Safe Model-based Reinforcement Learning with Stability Guarantees

2017·Arxiv

Abstract

Abstract

Reinforcement learning is a powerful paradigm for learning optimal policies from experimental data. However, to find optimal policies, most reinforcement learning algorithms explore all possible actions, which may be harmful for real-world systems. As a consequence, learning algorithms are rarely applied on safety-critical systems in the real world. In this paper, we present a learning algorithm that explicitly considers safety, defined in terms of stability guarantees. Specifically, we extend control-theoretic results on Lyapunov stability verification and show how to use statistical models of the dynamics to obtain high-performance control policies with provable stability certificates. Moreover, under additional regularity assumptions in terms of a Gaussian process prior, we prove that one can effectively and safely collect data in order to learn about the dynamics and thus both improve control performance and expand the safe region of the state space. In our experiments, we show how the resulting algorithm can safely optimize a neural network policy on a simulated inverted pendulum, without the pendulum ever falling down.

1 Introduction

While reinforcement learning (RL, [1]) algorithms have achieved impressive results in games, for example on the Atari platform [2], they are rarely applied to real-world physical systems (e.g., robots) outside of academia. The main reason is that RL algorithms provide optimal policies only in the long-term, so that intermediate policies may be unsafe, break the system, or harm their environment. This is especially true in safety-critical systems that can affect human lives. Despite this, safety in RL has remained largely an open problem [3].

Consider, for example, a self-driving car. While it is desirable for the algorithm that drives the car to improve over time (e.g., by adapting to driver preferences and changing environments), any policy applied to the system has to guarantee safe driving. Thus, it is not possible to learn about the system through random exploratory actions, which almost certainly lead to a crash. In order to avoid this problem, the learning algorithm needs to consider its ability to safely recover from exploratory actions. In particular, we want the car to be able to recover to a safe state, for example, driving at a reasonable speed in the middle of the lane. This ability to recover is known as asymptotic stability in control theory [4]. Specifically, we care about the region of attraction of the closed-loop system under a policy. This is a subset of the state space that is forward invariant so that any state trajectory that starts within this set stays within it for all times and converges to a goal state eventually.

In this paper, we present a RL algorithm for continuous state-action spaces that provides these kind of high-probability safety guarantees for policies. In particular, we show how, starting from an initial, safe policy we can expand our estimate of the region of attraction by collecting data inside the safe region and adapt the policy to both increase the region of attraction and improve control performance.

Related work Safety is an active research topic in RL and different definitions of safety exist [5, 6]. Discrete Markov decision processes (MDPs) are one class of tractable models that have been analyzed. In risk-sensitive RL, one specifies risk-aversion in the reward [7]. For example, [8] define risk as the probability of driving the agent to a set of known, undesirable states. Similarly, robust MDPs maximize rewards when transition probabilities are uncertain [9, 10]. Both [11] and [12] introduce algorithms to safely explore MDPs so that the agent never gets stuck without safe actions. All these methods require an accurate probabilistic model of the system.

In continuous state-action spaces, model-free policy search algorithms have been successful. These update policies without a system model by repeatedly executing the same task [13]. In this setting, [14] introduces safety guarantees in terms of constraint satisfaction that hold in expectation. High-probability worst-case safety guarantees are available for methods based on Bayesian optimization [15] together with Gaussian process models (GP, [16]) of the cost function. The algorithms in [17] and [18] provide high-probability safety guarantees for any parameter that is evaluated on the real system. These methods are used in [19] to safely optimize a parametric control policy on a quadrotor. However, resulting policies are task-specific and require the system to be reset.

In the model-based RL setting, research has focused on safety in terms of state constraints. In [20, 21], a priori known, safe global backup policies are used, while [22] learns to switch between several safe policies. However, it is not clear how one may find these policies in the first place. Other approaches use model predictive control with constraints, a model-based technique where the control actions are optimized online. For example, [23] models uncertain environmental constraints, while [24] uses approximate uncertainty propagation of GP dynamics along trajectories. In this setting, robust feasability and constraint satisfaction can be guaranteed for a learned model with bounded errors using robust model predictive control [25]. The method in [26] uses reachability analysis to construct safe regions in the state space. The theoretical guarantees depend on the solution to a partial differential equation, which is approximated.

Theoretical guarantees for the stability exist for the more tractable stability analysis and verification under a fixed control policy. In control, stability of a known system can be verified using a Lyapunov function [27]. A similar approach is used by [28] for deterministic, but unknown dynamics that are modeled as a GP, which allows for provably safe learning of regions of attraction for fixed policies. Similar results are shown in [29] for stochastic systems that are modeled as a GP. They use Bayesian quadrature to compute provably accurate estimates of the region of attraction. These approaches do not update the policy.

Our contributions We introduce a novel algorithm that can safely optimize policies in continuous state-action spaces while providing high-probability safety guarantees in terms of stability. Moreover, we show that it is possible to exploit the regularity properties of the system in order to safely learn about the dynamics and thus improve the policy and increase the estimated safe region of attraction without ever leaving it. Specifically, starting from a policy that is known to stabilize the system locally, we gather data at informative, safe points and improve the policy safely based on the improved model of the system and prove that any exploration algorithm that gathers data at these points reaches a natural notion of full exploration. We show how the theoretical results transfer to a practical algorithm with safety guarantees and apply it to a simulated inverted pendulum stabilization task.

