{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:38:21Z","timestamp":1777653501901,"version":"3.51.4"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/icra55743.2025.11128298","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:28:56Z","timestamp":1756834136000},"page":"3559-3566","source":"Crossref","is-referenced-by-count":4,"title":["SAFE-GIL: SAFEty Guided Imitation Learning for Robotic Systems"],"prefix":"10.1109","author":[{"given":"Yusuf Umut","family":"Ciftci","sequence":"first","affiliation":[{"name":"University of Southern California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Darren","family":"Chiu","sequence":"additional","affiliation":[{"name":"University of Southern California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zeyuan","family":"Feng","sequence":"additional","affiliation":[{"name":"Stanford University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gaurav S.","family":"Sukhatme","sequence":"additional","affiliation":[{"name":"University of Southern California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Somil","family":"Bansal","sequence":"additional","affiliation":[{"name":"University of Southern California"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","author":"Pomerleau","year":"2015","journal-title":"Alvinn, an autonomous land vehicle in a neural network"},{"key":"ref2","article-title":"A survey of imitation learning: Algorithms, recent developments, and challenges","volume":"abs\/2309.02473","author":"Zare","year":"2023","journal-title":"ArXiv"},{"key":"ref3","article-title":"One-shot visual imitation learning via meta-learning","volume":"abs\/1709.04905","author":"Finn","year":"2017","journal-title":"ArXiv"},{"key":"ref4","first-page":"30:1","article-title":"A review of robot learning for manipulation: Challenges, representations, and algorithms","volume":"22","author":"Kroemer","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"ref5","article-title":"Combining optimal control and learning for visual navigation in novel environments","volume-title":"Conference on Robot Learning (CoRL)","author":"Bansal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15607\/rss.2019.xv.031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8460487"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.15607\/rss.2018.xiv.056"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9981315"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2023.3291885"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-071723-102940"},{"key":"ref12","first-page":"820","article-title":"Enhancing safety in learning from demonstration algorithms via control barrier function shielding","volume-title":"Proceedings of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction","author":"Yang"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9030133"},{"key":"ref15","article-title":"On safety and liveness filtering using hamilton-jacobi reachability analysis","author":"Borquez","year":"2023","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9993193"},{"key":"ref17","article-title":"End-to-end stable imitation learning via autonomous neural dynamic policies","volume-title":"IEEE International Conference on Robotics and Automation","author":"Totsila"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2011.2159412"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2024.3354626"},{"key":"ref20","article-title":"TaSIL: Taylor series imitation learning","author":"Pfrommer","year":"2022","journal-title":"Neural Information Processing Systems"},{"key":"ref21","article-title":"Lyapunov density models: Constraining distribution shift in learning-based control","volume-title":"Int. Conf. on Machine Learning","author":"Kang"},{"key":"ref22","article-title":"DART: Noise injection for robust imitation learning","volume-title":"Conference on Robot Learning","author":"Laskey"},{"key":"ref23","article-title":"CCIL: Continuity-based data augmentation for corrective imitation learning","volume-title":"International Conference on Learning Representations","author":"Ke"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561662"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01717"},{"key":"ref26","article-title":"Mitigating covariate shift in imitation learning via offline data without great coverage","author":"Chang","year":"2021","journal-title":"arXiv preprint"},{"key":"ref27","article-title":"In-tervengen: Interventional data generation for robust and data-efficient robot imitation learning","author":"Hoque","year":"2024","journal-title":"arXiv preprint"},{"key":"ref28","article-title":"Generative adversarial imitation learning","author":"Ho","year":"2016","journal-title":"Neural Information Processing Systems"},{"key":"ref29","article-title":"Learning robust rewards with adversarial inverse reinforcement learning","volume":"abs\/1710.11248","author":"Fu","year":"2017","journal-title":"ArXiv"},{"key":"ref30","article-title":"A reduction of imitation learning and structured prediction to no-regret online learning","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Ross"},{"key":"ref31","article-title":"ThriftyDAgger: Budget-aware novelty and risk gating for interactive imitation learning","volume-title":"Conf. on Robot Learning","author":"Hoque"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8793698"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-021-10006-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3623384"},{"key":"ref35","article-title":"Query-efficient imitation learning for end-to-end autonomous driving","author":"Zhang","year":"2016","journal-title":"arXiv preprint"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/iros40897.2019.8968287"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263977"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.851439"},{"key":"ref39","volume-title":"A toolbox of level set methods","author":"Mitchell","year":"2004"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2020.3042815"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561949"},{"key":"ref42","first-page":"10553","article-title":"Parameter-conditioned reachable sets for updating safety assurances online","volume-title":"2023 IEEE International Conference on Robotics and Automation (ICRA)","author":"Borquez"},{"key":"ref43","author":"Mitchell","year":"2005","journal-title":"A toolbox of level set methods"},{"key":"ref44","article-title":"Dart: Noise injection for robust imitation learning","volume-title":"Conference on Robot Learning","author":"Laskey"},{"key":"ref45","first-page":"627","article-title":"A reduction of imitation learning and structured prediction to no-regret online learning","volume-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, ser. Proceedings of Machine Learning Research","volume":"15","author":"Ross","year":"2011"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/DASC52595.2021.9594360"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294549"},{"key":"ref48","first-page":"97","article-title":"Manifold for machine learning assur-ance","volume-title":"2020 IEEE\/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)","author":"Byun"},{"key":"ref49","first-page":"90","article-title":"Isaacs: Iterative soft adversarial actor-critic for safety","volume-title":"Learning for Dynamics and Control Conference. PMLR","author":"Hsu"},{"key":"ref50","article-title":"Learning shared safety constraints from multi-task demonstrations","volume":"36","author":"Kim","year":"2024","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","location":"Atlanta, GA, USA","start":{"date-parts":[[2025,5,19]]},"end":{"date-parts":[[2025,5,23]]}},"container-title":["2025 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11127273\/11127223\/11128298.pdf?arnumber=11128298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T06:07:17Z","timestamp":1756879637000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11128298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/icra55743.2025.11128298","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}