{"id":"https://openalex.org/W4413925838","doi":"https://doi.org/10.1109/icra55743.2025.11128656","title":"RAIL: Reachability-Aided Imitation Learning for Safe Policy Execution","display_name":"RAIL: Reachability-Aided Imitation Learning for Safe Policy Execution","publication_year":2025,"publication_date":"2025-05-19","ids":{"openalex":"https://openalex.org/W4413925838","doi":"https://doi.org/10.1109/icra55743.2025.11128656"},"language":"en","primary_location":{"id":"doi:10.1109/icra55743.2025.11128656","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra55743.2025.11128656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102622757","display_name":"Wonsuhk Jung","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wonsuhk Jung","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Dennis Anthony","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dennis Anthony","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083595150","display_name":"Utkarsh A. Mishra","orcid":"https://orcid.org/0000-0002-4977-5187"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Utkarsh A. Mishra","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084167458","display_name":"Nadun Ranawaka Arachchige","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nadun Ranawaka Arachchige","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093123146","display_name":"Matthew Bronars","orcid":"https://orcid.org/0009-0008-0237-1186"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matthew Bronars","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028834865","display_name":"Danfei Xu","orcid":"https://orcid.org/0000-0002-8744-3861"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Danfei Xu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5019247599","display_name":"Shreyas Kousik","orcid":"https://orcid.org/0000-0003-1348-7463"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shreyas Kousik","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102622757"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25380972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3582","last_page":"3589"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7886999845504761,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7886999845504761,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.7870000004768372,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7401999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.9133846759796143},{"id":"https://openalex.org/keywords/imitation","display_name":"Imitation","score":0.7545778155326843},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7168630361557007},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35217827558517456},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.19758716225624084},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07031381130218506}],"concepts":[{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.9133846759796143},{"id":"https://openalex.org/C126388530","wikidata":"https://www.wikidata.org/wiki/Q1131737","display_name":"Imitation","level":2,"score":0.7545778155326843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7168630361557007},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35217827558517456},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.19758716225624084},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07031381130218506},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icra55743.2025.11128656","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra55743.2025.11128656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1424654272","https://openalex.org/W1986014385","https://openalex.org/W2112474089","https://openalex.org/W2565233142","https://openalex.org/W2751704030","https://openalex.org/W2907553835","https://openalex.org/W2963669336","https://openalex.org/W2991384325","https://openalex.org/W3003329097","https://openalex.org/W3003342008","https://openalex.org/W3033504397","https://openalex.org/W3040197514","https://openalex.org/W3115737827","https://openalex.org/W3135301907","https://openalex.org/W3159659315","https://openalex.org/W3181488183","https://openalex.org/W4205626291","https://openalex.org/W4285102237","https://openalex.org/W4285102519","https://openalex.org/W4285818823","https://openalex.org/W4286375138","https://openalex.org/W4385403811","https://openalex.org/W4385430497","https://openalex.org/W4385430529","https://openalex.org/W4385430674","https://openalex.org/W4387123822","https://openalex.org/W4387886039","https://openalex.org/W4389665935","https://openalex.org/W4391741307","https://openalex.org/W4401415186","https://openalex.org/W4402353995","https://openalex.org/W4402354099","https://openalex.org/W4405784982","https://openalex.org/W4411799575"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2899084033","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W2748952813","https://openalex.org/W1531601525"],"abstract_inverted_index":{"Imitation":[0,108],"learning":[1,8],"(IL)":[2],"has":[3],"shown":[4],"great":[5],"success":[6],"in":[7,42,117,173],"complex":[9],"robot":[10],"manipulation":[11,121],"tasks.":[12],"However,":[13],"there":[14],"remains":[15],"a":[16,34,50,91],"need":[17],"for":[18],"practical":[19],"safety":[20,55,96],"methods":[21],"to":[22,31,48,65,98,161],"justify":[23],"widespread":[24],"deployment.":[25],"In":[26],"particular,":[27],"it":[28,45],"is":[29,46],"important":[30],"certify":[32],"that":[33],"system":[35],"obeys":[36],"hard":[37,71,100,146,150],"constraints":[38,72,101,151],"on":[39,102,152],"unsafe":[40],"behavior":[41],"settings":[43],"when":[44],"unacceptable":[47],"design":[49],"tradeoff":[51],"between":[52],"performance":[53,75,144],"and":[54,120,141],"via":[56],"tuning":[57],"the":[58,66,74,129,153,169],"policy":[59],"(i.e.":[60],"soft":[61],"constraints).":[62],"This":[63],"leads":[64],"question,":[67,87],"how":[68],"does":[69],"enforcing":[70],"impact":[73],"(meaning":[76],"safely":[77],"completing":[78],"tasks)":[79],"of":[80],"an":[81],"IL":[82,115],"policy?":[83],"To":[84],"answer":[85],"this":[86,88],"paper":[89],"builds":[90],"reach":[92],"ability":[93,160],"-":[94],"based":[95],"filter":[97],"enforce":[99],"IL,":[103],"which":[104],"we":[105,123],"call":[106],"Reachability-Aided":[107],"Learning":[109],"(RAIL).":[110],"Through":[111],"evaluations":[112],"with":[113],"state-of-the-art":[114],"policies":[116,131,155],"mobile":[118],"robots":[119],"tasks,":[122],"make":[124],"two":[125],"key":[126],"findings.":[127],"First,":[128],"highest-performing":[130],"are":[132],"sometimes":[133],"only":[134],"so":[135],"because":[136],"they":[137],"frequently":[138],"violate":[139],"constraints,":[140],"significantly":[142],"lose":[143],"under":[145],"constraints.":[147],"Second,":[148],"surprisingly,":[149],"lower-performing":[154],"can":[156,171,178],"occasionally":[157],"increase":[158],"their":[159],"perform":[162],"tasks":[163],"safely.":[164],"Finally,":[165],"hardware":[166],"evaluation":[167],"confirms":[168],"method":[170],"operate":[172],"real":[174],"time.":[175],"More":[176],"results":[177],"be":[179],"found":[180],"at":[181],"our":[182],"website:":[183],"https://safe-robotics-lab-gt.github.io/rail/.":[184]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
