<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Developing safe and explainable autonomous agents: from simulation to the real world</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Federico</forename><surname>Bianchi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alberto</forename><surname>Castellini</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Farinelli</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><surname>Marzari</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Daniele</forename><surname>Meli</surname></persName>
							<email>daniele.meli@univr.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Trotti</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Celeste</forename><surname>Veronese</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Verona</orgName>
								<address>
									<addrLine>strada Le Grazie 15</addrLine>
									<postCode>37135</postCode>
									<settlement>Verona</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Developing safe and explainable autonomous agents: from simulation to the real world</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">0A8C40245B4D691790828F55E6C4EE87</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Safe Reinforcement Learning</term>
					<term>Formal verification of neural networks</term>
					<term>Neurosymbolic AI</term>
					<term>Planning under uncertainty</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Responsible artificial intelligence is the next challenge of research to foster the deployment of autonomous systems in the real world. In this paper, we focus on safe and explainable design and deployment of autonomous agents, e.g., robots. In particular, we present our recent contributions to: i) safe and explainable planning, leveraging on safe Reinforcement Learning (RL) and neurosymbolic planning; ii) effective deployment of RL policies via model-based control; iii) formal verification of the safety of deep RL policies; and iv) explainable anomaly detection of complex real systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Artificial Intelligence (AI) and robotics are pervading everyday activities, from industrial automation <ref type="bibr" target="#b0">[1]</ref> to environmental monitoring <ref type="bibr" target="#b1">[2]</ref>. As more and more sophisticated autonomous cognitive systems interact with humans in complex scenarios, the development of responsible AI solutions <ref type="bibr" target="#b2">[3]</ref> becomes a fundamental design requirement, as prescribed also by the latest international regulations 1 . Responsible AI involves several aspects, including safety, transparency and trustability <ref type="bibr" target="#b3">[4]</ref>. Safety regards providing guarantees about the behavior of AI systems, e.g., autonomous robotic systems, in terms of performance and potential harm to the surrounding environment or humans. Transparency and trustability are related to the perception of humans interacting with the AI system, e.g., the explainability and compliance of the system's behaviour to the expectation of humans from a moral or rational perspective <ref type="bibr" target="#b4">[5]</ref>.</p><p>In this paper, we summarize our main contributions in the field of responsible AI. We focus on autonomous agents, e.g., robots, and present our approach to responsible autonomy at different developmental stages. We first describe our solutions for safe and explainable planning in autonomous agents, via safe Reinforcement Learning (RL) and neurosymbolic approaches. We also analyze the problem of safe and compliant transfer of a planned policy on a physical robotic system, combining RL with model-based control. We then investigate how to provide formal guarantees of safety for black-box policies, e.g., 1 European AI Act from deep RL, via formal verification. Finally, we present solutions for efficient and explainable anomaly detection in autonomous systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Safe and explainable planning</head><p>We assume the autonomous agent and the environment are represented as a Markov Decision Process (MDP) 𝑀 = ⟨𝑆, 𝐴, 𝑇, 𝑅⟩, defining respectively the state space, the action space, the transition map, and the reward map. The first approach is based on Safe Policy Improvement (SPI) <ref type="bibr" target="#b5">[6]</ref> and Monte Carlo Tree Search (MCTS) <ref type="bibr" target="#b6">[7]</ref>, which performs simulations in a model of the real environment to estimate the optimal policy online. The second solution combines MCTS with symbolic and logical reasoning, to guide the exploration of the RL agent towards better pathways.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Safe Policy Improvement with MCTS</head><p>Safe RL <ref type="bibr" target="#b8">[9]</ref> investigates how to learn policies that maximize the performance of the agent, while respecting safety constraints during learning. One popular approach is Safe Policy Improvement with Baseline Bootstrapping (SPIBB) <ref type="bibr" target="#b9">[10]</ref>. SPIBB starts from a baseline policy 𝜋0 (e.g., a sub-optimal expert-designed policy). The algorithm then collects a batch dataset of trajectories (i.e., stateaction pairs), and uses the baseline policy on less frequent state-action pairs. However, it does not scale to large state and action spaces.</p><p>To improve scalability, we recently introduced Monte Carlo Tree Search Safe Policy Improvement with Baseline Bootstrapping (MCTS-SPIBB) <ref type="bibr" target="#b7">[8]</ref>. The algorithm exploits MCTS to estimate 𝜋𝐼 online, hence it can scale to large domains, while keeping the asymptotic guarantees of convergence of SPIBB <ref type="bibr" target="#b7">[8]</ref>. In <ref type="bibr" target="#b7">[8]</ref> we compared MCTS-SPIBB with several state-of-the-art SPI algorithms on benchmark domains (see Figure <ref type="figure" target="#fig_0">1</ref>.a). Furthermore, we showed that on very large state spaces, such as the standard SysAdmin benchmark 2 with up to 35 machines, MCTS-SPIBB is the only SPI algorithm capable of computing improved policies (see Figure <ref type="figure" target="#fig_0">1</ref>.b).