{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:19:45Z","timestamp":1766067585912,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.23919\/ascc56756.2022.9828009","type":"proceedings-article","created":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T19:38:23Z","timestamp":1658345903000},"page":"959-964","source":"Crossref","is-referenced-by-count":5,"title":["An Iterative Method for Inverse Optimal Control"],"prefix":"10.23919","author":[{"given":"Zihao","family":"Liang","sequence":"first","affiliation":[{"name":"Purdue University,School of Aeronautics and Astronautics,West Lafayette,USA"}]},{"given":"Wanxin","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Pennsylvania,GRASP Lab,Philadelphia,USA"}]},{"given":"Shaoshuai","family":"Mou","sequence":"additional","affiliation":[{"name":"Purdue University,School of Aeronautics and Astronautics,West Lafayette,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015430"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2022.3191592"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7139555"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2016.2581216"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DASC52595.2021.9594324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2022.3190221"},{"key":"ref7","first-page":"663","article-title":"Algorithms for inverse reinforcement learning","volume-title":"International Conference on Machine Learning","author":"Ng"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-009-9170-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/0278364921996384"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143936"},{"key":"ref11","first-page":"1433","article-title":"Maximum Entropy Inverse Reinforcement Learning","volume-title":"AAAI","volume":"8","author":"Ziebart"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2009.5354147"},{"key":"ref13","article-title":"Pontryagin differentiable programming: An end-to-end learning and control framework","author":"Jin","year":"2020","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref14","article-title":"Safe pontryagin differentiable programming","author":"Jin","year":"2021","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0278364921996384"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.2011.6045410"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2012.6225317"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0278364917745980"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.09.023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1201\/9780203749319"},{"key":"ref21","first-page":"1034","article-title":"Expectation-maximization for inverse reinforcement learning with hidden data","volume-title":"International Conference on Autonomous Agents & Multiagent Systems","author":"Bogert"},{"key":"ref22","first-page":"217","article-title":"Learning robot objectives from physical human interaction","volume-title":"Proceedings of Machine Learning Research","volume":"78","author":"Bajcsy"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7139510"},{"key":"ref24","first-page":"522","article-title":"Scaling expectation-maximization for inverse reinforcement learning to multiple robots under occlusion","volume-title":"Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems","author":"Bogert"},{"article-title":"Continuous inverse optimal control with locally optimal examples","year":"2012","author":"Levine","key":"ref25"},{"key":"ref26","volume-title":"Dynamic programming and optimal control: Volume I.","volume":"1","author":"Bertsekas","year":"2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.109658"},{"volume-title":"Robot dynamics and control.","year":"2008","author":"Spong","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1515\/9780691211701"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717652"}],"event":{"name":"2022 13th Asian Control Conference (ASCC)","start":{"date-parts":[[2022,5,4]]},"location":"Jeju, Korea, Republic of","end":{"date-parts":[[2022,5,7]]}},"container-title":["2022 13th Asian Control Conference (ASCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9828005\/9828007\/09828009.pdf?arnumber=9828009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:47:37Z","timestamp":1706762857000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9828009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/ascc56756.2022.9828009","relation":{},"subject":[],"published":{"date-parts":[[2022,5,4]]}}}