{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:54:29Z","timestamp":1757627669225,"version":"3.44.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032020178"},{"type":"electronic","value":"9783032020185"}],"license":[{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02018-5_41","type":"book-chapter","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T10:15:55Z","timestamp":1755771355000},"page":"579-591","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Safe Adversarial Control Through Interaction"],"prefix":"10.1007","author":[{"given":"Benedikt","family":"Rank","sequence":"first","affiliation":[]},{"given":"Mario","family":"Trapp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"issue":"2","key":"41_CR1","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/tssc.1968.300136","volume":"4","author":"PE Hart","year":"1968","unstructured":"Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Trans. Syst. Sci. Cybern. 4(2), 100\u2013107 (1968). https:\/\/doi.org\/10.1109\/tssc.1968.300136","journal-title":"IEEE Trans. Syst. Sci. Cybern."},{"key":"41_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"41_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/mc.2003.1160055","volume":"36","author":"J Kephart","year":"2003","unstructured":"Kephart, J., Chess, D.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003). https:\/\/doi.org\/10.1109\/mc.2003.1160055","journal-title":"Computer"},{"key":"41_CR4","doi-asserted-by":"publisher","unstructured":"Lasota, P.A., Fong, T., Shah, J.A.: A survey of methods for safe human-robot interaction. Found. Trends\u00ae Robot. 5(4), 261\u2013349 (2017). https:\/\/doi.org\/10.1561\/2300000052","DOI":"10.1561\/2300000052"},{"key":"41_CR5","doi-asserted-by":"publisher","unstructured":"Macenski, S., Martin, F., White, R., Clavero, J.G.: The marathon 2: a navigation system. In: 2020 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 2718\u20132725. IEEE (2020). https:\/\/doi.org\/10.1109\/iros45743.2020.9341207","DOI":"10.1109\/iros45743.2020.9341207"},{"key":"41_CR6","unstructured":"Mnih, V., et al.: Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)"},{"key":"41_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102505","volume":"126","author":"Y Peng","year":"2022","unstructured":"Peng, Y., Tan, G., Si, H., Li, J.: DRL-GAT-SA: deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture. J. Syst. Architect. 126, 102505 (2022). https:\/\/doi.org\/10.1016\/j.sysarc.2022.102505","journal-title":"J. Syst. Architect."},{"key":"41_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-55754-6_6","volume-title":"NASA Formal Methods","author":"DT Phan","year":"2020","unstructured":"Phan, D.T., Grosu, R., Jansen, N., Paoletti, N., Smolka, S.A., Stoller, S.D.: Neural simplex architecture. In: Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.) NFM 2020. LNCS, vol. 12229, pp. 97\u2013114. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55754-6_6"},{"key":"41_CR9","unstructured":"Raffin, A., Hill, A., Gleave, A., Kanervisto, A., Ernestus, M., Dormann, N.: Stable-baselines3: reliable reinforcement learning implementations. J. Mach. Learn. Res. 22(268), 1\u20138 (2021). https:\/\/jmlr.org\/papers\/v22\/20-1364.html"},{"key":"41_CR10","doi-asserted-by":"publisher","unstructured":"Seto, D., Krogh, B., Sha, L., Chutinan, A.: The simplex architecture for safe online control system upgrades. In: Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No. 98CH36207), vol.\u00a06, pp. 3504\u20133508 (1998). https:\/\/doi.org\/10.1109\/ACC.1998.703255","DOI":"10.1109\/ACC.1998.703255"},{"key":"41_CR11","unstructured":"Trapp, M., Herd, B., Rank, B.: Safety-counter-player: utilizing potentially unsafe capabilities in safety-critical systems. In: 9th International Workshop on Critical Automotive Applications: Robustness & Safety (CARS 2025) in 20th European Dependable Computing Conference (EDCC 2025), Apr 2025, Lisbonne, Portugal. \u27e8hal-05088356\u27e9 (2025)"},{"key":"41_CR12","first-page":"279","volume":"8","author":"CJ Watkins","year":"1992","unstructured":"Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8, 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"key":"41_CR13","doi-asserted-by":"publisher","unstructured":"Weiss, G., Schleiss, P., Schneider, D., Trapp, M.: Towards integrating undependable self-adaptive systems in safety-critical environments. In: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2018, pp. 26\u201332. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3194133.3194157","DOI":"10.1145\/3194133.3194157"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Weyns, D.: An Introduction to Self-adaptive Systems: A Contemporary Software Engineering Perspective. John Wiley & Sons (2020)","DOI":"10.1002\/9781119574910"},{"key":"41_CR15","doi-asserted-by":"publisher","unstructured":"Williams, G., Drews, P., Goldfain, B., Rehg, J.M., Theodorou, E.A.: Aggressive driving with model predictive path integral control. In: 2016 IEEE International Conference on Robotics and Automation (ICRA), pp. 1433\u20131440 (2016). https:\/\/doi.org\/10.1109\/icra.2016.7487277","DOI":"10.1109\/icra.2016.7487277"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02018-5_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T04:39:11Z","timestamp":1757479151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02018-5_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"ISBN":["9783032020178","9783032020185"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02018-5_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"22 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2025.se\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}