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Planning with logics in MCTS</head><p>MCTS may require a large number of online simulations when the state and action spaces are large. This becomes even more critical in Partially Observable MDPs (POMDPs), where part of the state is uncertain, hence a particle filter must be used to sample and estimate the actual state of the system, starting from a probability distribution called the belief. Recent online solvers for POMDPs, e.g., Partially Observable Monte Carlo Planning (POMCP) <ref type="bibr" target="#b10">[11]</ref> and Determinized Sparse Partially Observable Trees (DESPOT) <ref type="bibr" target="#b11">[12]</ref> require the definition of task-specific policy heuristics, in order to efficiently bias the exploration towards most fruitful policies. Moreover, it is essential to guarantee the exploration of only safe policies.</p><p>To this aim, in <ref type="bibr" target="#b12">[13]</ref> we proposed an approach based on maximum satisfiability modulo theory <ref type="bibr" target="#b13">[14]</ref> to probabilistically verify the adherence of the policy computed by POMCP to a set of user-defined specifications, expressed in a fragment of first-order logic. In this way, we can shield undesired actions in MCTS simulations, and increase the explainability of the generated policy thanks to the logic formalism. However, defining the logical policy specifications may be tedious and error-prone in realistic complex domains. For this reason, in <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref> we proposed an approach based on inductive logic programming <ref type="bibr" target="#b16">[17]</ref> to learn logical policy heuristics from 2 SysAdmin: https://jair.org/index.php/jair/article/view/10341/24723 trajectories (belief-action pairs) of POMDP executions collected offline. Specifically, given a set of task-related concepts 𝐹 provided by the user to describe the belief space, offline trajectories are converted to a logical formalism, where logical predicates encode concepts in 𝐹 . As an example, consider the paradigmatic POMDP rocksample scenario depicted in Figure <ref type="figure">2a</ref>, where a robotic agent must collect valuable rocks (green dots) avoiding worthless ones (red dots) in a grid world. The state of the POMDP includes information about the position of agents and rocks, and the probability (belief) of rocks to be valuable. The state can be translated to a logical representation in terms of the following concepts in 𝐹 : the Manhattan distance D between the agent and each rock R dist(R,D) and the probability P of a rock R to be valuable guess(R,P). Defining semantic concepts about the domain is easier than defining directly policy specifications, since it simply involves a re-interpretation of the state formalization.</p><p>We preliminarily learn policy specifications from trajectories collected from a rocksample agent operating in a 12×12 grid with 4 rocks. We adopt the logical formalism of Answer Set Programming (ASP) <ref type="bibr" target="#b17">[18]</ref>, which represents the state of the art for planning in first-order logic <ref type="bibr" target="#b18">[19]</ref>. Our approach requires relatively few training trajectories (less than 800 in rocksample) to learn interpretable transparent policy specifications. Moreover, learned heuristics allow POMCP to use significantly fewer online simulations per step of execution (Figure <ref type="figure">2b</ref>, achieving comparable performance with respect to expert-designed specifications (pref ). Finally, the heuristics generalize to unseen problem instances, e.g., enhancing scalability to larger grid sizes (Figure <ref type="figure">2c</ref>) which require a longer planning horizon, typically challenging for MCTS-based solvers. In <ref type="bibr" target="#b19">[20]</ref>, we also showed that this approach can be used to derive policy explanations of black-box model-free RL agents, in the context of autonomous driving.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Safe deployment in the real world</head><p>The policy computed by a RL-based planner, e.g., POMCP for POMDPs, cannot always be effectively and safely deployed on a real robotic system. Indeed, MCTS-based planners perform online simulations based on a model of the environment, but the chosen policy must be adapted to the inevitable unmodeled inaccuracies and non-linearities of the physical plant. To overcome this problem, in <ref type="bibr" target="#b20">[21]</ref> we implemented the two-layer architecture depicted in Figure <ref type="figure">3</ref>, combining a high-level controller based on POMCP with a low-level model-based controller: The low-level controller is designed using the inverse dynamics technique <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref>, that allows to linearize via feedback the system. In particular, let , where 𝑣 is an auxiliary control signal. Therefore, the low-level controller exploits the auxiliary control signal 𝑣, which is mapped as reference values for the controller, to compute the command 𝑢. The high-level controller is formalized as a POMDP that exploits the linearized closed-loop model to select the best local action 𝑢 for the agents. In particular, the POMCP provides the sub-optimal reference values for the low-level controller optimizing user-defined objectives, encoded in the reward function. Note, the two-layer have different control loop sample rates; the low-level has to be fast since it has to provide the commands to the agent, while the high-level can be slower since it generates the reference values for the low-level.