2015
DOI: 10.1007/978-3-319-23461-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Safe Exploration for Active Learning with Gaussian Processes

Abstract: Abstract. In this paper, the problem of safe exploration in the active learning context is considered. Safe exploration is especially important for data sampling from technical and industrial systems, e.g. combustion engines and gas turbines, where critical and unsafe measurements need to be avoided. The objective is to learn data-based regression models from such technical systems using a limited budget of measured, i.e. labelled, points while ensuring that critical regions of the considered systems are avoid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
97
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 68 publications
(97 citation statements)
references
References 17 publications
0
97
0
Order By: Relevance
“…Schreiter et al [22] propose a safe exploration strategy SAL for a similar problem to ours. They optimize a function in a safe manner where the feasible region is unknown.…”
Section: Safe Explorationmentioning
confidence: 99%
See 1 more Smart Citation
“…Schreiter et al [22] propose a safe exploration strategy SAL for a similar problem to ours. They optimize a function in a safe manner where the feasible region is unknown.…”
Section: Safe Explorationmentioning
confidence: 99%
“…• PIBU: Bayesian optimization with PIBU (Equation (17)) • CMA: Covariance matrix adaptation [9] algorithm • UCB: Bayesian optimization with the acquisition function upper confidence bound (UCB) [3] • PoWER: Policy search algorithm [11] • CORL + PIBU: Algorithm 1 with PIBU (Equation (17)) • CORL + UCB: Algorithm 1 with UCB • CORL + SAL: Algorithm 1 with SAL [22] • CORL + CMA: Algorithm 1 with CMA Only the PIBU and SAL variants aim for a safe exploration during the optimization process. Note that SAL assumes to observe the distance to the feasibility boundary in critical (but feasible) regions, which all other methods do not observe.…”
Section: A Evaluation Of Corl On a Synthetic Benchmarkmentioning
confidence: 99%
“…[19], or by safety constrained Bayesian optimization as e.g. in [20], [21]. These techniques share the limitation that they need to be tailored to a task-specific class of policies.…”
Section: Related Workmentioning
confidence: 99%
“…The model is computed according to Section V-A based on measurements of system (21) as depicted in Figure 6, sensor noise σ s = 0.01 and prior distribution Σ p i = 10I n . The state feedback…”
Section: A Details Of Numerical Examplementioning
confidence: 99%
“…Due to the inherent uncertainty, the worst case scenario (e.g., possible lowest rewards) is typically taken into account [13], [17] and the set of safe policies can be expanded by exploring the states [4], [5]. To address the issue of this uncertainty for nonlinear-model estimation tasks, Gaussian process regression [18] is a strong tool, and many safe learning studies have taken advantage of its property (e.g., [4], [6], [7], [10], [13]).…”
Section: Introductionmentioning
confidence: 99%