2 Background and Assumptions

We consider a deterministic, discrete-time dynamic system

with states and control actions and a discrete time index . The true dynamics consist of two parts: is a known, prior model that can be obtained from first principles, while represents a priori unknown model errors. While the model errors are unknown, we can obtain noisy measurements of f(x, u) by driving the system to the state x and taking action u. We want this system to behave in a certain way, e.g., the car driving on the road. To this end, we need to specify a control policy that, given the current state, determines the appropriate control action that drives the system to some goal state, which we set as the origin without loss of generality [4]. We encode the performance requirements of how to drive the system to the origin through a positive cost r(x, u) that is associated with states and actions and has r(0, 0) = 0. The policy aims to minimize the cumulative, discounted costs for each starting state.

The goal is to safely learn about the dynamics from measurements and adapt the policy for performance, without encountering system failures. Specifically, we define the safety constraint on the state divergence that occurs when leaving the region of attraction. This means that adapting the policy is not allowed to decrease the region of attraction and exploratory actions to learn about the dynamics are not allowed to drive the system outside the region of attraction. The region of attraction is not known a priori, but is implicitly defined through the system dynamics and the choice of policy. Thus, the policy not only defines performance as in typical RL, but also determines safety and where we can obtain measurements.

Model assumptions In general, this kind of safe learning is impossible without further assumptions. For example, in a discontinuous system even a slight change in the control policy can lead to drastically different behavior. Moreover, to expand the safe set we need to generalize learned knowledge about the dynamics to (potentially unsafe) states that we have not visited. To this end, we restrict ourselves to the general and practically relevant class of models that are Lipschitz continuous. This is a typical assumption in the control community [4]. Additionally, to ensure that the closed-loop system remains Lipschitz continuous when the control policy is applied, we restrict policies to the rich class of -Lipschitz continuous functions , which also contains certain types of neural networks [30].

Assumption 1 (continuity). The dynamics Lipschitz continuous with respect to the 1-norm. The considered control policies lie in a set of functions that are -Lipschitz continuous with respect to the 1-norm.

To enable safe learning, we require a reliable statistical model. While we commit to GPs for the exploration analysis, for safety any suitable, well-calibrated model is applicable.

Assumption 2 (well-calibrated model). Let denote the posterior mean and covariance matrix functions of the statistical model of the dynamics (1) conditioned on n noisy measurements. With , there exists a such that with probability at least for all

This assumption ensures that we can build confidence intervals on the dynamics that, when scaled by an appropriate constant , cover the true function with high probability. We introduce a specific statistical model that fulfills both assumptions under certain regularity assumptions in Sec. 3.

Lyapunov function To satisfy the specified safety constraints for safe learning, we require a tool to determine whether individual states and actions are safe. In control theory, this safety is defined through the region of attraction, which can be computed for a fixed policy using Lyapunov functions [4]. Lyapunov functions are continuously differentiable functions and v(x) > 0 for all . The key idea behind using Lyapunov functions to show stability of the system (1) is similar to that of gradient descent on strictly quasiconvex functions: if one can show that, given a policy , applying the dynamics f on the state maps it to strictly smaller values on the Lyapunov function (‘going downhill’), then the state eventually converges to the equilibrium point at the origin (minimum). In particular, the assumptions in Theorem 1 below imply that v is strictly quasiconvex within the region of attraction if the dynamics are Lipschitz continuous. As a result, the one step decrease property for all states within a level set guarantees eventual convergence to the origin.

Theorem 1 ([4]). Let v be a Lyapunov function, f Lipschitz continuous dynamics, and a policy. If for all x within the level set , then V(c) is a region of attraction, so that

It is convenient to characterize the region of attraction through a level set of the Lyapunov function, since it replaces the challenging test for convergence with a one-step decrease condition on the Lyapunov function. For the theoretical analysis in this paper, we assume that a Lyapunov function is given to determine the region of attraction. For ease of notation, we also assume all , which ensures that level sets V(c) are connected if c > 0. Since Lyapunov functions are continuously differentiable, they are -Lipschitz continuous over the compact set X.

In general, it is not easy to find suitable Lyapunov functions. However, for physical models, like the prior model h in (1), the energy of the system (e.g., kinetic and potential for mechanical systems) is a good candidate Lyapunov function. Moreover, it has recently been shown that it is possible to compute suitable Lyapunov functions [31, 32]. In our experiments, we exploit the fact that value functions in RL are Lyapunov functions if the costs are strictly positive away from the origin. This follows directly from the definition of the value function, where Thus, we can obtain Lyapunov candidates as a by-product of approximate dynamic programming.