</p><p>The two-layer approach is tested in a scenario where an aerial drone has to reach a target area, avoiding some no-fly zones and minimizing fuel consumption or attitude error. Therefore, the reward function is composed of four contributions: an attractive potential component to reach the target, a repulsive component to avoid the no-fly zone, the fuel consumption and the heading error. The last two components are weighted to rank between different objectives. Figure <ref type="figure">4</ref> shows the trajectory followed by the drone optimizing only the fuel consumption (black line), both fuel and attitude (red dashed line) and only the attitude error (green dotted line). The black line follows the shortest path to minimize the fuel, the red line follows the shortest path but near the target position the attitude error component increases to align the drone with the desired attitude (black arrow). The green line follows the optimal path to minimize only the attitude. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Formal verification of deep RL</head><p>Trained RL policies, especially model-free RL policies encoded in a Deep Neural Network (DNN), do not guarantee to provably meet the safety standards required in the real world. For instance, DNNs are vulnerable to the so-called adversarial inputs, i.e., minimal input variations that fool the system to output an undesired value (or action) <ref type="bibr" target="#b23">[24]</ref>. Consequently, in recent years, Formal Verification (FV) of DNNs (aka DNN-Verification) has been developed to provide formal guarantees on the behavior of these systems <ref type="bibr" target="#b24">[25]</ref>. In particular, given a predefined safety property, the goal of DNN-Verification is to assert whether at least one input configuration exists that violates the property. However, given the non-convex and non-linear nature of DNNs, verifying safety properties in the worst case has been shown to be an NP-complete problem <ref type="bibr" target="#b25">[26]</ref>. Moreover, the standard binary response of DNN-verification (safe vs. unsafe) does not provide sufficient information to compare the safety of different DNNs. To overcome these limitations, in <ref type="bibr" target="#b26">[27]</ref>, we proposed a novel quantitative formulation of the DNN-verification problem, allowing to enumerate all unsafe regions for a given domain of interest and thus rank the models on the portion of unsafe regions they may have. However, we showed that this problem turns out to be #P-hard. Hence, in <ref type="bibr" target="#b27">[28]</ref> we proposed 𝜖-ProVe. Exploiting a controllable underestimation of the output reachable sets obtained via statistical prediction of tolerance limits <ref type="bibr" target="#b28">[29]</ref>, the algorithm provides a tight -with provable probabilistic guarantees-lower estimate of the (un)safe areas.</p><p>We validated DNN-Verification in realistic robotic safety-critical scenarios. In particular, in <ref type="bibr" target="#b29">[30]</ref>, we showed that DNN-Verification can be used to rank different successful DNN models according to the level of safety, verifying collision avoidance in robotic mapless navigation. We then applied a similar pipeline in a more safety-critical domain, namely autonomous colonoscopy navigation for colorectal detection with deep RL <ref type="bibr" target="#b30">[31]</ref> (Figure <ref type="figure">5</ref>). In particular, we trained an agent to navigate the endoscope in patient-specific colon models based on endoscopic images, using Constrained RL (CRL) to impose a safety cost for the agent to touch colon walls at the training stage. Nevertheless, due to the Lagrangian relaxation implemented by CRL to perform constrained optimization, safety may not be guaranteed. Hence, we adopted a model selection strategy that harnesses FV to evaluate the safety of a vast pool of trained policies to select the one the meets all the behavioral preferences specified. The results of our study are reported in Table 1 over 300 trained models, finding 3 completely safe models that provably meet the safety requirements.</p><p>Finally, to address the necessity of running the FV process only after training due to its computational complexity, in <ref type="bibr" target="#b31">[32]</ref> we proposed an unconstrained DRL framework that leverages a novel sample-based method to approximate local violations of input-output conditions to foster the learning of safer behaviors inside the training loop. However, such conditions are typically hard-coded and require task-level knowledge, making their application intractable in challenging safety-critical tasks. To this end, in <ref type="bibr" target="#b32">[33]</ref>, we introduced the Collection and Refinement of Online Properties (CROP) framework to collect and refine safety properties during training. The combination of CROP with approximate violation inside the training loop allowed us to obtain a more robust approach with respect to other existing Safe DRL methodologies in the context of autonomous navigation, promoting safer behaviors while maintaining similar or better returns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Explainable and data-efficient anomaly detection</head><p>Autonomous systems operating in the real world are required to reliably work over long periods of time (Long Term Autonomy, LTA) under changing and unpredictable environmental conditions. In this context, anomaly detection is crucial to promptly identify situations that diverge from the desired behaviour. Specifically, unsupervised anomaly detection aims to idenfity anomalies related to the global behavior of the system <ref type="bibr" target="#b33">[34,</ref><ref type="bibr" target="#b34">35,</ref><ref type="bibr" target="#b35">36]</ref>, monitoring multivariate time series generated from sensors and actuators and starting from the only knowledge of the nominal (i.e., anomaly-free) behavior.