{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:08:34Z","timestamp":1777486114798,"version":"3.51.4"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icra.2018.8460635","type":"proceedings-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T22:28:03Z","timestamp":1537568883000},"page":"7306-7313","source":"Crossref","is-referenced-by-count":30,"title":["Verifying Controllers Against Adversarial Examples with Bayesian Optimization"],"prefix":"10.1109","author":[{"given":"Shromona","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Felix","family":"Berkenkamp","sequence":"additional","affiliation":[]},{"given":"Gireeja","family":"Ranade","sequence":"additional","affiliation":[]},{"given":"Shaz","family":"Qadeer","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Kapoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"brockman","year":"2016","journal-title":"OpenAI Gym"},{"key":"ref32","first-page":"1778","article-title":"Bayesian optimization in high dimensions via random embeddings","author":"wang","year":"2013","journal-title":"IJCAI"},{"key":"ref31","author":"finkel","year":"2003","journal-title":"Direct Optimization Algorithm User Guide"},{"key":"ref30","author":"ghosh","year":"2018","journal-title":"Verifying controllers against adversarial examples with Bayesian optimization"},{"key":"ref37","article-title":"Continuous control with deep reinforcement learning","volume":"abs 1509 2971","author":"lillicrap","year":"2015","journal-title":"CoRR"},{"key":"ref36","article-title":"Proximal policy optimization algorithms","volume":"abs 1707 6347","author":"schulman","year":"2017","journal-title":"CoRR"},{"key":"ref35","year":"0","journal-title":"Open AI Gym Environments"},{"key":"ref34","year":"0","journal-title":"Open AI Baselines"},{"key":"ref10","author":"papernot","year":"2016","journal-title":"Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","article-title":"Adversarial attacks on neural network policies","volume":"abs 1702 2284","author":"huang","year":"2017","journal-title":"CoRR"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-319-57288-8_26","article-title":"Compositional falsification of cyber-physical systems with machine learning components","author":"dreossi","year":"2017","journal-title":"Proceedings of the Nasa Formal Methods Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref15","first-page":"167","article-title":"Breach, a toolbox for verification and parameter synthesis of hybrid systems","author":"donze","year":"2010","journal-title":"CAV"},{"key":"ref16","article-title":"C2E2: A verification tool for stateflow models","author":"duggirala","year":"2015","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref17","first-page":"254","article-title":"S-taliro: A tool for temporal logic falsification for hybrid systems.","volume":"6605","author":"annpureddy","year":"2011","journal-title":"TACAS"},{"key":"ref18","article-title":"Stochastic local search for falsification of hybrid systems","author":"deshmukh","year":"2015","journal-title":"ATVA"},{"key":"ref19","author":"hansen","year":"2016","journal-title":"The CMA evolution strategy A tutorial"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-77242-4","author":"steinwart","year":"2008","journal-title":"Support Vector Machines"},{"key":"ref4","first-page":"1","article-title":"Model-based bayesian reinforcement learning in partially observable domains","author":"poupart","year":"2008","journal-title":"Proc Int l Symp Artificial Intelligence and Math"},{"key":"ref27","article-title":"Monitoring temporal properties of continuous signals","author":"maler","year":"2004","journal-title":"FORMATS\/FTRTFT"},{"key":"ref3","article-title":"Uncertainty-aware reinforcement learning for collision avoidance","volume":"abs 1702 1182","author":"kahn","year":"2017","journal-title":"CoRR"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2010.5509503"},{"key":"ref29","first-page":"844","article-title":"On kernelized multi-armed bandits","author":"chowdhury","year":"2017","journal-title":"ICML"},{"key":"ref5","author":"clarke","year":"1999","journal-title":"Model checking"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-46430-1_27","article-title":"Level set methods for computation in hybrid systems","author":"mitchell","year":"2000","journal-title":"International Workshop on Hybrid Systems Computation and Control"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039363"},{"key":"ref2","author":"stengel","year":"1986","journal-title":"Stochastic Optimal Control Theory and Application"},{"key":"ref9","article-title":"Safe model-based reinforcement learning with stability guarantees","author":"berkenkamp","year":"2017","journal-title":"Proc of Neural Information Processing Systems (NIPS)"},{"key":"ref1","author":"sastry","year":"1989","journal-title":"Adaptive Control Stability Convergence and Robustness"},{"key":"ref20","volume":"37","author":"mockus","year":"2012","journal-title":"Bayesian Approach to Global Optimization Theory and Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182033"},{"key":"ref21","author":"rasmussen","year":"0","journal-title":"Gaussian Processes for Machine Learning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3126521"},{"key":"ref23","author":"berkenkamp","year":"2016","journal-title":"Bayesian optimization with safety constraints Safe and automatic parameter tuning in robotics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"}],"event":{"name":"2018 IEEE International Conference on Robotics and Automation (ICRA)","location":"Brisbane, QLD","start":{"date-parts":[[2018,5,21]]},"end":{"date-parts":[[2018,5,25]]}},"container-title":["2018 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8449910\/8460178\/08460635.pdf?arnumber=8460635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T18:15:03Z","timestamp":1751998503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8460635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icra.2018.8460635","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}