Initial safe policy Lastly, we need to ensure that there exists a safe starting point for the learning process. Thus, we assume that we have an initial policy that renders the origin of the system in (1) asymptotically stable within some small set of states . For example, this policy may be designed using the prior model h in (1), since most models are locally accurate but deteriorate in quality as state magnitude increases. This policy is explicitly not safe to use throughout the state space

3 Theory

In this section, we use these assumptions for safe reinforcement learning. We start by computing the region of attraction for a fixed policy under the statistical model. Next, we optimize the policy in order to expand the region of attraction. Lastly, we show that it is possible to safely learn about the dynamics and, under additional assumptions about the model and the system’s reachability properties, that this approach expands the estimated region of attraction safely. We consider an idealized algorithm that is amenable to analysis, which we convert to a practical variant in Sec. 4. See Fig. 1 for an illustrative run of the algorithm and examples of the sets defined below.

Region of attraction We start by computing the region of attraction for a fixed policy. This is an extension of the method in [28] to discrete-time systems. We want to use the Lyapunov decrease condition in Theorem 1 to guarantee safety for the statistical model of the dynamics. However, the posterior uncertainty in the statistical model of the dynamics means that one step predictions about uncertain too. We account for this by constructing high-probability confidence intervals on v(f(x, u)): From Assumption 2 together with the Lipschitz property of v, we know that v(f(x, u)) is contained in with probability at least our exploration analysis, we need to ensure that safe state-actions cannot become unsafe; that is, an initial set of safe set remains safe (defined later). To this end, we intersect the confidence intervals: , where the set C is initialized to when and otherwise. Note that v(f(x, u)) is contained in with the same probability as in Assumption 2. The upper and lower bounds on are defined as

Given these high-probability confidence intervals, the system is stable according to Theorem 1 if for all . However, it is intractable to verify this condition directly on the continuous domain without additional, restrictive assumptions about the model. Instead, we consider a discretization of the state space into cells, so that holds for all denotes the point in with the smallest distance to x. Given this discretization, we bound the decrease variation on the Lyapunov function for states in and use the Lipschitz continuity to generalize to the continuous state space X.

Theorem 2. Under Assumptions 1 and 2 with be a discretization of . If, for all and for some it holds that holds for all with probability at least is a region of attraction for (1) under policy

The proof is given in Appendix A.1. Theorem 2 states that, given confidence intervals on the statistical model of the dynamics, it is sufficient to check the stricter decrease condition in Theorem 2 on the discretized domain to guarantee the requirements for the region of attraction in the continuous domain in Theorem 1. The bound in Theorem 2 becomes tight as the discretization constant and go to zero. Thus, the discretization constant trades off computation costs for accuracy, while approaches as we obtain more measurement data and the posterior model uncertainty about the dynamics, decreases. The confidence intervals on and the corresponding estimated region of attraction (red line) can be seen in the bottom half of Fig. 1.

Policy optimization So far, we have focused on estimating the region of attraction for a fixed policy. Safety is a property of states under a fixed policy. This means that the policy directly determines

Figure 1: Example application of Algorithm 1. Due to input constraints, the system becomes unstable for large states. We start from an initial, local policy that has a small, safe region of attraction (red lines) in Fig. 1(a). The algorithm selects safe, informative state-action pairs within (top, white shaded), which can be evaluated without leaving the region of attraction (red lines) of the current policy . As we gather more data (blue crosses), the uncertainty in the model decreases (top, background) and we use (3) to update the policy so that it lies within (top, red shaded) and fulfills the Lyapunov decrease condition. The algorithm converges to the largest safe set in Fig. 1(c). It improves the policy without evaluating unsafe state-action pairs and thereby without system failure.

which states are safe. Specifically, to form a region of attraction all states in the discretizaton within a level set of the Lyapunov function need to fulfill the decrease condition in Theorem 2 that depends on the policy choice. The set of all state-action pairs that fulfill this decrease condition is given by

see Fig. 1(c) (top, red shaded). In order to estimate the region of attraction based on this set, we need to commit to a policy. Specifically, we want to pick the policy that leads to the largest possible region of attraction according to Theorem 2. This requires that for each discrete state in the corresponding state-action pair under the policy must be in the set . Thus, we optimize the policy according to

The region of attraction that corresponds to the optimized policy according to (3) is given by , see Fig. 1(b). It is the largest level set of the Lyapunov function for which all state-action pairs that correspond to discrete states within are contained in . This means that these state-action pairs fulfill the requirements of Theorem 2 and is a region of attraction of the true system under policy . The following theorem is thus a direct consequence of Theorem 2 and (3).

Theorem 3. Let be the true region of attraction of (1) under the policy we have with probability at least

Thus, when we optimize the policy subject to the constraint in (3) the estimated region of attraction is always an inner approximation of the true region of attraction. However, solving the optimization problem in (3) is intractable in general. We approximate the policy update step in Sec. 4.

Collecting measurements Given these stability guarantees, it is natural to ask how one might obtain data points in order to improve the model of and thus efficiently increase the region of attraction. This question is difficult to answer in general, since it depends on the property of the statistical model. In particular, for general statistical models it is often not clear whether the confidence intervals contract sufficiently quickly. In the following, we make additional assumptions about the model and reachability within in order to provide exploration guarantees. These assumptions allow us to highlight fundamental requirements for safe data acquisition and that safe exploration is possible.