</p><p>We recently proposed two contributions in this area. namely, an online approach for detecting anomalous behaviors of robotic systems involved in complex LTA scenarios (HHAD) <ref type="bibr" target="#b36">[37]</ref>, and an adversarial data augmentation and retraining approach (HHAD-AUG) <ref type="bibr" target="#b37">[38]</ref>. In HHAD <ref type="bibr" target="#b36">[37]</ref>, we use Hidden Markov Models (HMMs) to represent the nominal behavior of a robot. We then evaluate online the dissimilarity between the probability distribution of multivariate sensor time series in a sliding window and the emission probability of the related HMM hidden states. We adopt the Hellinger distance <ref type="bibr" target="#b38">[39]</ref> as a distance measure since it is bounded (thus it lends itself to simpler interpretation and thresholding) and it is less noisy, hence more informative and discriminative.</p><p>In HHAD-AUG <ref type="bibr" target="#b37">[38]</ref>, we address the usual lack (or paucity) of anomalous examples and the noise that characterizes time series of real systems. We propose a data augmentation method based on perturbed (adversarial) time series <ref type="bibr" target="#b39">[40]</ref>, having the advantage of not requiring any prior knowledge about the application domain and data conformation. We generate adversarial examples only for nominal points, optimizing a loss function based on the Hellinger distance between the observed and the expected data distributions.</p><p>We evaluate our data augmentation and re-training approach on several public datasets, plus one collected from our aquatic drones developed in the EU H2020 project INTCATCH <ref type="bibr" target="#b40">[41]</ref>. Results show that (i) the adversarial generation algorithms can generate meaningful adversarial examples for HHAD, employing them to significantly improve the performance of HHAD; (ii) our data augmentation method yields higher performance than examples generated by state-of-the-art augmentation methods; erated considering standard log-likelihood; (v) the low computational complexity and high parallelizability of the proposed method allow for a fast data augmentation and retraining of HHAD. Figure <ref type="figure" target="#fig_3">6</ref> shows the results on the INTCATCH dataset <ref type="bibr" target="#b40">[41]</ref>.</p><p>Finally, we have recently addressed the problem of explainable anomaly detection, in order to provide useful information about the source of the anomaly for easier repair. To this aim, in <ref type="bibr" target="#b41">[42]</ref> we showed that causal discovery based on Conditional Mutual Information (CMI) between time series can achieve higher performance than standard deep learning antomaly detectors, on a benchmark robotic dataset of the Pepper service robot <ref type="foot" target="#foot_0">3</ref> . Our methodology evaluates the variation of CMI between time series, thus providing a useful hint to the root cause of the anomaly. Moreover, it builds a nominal model of the real physical relations between variables of the system, thus resulting in higher robustness and more accurate anomaly detection, compared to DNN methods (95% vs 90 % F1-score and 100% precision).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion and future works</head><p>Our methodologies aim at increasing transparency and safety at different development levels, from planning to execution and verification. Our current research direction includes the online integration of symbolic learning and formal verification approaches into RL, focusing on the current scalability issues.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Safe Policy Improvement: a) Comparison of performance among SPI algorithms; b) Scalability comparison between MCTS-SPIBB and SPIBB [8].</figDesc><graphic coords="2,110.37,147.49,161.96,74.23" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: a) Rocksample setup; b) Results of<ref type="bibr" target="#b15">[16]</ref> with few simulations and c) on larger grids.</figDesc><graphic coords="3,362.63,212.51,83.33,80.68" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :Figure 5 :</head><label>45</label><figDesc>Figure 4: Drone paths. The black and blue arrows are, respectively, the desired yaw angle and drone initial yaw angle</figDesc><graphic coords="3,126.83,84.67,70.83,69.79" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Average F1-score for the original detector HHAD and augmented detectors [38]: H-AUG (ours, based on Hellinger distance), L-AUG (ours, based on log-likelihood), R-AUG (random-based baseline), D-AUG (drift-based baseline), G-AUG (gaussian-based baseline), and S-AUG (SMOTE-based baseline) on different training set sizes in the INTCATCH dataset. Averages are computed over 30 datasets, for each dataset size.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Results of model selection. SAT indicates property violation.Θ's denote the safety property not to touch the colon wall in any cardinal direction.</figDesc><table><row><cell></cell><cell></cell><cell cols="3">Safety Properties</cell><cell></cell></row><row><cell></cell><cell>Θ ↑</cell><cell>Θ ↓</cell><cell>Θ←</cell><cell>Θ→</cell><cell>FV selection</cell></row><row><cell>Method</cell><cell>SAT</cell><cell>SAT</cell><cell>SAT</cell><cell>SAT</cell><cell>Safe models</cell></row><row><cell>PPO</cell><cell>300</cell><cell>246</cell><cell>80</cell><cell>167</cell><cell>0</cell></row><row><cell>L-PPO</cell><cell>221</cell><cell>198</cell><cell>53</cell><cell>161</cell><cell>3</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">https://sites.google.com/diag.uniroma1.it/robsec-data</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Artificial intelligence for industry 4.0: Systematic review of applications, challenges, and opportunities</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Jan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ahamed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Mayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Patel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Grossmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stumptner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuusk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="page">119456</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Reinforcement learning applications in environmental sustainability: a review</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zuccotto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Torre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page">88</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Responsible ai: Bridging from ethics to practice</title>
