{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:18:15Z","timestamp":1768313895574,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,9]]},"DOI":"10.1109\/cdc57313.2025.11312180","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:19:56Z","timestamp":1768241996000},"page":"4831-4837","source":"Crossref","is-referenced-by-count":0,"title":["Semi-Supervised Safe Visuomotor Policy Synthesis using Barrier Certificates"],"prefix":"10.1109","author":[{"given":"Manan","family":"Tayal","sequence":"first","affiliation":[{"name":"Indian Institute of Science (IISc),Cyber-Physical Systems,Bengaluru"}]},{"given":"Aditya","family":"Singh","sequence":"additional","affiliation":[{"name":"Indian Institute of Science (IISc),Cyber-Physical Systems,Bengaluru"}]},{"given":"Pushpak","family":"Jagtap","sequence":"additional","affiliation":[{"name":"Indian Institute of Science (IISc),Cyber-Physical Systems,Bengaluru"}]},{"given":"Shishir","family":"Kolathaya","sequence":"additional","affiliation":[{"name":"Indian Institute of Science (IISc),Cyber-Physical Systems,Bengaluru"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/2300000053"},{"key":"ref2","article-title":"Agile autonomous driving using end-to-end deep imitation learning","author":"Pan","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263977"},{"key":"ref4","article-title":"A physics-informed machine learning framework for safe and optimal control of autonomous systems","author":"Tayal","year":"2025"},{"key":"ref5","article-title":"Exact imposition of safety boundary conditions in neural reachable tubes","author":"Singh","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48891.2023.10161482"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48891.2023.10160805"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/IROS58592.2024.10802694","article-title":"Neural control barrier functions for safe navigation","author":"Harms","year":"2024"},{"key":"ref9","article-title":"LatentCBF: A control barrier function in latent space for safe control","author":"Kumar","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796030"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040372"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7525253"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/ACC60939.2024.10644548"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.11.167"},{"key":"ref16","article-title":"Safe legged locomotion using collision cone control barrier functions (c3bfs)","author":"Tayal","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3013916"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3365365.3382196"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9303847"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2023.3249564"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA57147.2024.10610647"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC56724.2024.10886052"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2023.10.1219"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2021.3050444"},{"key":"ref25","article-title":"Goal-conditioned imitation learning","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Ding","year":"2019"},{"key":"ref26","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017"},{"key":"ref27","article-title":"Benchmarking safe exploration in deep reinforcement learning","author":"Ray","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/ECC64448.2024.10591026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3135569"},{"key":"ref30","first-page":"2016","article-title":"Pybullet, a python module for physics simulation for games, robotics and machine learning","author":"Coumans"}],"event":{"name":"2025 IEEE 64th Conference on Decision and Control (CDC)","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2025,12,9]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE 64th Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11311984\/11311968\/11312180.pdf?arnumber=11312180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:03:41Z","timestamp":1768295021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11312180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cdc57313.2025.11312180","relation":{},"subject":[],"published":{"date-parts":[[2025,12,9]]}}}