{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:31:34Z","timestamp":1768311094176,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,9]]},"DOI":"10.1109\/cdc57313.2025.11312287","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:19:56Z","timestamp":1768241996000},"page":"2929-2936","source":"Crossref","is-referenced-by-count":0,"title":["Towards safe control parameter tuning in distributed multi-agent systems"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Tokmak","sequence":"first","affiliation":[{"name":"Cyber-Physical Systems Group, Aalto University,Espoo,Finland"}]},{"given":"Thomas B.","family":"Sch\u00f6n","sequence":"additional","affiliation":[{"name":"Uppsala University,Department of Information Technology,Uppsala,Sweden"}]},{"given":"Dominik","family":"Baumann","sequence":"additional","affiliation":[{"name":"Cyber-Physical Systems Group, Aalto University,Espoo,Finland"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Multi-Agent Reinforcement Learning: Foundations and Modern Approaches.","author":"Albrecht","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-042920-020211"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2024.100948"},{"key":"ref4","volume-title":"Reinforcement Learning: An Introduction.","author":"Sutton","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/9781108348973"},{"key":"ref6","article-title":"A tutorial on Bayesian optimization","author":"Frazier","year":"2018","journal-title":"arXiv preprint arXiv:1807.02811"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2016.7487144"},{"key":"ref9","first-page":"997","article-title":"Safe exploration for optimization with Gaussian processes","volume-title":"International Conference on Machine Learning","author":"Sui"},{"key":"ref10","first-page":"5872","article-title":"Fully decentralized multi-agent reinforcement learning with networked agents","volume-title":"International Conference on Machine Learning","author":"Zhang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182033"},{"key":"ref14","first-page":"844","article-title":"On kernelized multi-armed bandits","volume-title":"International Conference on Machine Learning","author":"Chowdhury"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-83191-1_1"},{"key":"ref16","article-title":"Safe exploration in reproducing kernel Hilbert spaces","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Tokmak"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-06019-1"},{"key":"ref18","first-page":"4781","article-title":"Stagewise safe Bayesian optimization with Gaussian processes","volume-title":"International Conference on Machine Learning","author":"Sui"},{"key":"ref19","first-page":"14 998","article-title":"Near-optimal multi-agent learning for safe coverage control","volume":"35","author":"Prajapat","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","article-title":"Safe exploration for interactive machine learning","volume":"32","author":"Turchetta","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref21","article-title":"Mean-field Bayesian optimisation","author":"Steinberg","year":"2025","journal-title":"arXiv preprint arXiv:2502.12315"},{"key":"ref22","first-page":"133","article-title":"Parallelised Bayesian optimisation via Thompson sampling","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Kandasamy"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IROS55552.2023.10341675"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3582078"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2024.3525096"},{"key":"ref26","first-page":"28 488","article-title":"Monte Carlo tree search based variable selection for high dimensional Bayesian optimization","volume":"35","author":"Song","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/596"},{"key":"ref28","article-title":"Joint optimization and variable selection of high-dimensional Gaussian processes","author":"Chen","year":"2012","journal-title":"arXiv preprint arXiv:1206.6396"},{"key":"ref29","first-page":"4771","article-title":"Safe Bayesian optimization for the control of high-dimensional embodied systems","volume-title":"Proceedings of The 8th Conference on Robot Learning","volume":"270","author":"Wei"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2011.0550"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9992649"},{"key":"ref32","first-page":"314","article-title":"Time-varying Gaussian process bandit optimization","author":"Bogunovic","year":"2016","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2024.09.033"},{"key":"ref34","article-title":"Automatic model construction with Gaussian processes","volume-title":"Ph.D. dissertation","author":"Duvenaud","year":"2014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77242-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1090\/s0002-9947-1950-0051437-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16912"},{"key":"ref38","article-title":"Online learning for linearly parametrized control problems","volume-title":"Ph.D. dissertation","author":"Abbasi-Yadkori","year":"2013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2025.3558871"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2511446"},{"key":"ref41","article-title":"Look-ahead control for fuel-efficient and safe heavy-duty vehicle platooning","volume-title":"Ph.D. dissertation","author":"Turri","year":"2018"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-01131-8","volume-title":"Control Theory of Digitally Networked Dynamic Systems.","volume":"1","author":"Lunze","year":"2014"}],"event":{"name":"2025 IEEE 64th Conference on Decision and Control (CDC)","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2025,12,9]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE 64th Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11311984\/11311968\/11312287.pdf?arnumber=11312287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:14:06Z","timestamp":1768292046000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11312287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/cdc57313.2025.11312287","relation":{},"subject":[],"published":{"date-parts":[[2025,12,9]]}}}