computer and System Sciences"},{"issue":"10","key":"1247_CR20","first-page":"1","volume":"50","author":"C Buchta","year":"2012","unstructured":"Buchta C, Kober M, Feinerer I, et al., Spherical k-means clustering, Journal of Statistical Software, 2012, 50(10): 1\u201322.","journal-title":"Journal of Statistical Software"},{"issue":"24","key":"1247_CR21","doi-asserted-by":"publisher","first-page":"6511","DOI":"10.1109\/TSP.2019.2956676","volume":"67","author":"V Krishnamurthy","year":"2019","unstructured":"Krishnamurthy V and Rangaswamy M, How to calibrate your adversary\u2019s capabilities? Inverse filtering for counter-autonomous systems, IEEE Transactions on Signal Processing, 2019, 67(24): 6511\u20136525","journal-title":"IEEE Transactions on Signal Processing"},{"key":"1247_CR22","unstructured":"Kuptel A, Counter unmanned autonomous systems (CUAxS): priorities, policy, future capabilities, Multinational Capability Development Campaign (MCDC), Social Science Electronic Publishing, 2017, 15\u201316."},{"key":"1247_CR23","volume-title":"Microeconomic Theory","author":"A Mas-Colell","year":"1995","unstructured":"Mas-Colell A, Whinston M D, and Green J R, Microeconomic Theory, volume 1, Oxford University Press, New York, 1995."},{"key":"1247_CR24","volume-title":"Microeconomic Theory","author":"D G Luenberger","year":"1995","unstructured":"Luenberger D G, Microeconomic Theory, Mcgraw-Hill College, New York, 1995."},{"issue":"1","key":"1247_CR25","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1257\/jep.1.1.121","volume":"1","author":"M J Machina","year":"1987","unstructured":"Machina M J, Choice under uncertainty: Problems solved and unsolved, Journal of Economic Perspectives, 1987, 1(1): 121\u2013154.","journal-title":"Journal of Economic Perspectives"},{"key":"1247_CR26","doi-asserted-by":"crossref","unstructured":"Varian H R, Revealed preference, Samuelsonian Economics and the Twenty-First Century, 2006, 99\u2013115.","DOI":"10.1093\/acprof:oso\/9780199298839.003.0007"},{"key":"1247_CR27","volume-title":"Microeconomic Analysis","author":"H R Varian","year":"1992","unstructured":"Varian H R, Microeconomic Analysis, volume 3, Norton, New York, 1992."},{"issue":"5","key":"1247_CR28","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1287\/opre.49.5.771.10607","volume":"49","author":"R K Ahuja","year":"2001","unstructured":"Ahuja R K and Orlin J B, Inverse optimization, Operations Research, 2001, 49(5): 771\u2013783.","journal-title":"Operations Research"},{"key":"1247_CR29","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.orl.2004.04.007","volume":"33","author":"G Iyengar","year":"2005","unstructured":"Iyengar G and Kang W, Inverse conic programming with applications, Operations Research Letters, 2005, 33: 319\u2013330","journal-title":"Operations Research Letters"},{"issue":"3","key":"1247_CR30","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/j.ejor.2009.01.043","volume":"200","author":"J Zhang","year":"2010","unstructured":"Zhang J and Xu C, Inverse optimization for linearly constrained convex separable programming problems, European Journal of Operational Research, 2010, 200(3): 671\u2013679.","journal-title":"European Journal of Operational Research"},{"key":"1247_CR31","doi-asserted-by":"crossref","unstructured":"Keshavarz A, Wang Y, and Boyd S, Imputing a convex objective function, IEEE International Symposium on Intelligent Control, 2011, 613\u2013619.","DOI":"10.1109\/ISIC.2011.6045410"},{"key":"1247_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S and Vandenberghe L, Convex Optimization, Cambridge University Press, Cambridge, 2004"},{"key":"1247_CR33","doi-asserted-by":"publisher","DOI":"10.1515\/9781400873173","volume-title":"Convex Analysis","author":"R T Rockafellar","year":"1970","unstructured":"Rockafellar R T, Convex Analysis, Princeton University Press, Princeton, 1970."},{"issue":"3","key":"1247_CR34","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TAC.2004.824479","volume":"49","author":"G G Yin","year":"2004","unstructured":"Yin G G and Zhou X Y, Markowitz\u2019s mean-variance portfolio selection with regime switching: From discrete-time models to their continuous-time limits, IEEE Transactions on Automatic Control, 2004, 49(3): 349\u2013360.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"3","key":"1247_CR35","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.econmod.2010.01.007","volume":"27","author":"R J Elliott","year":"2010","unstructured":"Elliott R J, Siu T K, and Badescu A, On mean-variance portfolio selection under a hidden Markovian regime-switching model, Economic Modelling, 2010, 27(3): 678\u2013686.","journal-title":"Economic Modelling"},{"issue":"1","key":"1247_CR36","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/14697688.2017.1342857","volume":"18","author":"P Nystrup","year":"2018","unstructured":"Nystrup P, Madsen H, and Lindstrm E, Dynamic portfolio optimization across hidden market regimes, Quantitative Finance, January 2018, 18(1): 83\u201395","journal-title":"Quantitative Finance"},{"key":"1247_CR37","doi-asserted-by":"crossref","unstructured":"Puterman M L, Markov Decision Processes: Discrete Stochastic Dynamic Programming, John Wiley & Sons, Inc., 1994.","DOI":"10.1002\/9780470316887"},{"key":"1247_CR38","unstructured":"McKinsey J C C, Introduction to the Theory of Games, Courier Corporation, 2003."},{"key":"1247_CR39","unstructured":"Davis P J and Rabinowitz P, Methods of Numerical Integration, Courier Corporation, 2007."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-021-1247-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-021-1247-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-021-1247-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T20:52:38Z","timestamp":1673643158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-021-1247-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1247"],"URL":"https:\/\/doi.org\/10.1007\/s11424-021-1247-1","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"6 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}