We assume that the unknown model errors have bounded norm in a reproducing kernel Hilbert space (RKHS, [33]) corresponding to a differentiable kernel . These are a class of well-behaved functions of the form defined through representer points and weights that decay sufficiently fast with i. This assumption ensures that g satisfies the Lipschitz property in Assumption 1, see [28]. Moreover, with can use GP models for the dynamics that fulfill Assumption 2 if the state if fully observable and the measurement noise is -sub-Gaussian (e.g., bounded in is the information capacity. It corresponds to the amount of mutual information that can be obtained about g from nq measurements, a measure of the size of the function class encoded by the model. The information capacity has a sublinear dependence on n for common kernels and upper bounds can be computed efficiently [35]. More details about this model are given in Appendix A.2.

In order to quantify the exploration properties of our algorithm, we consider a discrete action space . We define exploration as the number of state-action pairs in that we can safely learn about without leaving the true region of attraction. Note that despite this discretization, the policy takes values on the continuous domain. Moreover, instead of using the confidence intervals directly as in (3), we consider an algorithm that uses the Lipschitz constants to slowly expand the safe set. We use this in our analysis to quantify the ability to generalize beyond the current safe set. In practice, nearby states are sufficiently correlated under the model to enable generalization using (2).

Suppose we are given a set of state-action pairs about which we can learn safely. Specifically, this means that we have a policy such that, for any state-action pair , if we apply action u in state x and then apply actions according to the policy, the state converges to the origin. Such a set can be constructed using the initial policy from Sec. 2 as . Starting from this set, we want to update the policy to expand the region of attraction according to Theorem 2. To this end, we use the confidence intervals on for states inside to determine state-action pairs that fulfill the decrease condition. We thus redefine for the exploration analysis to

This formulation is equivalent to (2), except that it uses the Lipschitz constant to generalize safety. Given , we can again find a region of attraction by committing to a policy according to (3). In order to expand this region of attraction effectively we need to decrease the posterior model uncertainty about the dynamics of the GP by collecting measurements. However, to ensure safety as outlined in Sec. 2, we are not only restricted to states within , but also need to ensure that the state after taking an action is safe; that is, the dynamics map the state back into the region of attraction . We again use the Lipschitz constant in order to determine this set,

The set contains state-action pairs that we can safely evaluate under the current policy leaving the region of attraction, see Fig. 1 (top, white shaded).

What remains is to define a strategy for collecting data points within to effectively decrease model uncertainty. We specifically focus on the high-level requirements for any exploration scheme without committing to a specific method. In practice, any (model-based) exploration strategy that aims to decrease model uncertainty by driving the system to specific states may be used. Safety can be ensured by picking actions according to whenever the exploration strategy reaches the boundary of the safe region ; that is, when . This way, we can use as a backup policy for exploration.

The high-level goal of the exploration strategy is to shrink the confidence intervals at state-action pairs in order to expand the safe region. Specifically, the exploration strategy should aim to visit state-action pairs in at which we are the most uncertain about the dynamics; that is, where the confidence interval is the largest:

As we keep collecting data points according to (6), we decrease the uncertainty about the dynamics for different actions throughout the region of attraction and adapt the policy, until eventually we

have gathered enough information in order to expand it. While (6) implicitly assumes that any state within can be reached by the exploration policy, it achieves the high-level goal of any exploration algorithm that aims to reduce model uncertainty. In practice, any safe exploration scheme is limited by unreachable parts of the state space.

We compare the active learning scheme in (6) to an oracle baseline that starts from the same initial safe set accuracy within the safe set. The oracle also uses knowledge about the Lipschitz constants and the optimal policy in at each iteration. We denote the set that this baseline manages to determine as safe with and provide a detailed definition in Appendix A.3.

Theorem 4. Assume -sub-Gaussian measurement noise and that the model error in (1) has RKHS norm smaller than . Under the assumptions of Theorem 2, with , and with measurements collected according to (6), let be the smallest positive integer so that where . Let be the true region of attraction of (1) under a policy . For any , and , the following holds jointly with probability at least

(i) V

Theorem 4 states that, when selecting data points according to (6), the estimated region of attraction is (i) contained in the true region of attraction under the current policy and (ii) selected data points do not cause the system to leave the region of attraction. This means that any exploration method that considers the safety constraint (5) is able to safely learn about the system without leaving the region of attraction. The last part of Theorem 4, (iii), states that after a finite number of data points we achieve at least the exploration performance of the oracle baseline, while we do not classify unsafe state-action pairs as safe. This means that the algorithm explores the largest region of attraction possible for a given Lyapunov function with residual uncertaint about smaller than . Details of the comparison baseline are given in the appendix. In practice, this means that any exploration method that manages to reduce the maximal uncertainty about the dynamics within able to expand the region of attraction.

An example run of repeatedly evaluating (6) for a one-dimensional state-space is shown in Fig. 1. It can be seen that, by only selecting data points within the current estimate of the region of attraction, the algorithm can efficiently optimize the policy and expand the safe region over time.

4 Practical Implementation and Experiments

In the previous section, we have given strong theoretical results on safety and exploration for an idealized algorithm that can solve (3). In this section, we provide a practical variant of the theoretical algorithm in the previous section. In particular, while we retain safety guarantees, we sacrifice exploration guarantees to obtain a more practical algorithm. This is summarized in Algorithm 1.

