{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T17:40:21Z","timestamp":1771350021719,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/syscon61195.2024.10553469","type":"proceedings-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:55:15Z","timestamp":1718632515000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Safeguarding Autonomous UAV Navigation: Agent Design using Evolving Behavior Trees"],"prefix":"10.1109","author":[{"given":"Nicholas","family":"Potteiger","sequence":"first","affiliation":[{"name":"Vanderbilt University,Department of Computer Science,Nashville,TN,USA"}]},{"given":"Xenofon","family":"Koutsoukos","sequence":"additional","affiliation":[{"name":"Vanderbilt University,Department of Computer Science,Nashville,TN,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-019-09829-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP49062.2020.9231577"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05097-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/9780429489105"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9812086"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9562088"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8794104"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RO-MAN53752.2022.9900603"},{"key":"ref9","article-title":"Robot behavior-tree-based task generation with large language models","author":"Cao","year":"2023"},{"key":"ref10","article-title":"Llm-brain: Ai-driven fast generation of robot behaviour tree based on large language model","author":"Lykov","year":"2023"},{"key":"ref11","article-title":"Evaluating behavior tree integration in the option critic framework in starcraft 2 mini-games with training restricted by consumer-level hardware","volume-title":"Master\u2019s thesis","author":"Lundberg","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0010316901130124"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICAA58325.2023.00014"},{"key":"ref14","first-page":"28 336","article-title":"Landmark-guided subgoal generation in hierarchical reinforcement learning","volume":"34","author":"Kim","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref15","article-title":"Safe and efficient operation with constrained hierarchical reinforcement learning","volume-title":"European Workshop on Reinforcement Learning","volume":"16","author":"Roza"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67361-5_40"},{"key":"ref17","article-title":"Integrating reinforcement learning into behavior trees by hierarchical composition","author":"Kartasev","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10916"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11797"},{"key":"ref20","article-title":"Safe exploration in continuous action spaces","author":"Dalal","year":"2018"},{"key":"ref21","first-page":"10 630","article-title":"Safe reinforcement learning using advantage-based intervention","volume-title":"International Conference on Machine Learning","author":"Wagener"},{"key":"ref22","first-page":"22","article-title":"Constrained policy optimization","volume-title":"Proceedings of the 34th International Conference on Machine Learning","volume":"70","author":"Achiam"},{"key":"ref23","first-page":"1587","article-title":"Addressing function approximation error in actor-critic methods","volume-title":"International conference on machine learning","author":"Fujimoto"}],"event":{"name":"2024 IEEE International Systems Conference (SysCon)","location":"Montreal, QC, Canada","start":{"date-parts":[[2024,4,15]]},"end":{"date-parts":[[2024,4,18]]}},"container-title":["2024 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10553374\/10553399\/10553469.pdf?arnumber=10553469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:07:32Z","timestamp":1761930452000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10553469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/syscon61195.2024.10553469","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]}}}