		<author>
			<persName><forename type="first">B</forename><surname>Shneiderman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="32" to="35" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Thinking responsibly about responsible AI and &apos;the dark side&apos;of AI</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mikalef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Conboy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E</forename><surname>Lundström</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Popovič</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Artificial intelligence, values, and alignment</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gabriel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Minds and machines</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="411" to="437" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Safe policy improvement approaches and their limitations</title>
		<author>
			<persName><forename type="first">P</forename><surname>Scholl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Dietrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Otte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Udluft</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Agents and Artificial Intelligence</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="74" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Monte carlo tree search: A review of recent modifications and applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Świechowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Godlewski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sawicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mańdziuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page" from="2497" to="2562" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Scalable safe policy improvement via Monte Carlo tree search</title>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bianchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Zorzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename><surname>Simão</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T J</forename><surname>Spaan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 40th International Conference on Machine Learning (ICML 2023)</title>
				<meeting>the 40th International Conference on Machine Learning (ICML 2023)<address><addrLine>PMLR</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="3732" to="3756" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Reinforcement learning, An introduction</title>
		<author>
			<persName><forename type="first">R</forename><surname>Sutton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Barto</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>MIT Press</publisher>
		</imprint>
	</monogr>
	<note>2nd ed.</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Safe policy improvement with baseline bootstrapping</title>
		<author>
			<persName><forename type="first">R</forename><surname>Laroche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Trichelair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tachet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Des</forename><surname>Combes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 36th International Conference on Machine Learning (ICML)</title>
				<meeting>the 36th International Conference on Machine Learning (ICML)<address><addrLine>PMLR</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="3652" to="3661" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Monte-carlo planning in large pomdps</title>
		<author>
			<persName><forename type="first">D</forename><surname>Silver</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Veness</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advances in neural information processing systems</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Despot: Online pomdp planning with regularization</title>
		<author>
			<persName><forename type="first">N</forename><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Somani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">S</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="page" from="231" to="266" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Risk-aware shielding of Partially Observable Monte Carlo Planning policies</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mazzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">324</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Satisfiability modulo theories</title>
		<author>
			<persName><forename type="first">C</forename><surname>Barrett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sebastiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Seshia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tinelli</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Learning logic specifications for soft policy guidance in POMCP</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mazzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Meli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS &apos;23</title>
				<meeting>the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS &apos;23</meeting>
		<imprint>
			<publisher>IFAAMAS</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="373" to="381" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Learning logic specifications for policy guidance in POMDPs: an inductive logic programming approach</title>
		<author>
			<persName><forename type="first">D</forename><surname>Meli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="725" to="776" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Inductive logic programming: Theory and methods</title>