The policy optimization problem in (3) is intractable to solve and only considers safety, rather than a performance metric. We propose to use an approximate policy update that that maximizes approximate performance while providing stability guarantees. It proceeds by optimizing the policy first and then computes the region of attraction for the new, fixed policy. This does not impact safety, since data is still only collected inside the region of attraction. Moreover, should the optimization fail and the region of attraction decrease, one can always revert to the previous policy, which is guaranteed to be safe.

Figure 2: Optimization results for an inverted pendulum. Fig. 2(a) shows the initial safe set (yellow) under the policy , while the green region represents the estimated region of attraction under the optimized neural network policy. It is contained within the true region of attraction (white). Fig. 2(b) shows the improved performance of the safely learned policy over the policy for the prior model.

In our experiments, we use approximate dynamic programming [36] to capture the performance of the policy. Given a policy with parameters , we compute an estimate of the cost-to-go mean dynamics based on the cost . At each state, is the sum of -discounted rewards encountered when following the policy . The goal is to adapt the parameters of the policy for minimum cost as measured by , while ensuring that the safety constraint on the worst-case decrease on the Lyapunov function in Theorem 2 is not violated. A Lagrangian formulation to this constrained optimization problem is

where the first term measures long-term cost to go and is a Lagrange multiplier for the safety constraint from Theorem 2. In our experiments, we use the value function as a Lyapunov function candidate, . In this case, (7) corresponds to an high-probability upper bound on the cost-to-go given the uncertainty in the dynamics. This is similar to worst-case performance formulations found in robust MDPs [9, 10], which consider worst-case value functions given parametric uncertainty in MDP transition model. Moreover, since depends on the Lipschitz constant of the policy, this simultaneously serves as a regularizer on the parameters

To verify safety, we use the GP confidence intervals and directly, as in (2). We also use confidence to compute for the active learning scheme, see Algorithm 1, Line 5. In practice, we do not need to compute the entire set to solve (3), but can use a global optimization method or even a random sampling scheme within to find suitable state-actions. Moreover, measurements for actions that are far away from the current policy are unlikely to expand , see Fig. 1(c). As we optimize (7) via gradient descent, the policy changes only locally. Thus, we can achieve better data-efficiency by restricting the exploratory actions u with to be close to for some constant

Computing the region of attraction by verifying the stability condition on a discretized domain suffers from the curse of dimensionality. However, it is not necessary to update policies in real time. In particular, since any policy that is returned by the algorithm is provably safe within some level set, any of these policies can be used safely for an arbitrary number of time steps. To scale this method to higher-dimensional system, one would have to consider an adaptive discretization for the verification as in [27].

Experiments A Python implementation of Algorithm 1 and the experiments based on TensorFlow [37] and GPflow [38] is available at https://github.com/befelix/safe_learning.

We verify our approach on an inverted pendulum benchmark problem. The true, continuous-time dynamics are given by , where is the angle, m the mass, g the gravitational constant, and u the torque applied to the pendulum. The control torque is limited, so that the pendulum necessarily falls down beyond a certain angle. We use a GP model for the discrete-time dynamics, where the mean dynamics are given by a linearized and discretized model of the true dynamics that considers a wrong, lower mass and neglects friction. As a result, the optimal policy for the mean dynamics does not perform well and has a small region of attraction as it underactuates the system. We use a combination of linear and Matérn kernels in order to capture the model errors that result from parameter and integration errors.

For the policy, we use a neural network with two hidden layers and 32 neurons with ReLU activations each. We compute a conservative estimate of the Lipschitz constant as in [30]. We use standard approximate dynamic programming with a quadratic, normalized cost , where Q and R are positive-definite, to compute the cost-to-go . Specifically, we use a piecewiselinear triangulation of the state-space as to approximate , see [39]. This allows us to quickly verify the assumptions that we made about the Lyapunov function in Sec. 2 using a graph search. In practice, one may use other function approximators. We optimize the policy via stochastic gradient descent on (7).

The theoretical confidence intervals for the GP model are conservative. To enable more data-efficient learning, we fix . This corresponds to a high-probability decrease condition per-state, rather than jointly over the state space. Moreover, we use local Lipschitz constants of the Lyapunov function rather than the global one. While this does not affect guarantees, it greatly speeds up exploration.

For the initial policy, we use approximate dynamic programming to compute the optimal policy for the prior mean dynamics. This policy is unstable for large deviations from the initial state and has poor performance, as shown in Fig. 2(b). Under this initial, suboptimal policy, the system is stable within a small region of the state-space Fig. 2(a). Starting from this initial safe set, the algorithm proceeds to collect safe data points and improve the policy. As the uncertainty about the dynamics decreases, the policy improves and the estimated region of attraction increases. The region of attraction after 50 data points is shown in Fig. 2(a). The resulting set is contained within the true safe region of the optimized policy . At the same time, the control performance improves drastically relative to the initial policy, as can be seen in Fig. 2(b). Overall, the approach enables safe learning about dynamic systems, as all data points collected during learning are safely collected under the current policy.

