{"id":"https://openalex.org/W7154629406","doi":"https://doi.org/10.48550/arxiv.2604.13788","title":"Failure Identification in Imitation Learning Via Statistical and Semantic Filtering","display_name":"Failure Identification in Imitation Learning Via Statistical and Semantic Filtering","publication_year":2026,"publication_date":"2026-04-15","ids":{"openalex":"https://openalex.org/W7154629406","doi":"https://doi.org/10.48550/arxiv.2604.13788"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.13788","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.13788","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.13788","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133793581","display_name":"Quentin Rolland","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rolland, Quentin","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032812232","display_name":"Fabrice Mayran de Chamisso","orcid":"https://orcid.org/0000-0003-0876-0859"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"de Chamisso, Fabrice Mayran","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5032227198","display_name":"Jean-Baptiste Mouret","orcid":"https://orcid.org/0000-0002-2513-027X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mouret, Jean-Baptiste","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5133793581"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.6453999876976013,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.6453999876976013,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.04780000075697899,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.040800001472234726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6541000008583069},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.5407999753952026},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4787999987602234},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4690000116825104},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.46369999647140503},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.4458000063896179},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4300000071525574},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.42320001125335693},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37389999628067017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6725000143051147},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6541000008583069},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6536999940872192},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.5407999753952026},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4787999987602234},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4690000116825104},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.46369999647140503},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.4458000063896179},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4300000071525574},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.42320001125335693},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42010000348091125},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C126388530","wikidata":"https://www.wikidata.org/wiki/Q1131737","display_name":"Imitation","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3294000029563904},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C2778493491","wikidata":"https://www.wikidata.org/wiki/Q7449072","display_name":"Semantic matching","level":3,"score":0.2985999882221222},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C59656382","wikidata":"https://www.wikidata.org/wiki/Q191536","display_name":"Conjunction (astronomy)","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C34413123","wikidata":"https://www.wikidata.org/wiki/Q170978","display_name":"Robotics","level":3,"score":0.2678000032901764},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2621999979019165},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.25920000672340393},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C2982736386","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Statistical learning","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.13788","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.13788","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.13788","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.13788","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.6459376811981201,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Imitation":[0],"learning":[1],"(IL)":[2],"policies":[3],"in":[4,9,15,72,144,155],"robotics":[5],"deliver":[6],"strong":[7],"performance":[8],"controlled":[10],"settings":[11],"but":[12,59],"remain":[13],"brittle":[14],"real-world":[16,139],"deployments:":[17],"rare":[18],"events":[19],"such":[20],"as":[21,49],"hardware":[22],"faults,":[23],"defective":[24],"parts,":[25],"unexpected":[26],"human":[27],"actions,":[28],"or":[29],"any":[30],"state":[31],"that":[32],"lies":[33],"outside":[34],"the":[35],"training":[36],"distribution":[37],"can":[38],"lead":[39],"to":[40,53,100,124,166],"failed":[41],"executions.":[42],"Vision-based":[43],"Anomaly":[44],"Detection":[45],"(AD)":[46],"methods":[47],"emerged":[48],"an":[50,111],"appropriate":[51],"solution":[52],"detect":[54],"these":[55],"anomalous":[56],"failure":[57,77,142],"states":[58],"do":[60],"not":[61],"distinguish":[62],"failures":[63],"from":[64,128],"benign":[65,126],"deviations.":[66],"We":[67,131],"introduce":[68,133],"FIDeL":[69,84,146],"(Failure":[70],"Identification":[71],"Demonstration":[73],"Learning),":[74],"a":[75,86,117,135],"policy-independent":[76],"detection":[78,143,157],"module.":[79],"Leveraging":[80],"recent":[81],"AD":[82],"methods,":[83],"builds":[85],"compact":[87],"representation":[88],"of":[89,113,138],"nominal":[90],"demonstrations":[91],"and":[92,104,116,158],"aligns":[93],"incoming":[94],"observations":[95],"via":[96],"optimal":[97],"transport":[98],"matching":[99],"produce":[101],"anomaly":[102,156],"scores":[103],"heatmaps.":[105],"Spatio-temporal":[106],"thresholds":[107],"are":[108],"derived":[109],"with":[110],"extension":[112],"conformal":[114],"prediction,":[115],"Vision-Language":[118],"Model":[119],"(VLM)":[120],"performs":[121],"semantic":[122],"filtering":[123],"discriminate":[125],"anomalies":[127],"genuine":[129],"failures.":[130],"also":[132],"BotFails,":[134],"multimodal":[136],"dataset":[137],"tasks":[140],"for":[141],"robotics.":[145],"consistently":[147],"outperforms":[148],"state-of-the-art":[149],"baselines,":[150],"yielding":[151],"+5.30%":[152],"percent":[153,160],"AUROC":[154],"+17.38%":[159],"failure-detection":[161],"accuracy":[162],"on":[163],"BotFails":[164],"compared":[165],"existing":[167],"methods.":[168]},"counts_by_year":[],"updated_date":"2026-04-30T09:15:22.047038","created_date":"2026-04-17T00:00:00"}
