{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:04:28Z","timestamp":1770293068012,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Contr. Syst. Technol."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tcst.2025.3561059","type":"journal-article","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:18:30Z","timestamp":1746191910000},"page":"1953-1959","source":"Crossref","is-referenced-by-count":1,"title":["Optimal Parameter Adaptation for Safety-Critical Control via Safe Barrier Bayesian Optimization"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2447-166X","authenticated-orcid":false,"given":"Shengbo","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7200-4244","authenticated-orcid":false,"given":"Ke","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3368-2100","authenticated-orcid":false,"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[{"name":"Australian AI Institute, Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2564-6433","authenticated-orcid":false,"given":"Zhenyuan","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Mathematics and Econometrics, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5228-9406","authenticated-orcid":false,"given":"Song","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Mathematics, China University of Mining and Technology, Xuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-8597","authenticated-orcid":false,"given":"Guanghui","family":"Wen","sequence":"additional","affiliation":[{"name":"Department of Systems Science, School of Mathematics, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5048-0319","authenticated-orcid":false,"given":"Shiping","family":"Wen","sequence":"additional","affiliation":[{"name":"Australian AI Institute, Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3032711"},{"issue":"1","key":"ref2","first-page":"1437","article-title":"A comprehensive survey on safe reinforcement learning","volume":"16","author":"Garc\u0131a","year":"2015","journal-title":"J. Mach. Learn. Res."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.11.017"},{"key":"ref4","first-page":"8103","article-title":"A Lyapunov-based approach to safe reinforcement learning","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Chow"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263977"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2019.2952317"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3203176"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3466791"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2330163.2330207"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9812398"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/ECC55457.2022.9838179"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3107550"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i14.29488"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-06019-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2805695"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3057055"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2021.3136711"},{"key":"ref19","first-page":"1020","article-title":"Safety-aware preference-based learning for safety-critical control","volume-title":"Proc. Mach. Learn. Res. (PMLR)","volume":"168","author":"Cosner"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2022.3158007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3179330"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524935"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3105491"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"ref25","first-page":"1015","article-title":"Gaussian process optimization in the bandit setting: No regret and experimental design","volume-title":"Proc. 27th Int. Conf. Int. Conf. Mach. Learn.","author":"Srinivas"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2966418"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2022.3217539"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3240290"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3005923"},{"key":"ref30","first-page":"1","article-title":"Direct preference-based evolutionary multi-objective optimization with dueling bandits","volume-title":"Proc. 38th Annu. Conf. Neural Inf. Process. Syst.","author":"Huang"},{"key":"ref31","volume-title":"Nonlinear Systems","author":"Khalil","year":"2002"},{"key":"ref32","first-page":"654","article-title":"Guaranteeing safety of learned perception modules via measurement-robust control barrier functions","volume-title":"Proc. Conf. Robot. Learn. (CoRL)","author":"Dean"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975604"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2760256"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2002.806652"},{"key":"ref36","first-page":"1466","article-title":"Global convergence of policy gradient methods for the linear quadratic regulator","volume-title":"Proc. 35th Int. Conf. Mach. Learn. (ICML)","author":"Fazel"},{"key":"ref37","volume-title":"Convex Optimization","author":"Boyd","year":"2014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/9781118122631"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.875014"},{"key":"ref40","volume-title":"Underactuated Robot.","author":"Tedrake","year":"2022"},{"key":"ref41","first-page":"1","article-title":"CARLA: An open urban driving simulator","volume-title":"Proc. 1st Annu. Conf. Robot Learn.","author":"Dosovitskiy"},{"key":"ref42","article-title":"Gpflow: A Gaussian process library using tensorflow","volume-title":"Proc. J. Mach. Learn. Res.","volume":"18","author":"Matthews"},{"key":"ref43","article-title":"CMA-ES\/pycma on Github","volume-title":"Zenodo","author":"Hansen","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1017\/9781108380690"},{"issue":"83","key":"ref45","first-page":"1","article-title":"CVXPY: A Python-embedded modeling language for convex optimization","volume":"17","author":"Diamond","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/OJCSYS.2024.3385348"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029455"}],"container-title":["IEEE Transactions on Control Systems Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/87\/11134587\/10982112.pdf?arnumber=10982112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T04:28:59Z","timestamp":1755923339000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10982112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":47,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcst.2025.3561059","relation":{},"ISSN":["1063-6536","1558-0865","2374-0159"],"issn-type":[{"value":"1063-6536","type":"print"},{"value":"1558-0865","type":"electronic"},{"value":"2374-0159","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}