5 Conclusion

We have shown how classical reinforcement learning can be combined with safety constraints in terms of stability. Specifically, we showed how to safely optimize policies and give stability certificates based on statistical models of the dynamics. Moreover, we provided theoretical safety and exploration guarantees for an algorithm that can drive the system to desired state-action pairs during learning. We believe that our results present an important first step towards safe reinforcement learning algorithms that are applicable to real-world problems.

Acknowledgments

This research was supported by SNSF grant 200020_159557, the Max Planck ETH Center for Learning Systems, NSERC grant RGPIN-2014-04634, and the Ontario Early Researcher Award.

References

[1] Richard S. Sutton and Andrew G. Barto. Reinforcement learning: an introduction. MIT press, 1998.

[2] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A. Rusu, Joel Veness, Marc G. Bellemare, Alex Graves, Martin Riedmiller, Andreas K. Fidjeland, Georg Ostrovski, Stig Petersen, Charles Beattie, Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan Kumaran, Daan Wierstra, Shane Legg, and Demis Hassabis. Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015.

[3] Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman, and Dan Mané. Concrete problems in AI safety. arXiv:1606.06565 [cs], 2016.

[4] Hassan K. Khalil and J. W. Grizzle. Nonlinear systems, volume 3. Prentice Hall, 1996.

[5] Martin Pecka and Tomas Svoboda. Safe exploration techniques for reinforcement learning – an overview. In Modelling and Simulation for Autonomous Systems, pages 357–375. Springer, 2014.

[6] Javier García and Fernando Fernández. A comprehensive survey on safe reinforcement learning. Journal of Machine Learning Research (JMLR), 16:1437–1480, 2015.

[7] Stefano P. Coraluppi and Steven I. Marcus. Risk-sensitive and minimax control of discrete-time, finite-state Markov decision processes. Automatica, 35(2):301–309, 1999.

[8] Peter Geibel and Fritz Wysotzki. Risk-sensitive reinforcement learning applied to control under constraints. J. Artif. Intell. Res.(JAIR), 24:81–108, 2005.

[9] Aviv Tamar, Shie Mannor, and Huan Xu. Scaling Up Robust MDPs by Reinforcement Learning. In Proc. of the International Conference on Machine Learning (ICML), 2014.

[10] Wolfram Wiesemann, Daniel Kuhn, and Berç Rustem. Robust Markov Decision Processes. Mathematics of Operations Research, 38(1):153–183, 2012.

[11] Teodor Mihai Moldovan and Pieter Abbeel. Safe exploration in Markov decision processes. In Proc. of the International Conference on Machine Learning (ICML), pages 1711–1718, 2012.

[12] Matteo Turchetta, Felix Berkenkamp, and Andreas Krause. Safe exploration in finite markov decision processes with gaussian processes. pages 4305–4313, 2016.

[13] Jan Peters and Stefan Schaal. Policy gradient methods for robotics. In Proc. of the IEEE/RSJ International Conference on Intelligent Robots and Systems, pages 2219–2225, 2006.

[14] Joshua Achiam, David Held, Aviv Tamar, and Pieter Abbeel. Constrained policy optimization. In Proc. of the International Conference on Machine Learning (ICML), 2017.

[15] Jonas Mockus. Bayesian approach to global optimization, volume 37 of Mathematics and Its Applications. Springer, Dordrecht, 1989.

[16] Carl Edward Rasmussen and Christopher K.I Williams. Gaussian processes for machine learning. MIT Press, Cambridge MA, 2006.

[17] Jens Schreiter, Duy Nguyen-Tuong, Mona Eberts, Bastian Bischoff, Heiner Markert, and Marc Toussaint. Safe exploration for active learning with Gaussian processes. In Machine Learning and Knowledge Discovery in Databases, number 9286, pages 133–149. Springer International Publishing, 2015.

[18] Yanan Sui, Alkis Gotovos, Joel W. Burdick, and Andreas Krause. Safe exploration for optimization with Gaussian processes. In Proc. of the International Conference on Machine Learning (ICML), pages 997–1005, 2015.

[19] Felix Berkenkamp, Angela P. Schoellig, and Andreas Krause. Safe controller optimization for quadrotors with Gaussian processes. In Proc. of the IEEE International Conference on Robotics and Automation (ICRA), pages 493–496, 2016.

[20] J. Garcia and F. Fernandez. Safe exploration of state and action spaces in reinforcement learning. Journal of Artificial Intelligence Research, pages 515–564, 2012.

[21] Alexander Hans, Daniel Schneegaß, Anton Maximilian Schäfer, and Steffen Udluft. Safe exploration for reinforcement learning. In Proc. of the European Symposium on Artificial Neural Networks (ESANN), pages 143–148, 2008.

[22] Theodore J. Perkins and Andrew G. Barto. Lyapunov design for safe reinforcement learning. The Journal of Machine Learning Research, 3:803–832, 2003.

[23] Dorsa Sadigh and Ashish Kapoor. Safe control under uncertainty with Probabilistic Signal Temporal Logic. In Proc. of Robotics: Science and Systems, 2016.

