no code implementations • 8 Apr 2024 • Yusuf Umut Ciftci, Zeyuan Feng, Somil Bansal
The algorithm abstracts the imitation error as an adversarial disturbance in the system dynamics, injects it during data collection to expose the expert to safety critical states, and collects corrective actions.