		<author>
			<persName><forename type="first">S</forename><surname>Muggleton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">De</forename><surname>Raedt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="629" to="679" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Answer set planning: a survey</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Tran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Pontelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Balduccini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="226" to="298" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Logic programming for deliberative robotic task planning</title>
		<author>
			<persName><forename type="first">D</forename><surname>Meli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Nakawala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Fiorini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="page" from="9011" to="9049" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Inductive logic programming for transparent alignment with multiple moral values</title>
		<author>
			<persName><forename type="first">C</forename><surname>Veronese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Meli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bistaffa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rodríguez-Soto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Rodríguez-Aguilar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR WORKSHOP PRO-CEEDINGS</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="84" to="88" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">An online path planner based on pomdp for uavs</title>
		<author>
			<persName><forename type="first">F</forename><surname>Trotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Muradore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2023 European Control Conference (ECC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Isidori</surname></persName>
		</author>
		<title level="m">Nonlinear control systems II</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Nonlinear Systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Khalil</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Prentice Hall</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Szegedy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Zaremba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sutskever</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bruna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Erhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Goodfellow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fergus</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1312.6199</idno>
		<title level="m">Intriguing properties of neural networks</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Algorithms for verifying deep neural networks</title>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Arnon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lazarus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Strong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Barrett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Kochenderfer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Foundations and Trends® in Optimization</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="244" to="404" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Reluplex: An efficient smt solver for verifying deep neural networks</title>
		<author>
			<persName><forename type="first">G</forename><surname>Katz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Barrett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Julian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Kochenderfer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International conference on computer aided verification</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="97" to="117" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">The #DNN-Verification Problem: Counting Unsafe Inputs for Deep Neural Networks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Marzari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Corsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cicalese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Joint Conference on Artificial Intelligence (IJCAI)</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="217" to="224" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Enumerating safe regions in deep neural networks with provable probabilistic guarantees</title>
		<author>
			<persName><forename type="first">L</forename><surname>Marzari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Corsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Marchesini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cicalese</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Conference on Artificial Intelligence</title>
				<meeting>the AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="21387" to="21394" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Statistical prediction with special reference to the problem of tolerance limits</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Wilks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The annals of mathematical statistics</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="400" to="409" />
			<date type="published" when="1942">1942</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Verifying learningbased robotic navigation systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Amir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Corsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yerushalmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Marzari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Harel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Katz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">29th International Conference TACAS</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="607" to="627" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Constrained reinforcement learning and formal verification for safe colonoscopy navigation</title>