[24] Chris J. Ostafew, Angela P. Schoellig, and Timothy D. Barfoot. Robust constrained learning-based NMPC enabling reliable mobile robot path tracking. The International Journal of Robotics Research (IJRR), 35(13):1547–1536, 2016.

[25] Anil Aswani, Humberto Gonzalez, S. Shankar Sastry, and Claire Tomlin. Provably safe and robust learning-based model predictive control. Automatica, 49(5):1216–1226, 2013.

[26] Anayo K. Akametalu, Shahab Kaynama, Jaime F. Fisac, Melanie N. Zeilinger, Jeremy H. Gillula, and Claire J. Tomlin. Reachability-based safe learning with Gaussian processes. In Proc. of the IEEE Conference on Decision and Control (CDC), pages 1424–1431, 2014.

[27] Ruxandra Bobiti and Mircea Lazar. A sampling approach to finding Lyapunov functions for nonlinear discrete-time systems. In Proc. of the European Control Conference (ECC), pages 561–566, 2016.

[28] Felix Berkenkamp, Riccardo Moriconi, Angela P. Schoellig, and Andreas Krause. Safe learning of regions of attraction in nonlinear systems with Gaussian processes. In Proc. of the Conference on Decision and Control (CDC), pages 4661–4666, 2016.

[29] Julia Vinogradska, Bastian Bischoff, Duy Nguyen-Tuong, Henner Schmidt, Anne Romer, and Jan Peters. Stability of controllers for Gaussian process forward models. In Proceedings of the International Conference on Machine Learning (ICML), pages 545–554, 2016.

[30] Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. In Proc. of the International Conference on Learning Representations (ICLR), 2014.

[31] Huijuan Li and Lars Grüne. Computation of local ISS Lyapunov functions for discrete-time systems via linear programming. Journal of Mathematical Analysis and Applications, 438(2):701– 719, 2016.

[32] Peter Giesl and Sigurdur Hafstein. Review on computational methods for Lyapunov functions. Discrete and Continuous Dynamical Systems, Series B, 20(8):2291–2337, 2015.

[33] Bernhard Schölkopf. Learning with kernels: support vector machines, regularization, optimization, and beyond. Adaptive computation and machine learning. MIT Press, Cambridge, Mass, 2002.

[34] Sayak Ray Chowdhury and Aditya Gopalan. On kernelized multi-armed bandits. arXiv preprint arXiv:1704.00445, 2017.

[35] Niranjan Srinivas, Andreas Krause, Sham M. Kakade, and Matthias Seeger. Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design. IEEE Transactions on Information Theory, 58(5):3250–3265, 2012.

[36] Warren B. Powell. Approximate dynamic programming: solving the curses of dimensionality. John Wiley & Sons, 2007.

[37] Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mane, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viegas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems. arXiv:1603.04467 [cs], 2016.

[38] Alexander G. de G. Matthews, Mark van der Wilk, Tom Nickson, Keisuke Fujii, Alexis Boukouvalas, Pablo León-Villagrá, Zoubin Ghahramani, and James Hensman. GPflow: a Gaussian process library using TensorFlow. Journal of Machine Learning Research, 18(40):1–6, 2017.

[39] Scott Davies. Multidimensional triangulation and interpolation for reinforcement learning. In Proc. of the Conference on Neural Information Processing Systems (NIPS), pages 1005–1011, 1996.

[40] Andreas Christmann and Ingo Steinwart. Support Vector Machines. Information Science and Statistics. Springer, New York, NY, 2008.

A Proofs

A.1 Stability verification

Lemma 1. Using Assumptions 1 and 2, let be a discretization of X such that for all . Then, for all , we have with probability at least

Proof. Let . Then we have that

where the last three inequalities follow from Assumptions 1 and 2 to last inequality follows from Lemma 3. The result holds with probability at least . By definition of the discretization and the policy class we have on each grid cell that

where the equality in the first step follows from the definition of the 1-norm. Plugging this into the previous bound yields

which completes the proof.

Lemma 2. holds for all with probability at least

Proof. The proof is analogous to Lemma 1 and follows from Assumptions 1 and 2.

Corollary 1. holds for all , and n > 0 with probability at least

Proof. Direct consequence of the fact that Lemma 2 holds jointly for all n > 0 with probability at least

Lemma 1 show that the decrease on the Lyapunov function on the discrete grid is close to that on the continuous domain X. Given these confidence intervals, we can now establish the region of attraction using Theorem 1:

Theorem 2. Under Assumptions 1 and 2 with be a discretization of . If, for all and for some it holds that holds for all with probability at least is a region of attraction for (1) under policy

Proof. Using Lemma 1 it holds that for all continuous states with probability at least , since all discrete states fulfill Theorem 2. Thus we can use Theorem 1 to conclude that V(c) is a region of attraction for (1).

Theorem 3. Let be the true region of attraction of (1) under the policy we have with probability at least

Proof. Following the definition of in (2), it is clear from the constraint in the optimization problem (3) that for all it holds that or, equivalently that , see (2). The result then follows from Theorem 2.

Note that the initialization of the confidence intervals ensures that the decrease condition is always fulfilled for the initial policy.