		<author>
			<persName><forename type="first">D</forename><surname>Corsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Marzari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pore</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Casals</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Fiorini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dall'alba</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="10289" to="10294" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Safe deep reinforcement learning by verifying tasklevel properties</title>
		<author>
			<persName><forename type="first">E</forename><surname>Marchesini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Marzari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Amato</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AAMAS &apos;23, International Foundation for Autonomous Agents and Multiagent Systems</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1466" to="1475" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Online safety property collection and refinement for safe deep reinforcement learning in mapless navigation</title>
		<author>
			<persName><forename type="first">L</forename><surname>Marzari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Marchesini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Robotics and Automation (ICRA), IEEE</title>
				<imprint>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="7133" to="7139" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Time series segmentation for statemodel generation of autonomous aquatic drones: A systematic framework</title>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bicego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Masillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zuccotto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Engineering Applications of Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">90</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Subspace clustering for situation assessment in aquatic drones: a sensitivity analysis for state-model improvement</title>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bicego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bloisi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Blum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Masillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Peignier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="658" to="671" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Subspace clustering for situation assessment in aquatic drones</title>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Masillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bicego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bloisi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Blum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 33th ACM/SIGAPP Symposium on Applied Computing</title>
				<meeting>33th ACM/SIGAPP Symposium on Applied Computing</meeting>
		<imprint>
			<publisher>SAC</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="930" to="937" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">HMMs for anomaly detection in autonomous robots</title>
		<author>
			<persName><forename type="first">D</forename><surname>Azzalini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Luperto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Amigoni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. AAMAS</title>
				<meeting>AAMAS</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="105" to="113" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Adversarial data augmentation for hmm-based anomaly detection</title>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Masillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Azzalini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Amigoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Pattern Analysis and Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="14131" to="14143" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Neue begründung der theorie quadratischer formen von unendlichvielen veränderlichen</title>
		<author>
			<persName><forename type="first">E</forename><surname>Hellinger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal für die reine und angewandte Mathematik</title>
		<imprint>
			<biblScope unit="volume">136</biblScope>
			<biblScope unit="page" from="210" to="271" />
			<date type="published" when="1909">1909</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Adversarial attacks on time series</title>
		<author>
			<persName><forename type="first">F</forename><surname>Karim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Majumdar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Darabi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans Pattern Anal Mach Intell</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="3309" to="3320" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Multivariate sensor signals collected by aquatic drones involved in water monitoring: A complete dataset</title>
		<author>
			<persName><forename type="first">A</forename><surname>Castellini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bloisi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Blum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Masillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Farinelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Brief</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page">105436</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Meli</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2404.09871</idno>
		<title level="m">Explainable online unsupervised anomaly detection for cyber-physical systems via causal discovery from time series</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