A.2 Gaussian process model

One particular assumption that satisfies both the Lipschitz continuity and allows us to use GPs as a model of the dynamics is that the model errors g(x, u) live in some reproducing kernel Hilbert space (RKHS, [40]) corresponding to a differentiable kernel k and have RKHS norm smaller than In our theoretical analysis, we use this assumption to prove exploration guarantees.

A is a distribution over well-behaved, smooth functions mark 1 for the vector-case, ) that is parameterized by a mean function and a covariance function (kernel) k, which encodes assumptions about the functions [16]. In our case, the mean is given by the prior model h, while the kernel corresponds to the one in the RKHS. Given noisy measurements of the dynamics, with z = (x, u) at locations , corrupted by independent, Gaussian noise (we relax the Gaussian noise assumption in our analysis), the posterior is a GP distribution again with mean, , covariance , and variance . The vector contains observed, noisy deviations from the mean, contains the covariances between the test input z and the data points in has entries is the identity matrix.

Remark 1. In the case of multiple output dimensions (q > 1), we consider a function with one-dimensional output , with the output dimension indexed by I = {1, . . . , q}. This allows us to use the standard definitions of the RKHS norm and GP model. In this case, we define the GP posterior distribution as and , where the unusual definition of the standard deviation is used in Lemma 3.

Given the previous assumptions, it follows from [28, Lemma 2] that the dynamics in (1) are Lipschitz continuous with Lipschitz constant depends on the properties (smoothness) of the kernel.

Moreover, we can construct high-probability confidence intervals on the dynamics in (1) that ful-fill Assumption 2 using the GP model.

Lemma 3. ([35, Theorem 6]) Assume -sub-Gaussian noise and that the model error in (1) has RKHS norm bounded by . Choose . Then, with probability at least , for all , and it holds that

Proof. From [34, Theorem 2] it follows that holds with probability at least for all . Following Remark 1, we can model the multi-output function as a single-output function over an extended parameter space. Thus the result directly transfers by definition of the one norm and our definition of for multiple output dimensions in Remark 1. Note that by iteration n we have obtained nq measurements in the information capacity

That is, the true dynamics are contained within the GP posterior confidence intervals with high probability. The bound depends on the information capacity,

which is the maximum mutual information that could be gained about the dynamics f from samples. The information capacity has a sublinear dependence on for many commonly used kernels such as the linear, squared exponential, and Matérn kernels and it can be efficiently and accurately approximated [35]. Note that we explicitly account for the q measurements that we get for each of the q states in (9).

Remark 2. The GP model assumes Gaussian noise, while Lemma 3 considers -sub-Gaussian noise. Moreover, we consider functions with bounded RKHS norm, rather than samples from a GP. Lemma 3 thus states that even though we make different assumptions than the model, the confidence intervals are conservative enough to capture the true function with high probability.

A.3 Safe exploration

Remark 3. In the following we assume that are defined as in (4) and (5).

Baseline As a baseline, we consider a class of algorithms that know about the Lipschitz continuity properties of v, f, and . In addition, we can learn about v(f(x, u)) up to some arbitrary statistical accuracy by visiting state x and obtaining a measurement for the next state after applying action u, but face the safety restrictions defined in Sec. 2. Suppose we are given a set S of state-action pairs about which we can learn safely. Specifically, this means that we have a policy such that, for any state-action pair (x, u) in S, if we apply action u in state x and then apply actions according to the policy, the state converges to the origin. Such a set can be constructed using the initial policy from Sec. 2 as

The goal of the algorithm is to expand this set of states that we can learn about safely. Thus, we need to estimate the region of attraction by certifying that state-action pairs achieve the condition in Theorem 2 by learning about state-action pairs in S. We can then generalize the gained knowledge to unseen states by exploiting the Lipschitz continuity,

where we use that we can learn accuracy within S. We specifically include this set, to allow for initial policies that are safe, but does not meet the strict decrease requirements of Theorem 2. Given that all states in fulfill the requirements of Theorem 2, we can estimate the corresponding region of attraction by committing to a control policy and estimating the largest safe level set of the Lyapunov function. With , the operator

encodes this operation. It optimizes over safe policies to determine the largest level set, such that all state-action pairs at discrete states x in the level set fulfill the decrease condition of Theorem 2. As a result, is an estimate of the largest region of attraction given the -accurate knowledge about state-action pairs in S. Based on this increased region of attraction, there are more states that we can safely learn about. Specifically, we again use the Lipschitz constant and statistical accuracy to determine all states that map back into the region of attraction,

where . Thus, contains state-action pairs that we can visit to learn about the system. Repeatedly applying this operator leads the largest set of state-action pairs that any safe algorithm with the same knowledge and restricted to policies in could hope to reach.

Specifically, let and . Then is the set of all state-action pars on the discrete grid that any algorithm could hope to classify as safe without leaving this safe set. Moreover, is the largest corresponding region of attraction that any algorithm can classify as safe for the given Lyapunov function.

Proofs In the following we implicitly assume that the assumptions of Lemma 3 hold and that defined as specified within Lemma 3. Moreover, for ease of notation we assume that is a level set of the Lyapunov function

Proof. Directly by definition, compare (3) and (11).

Remark 4. Lemma 4 allows us to write the proofs entirely in terms of operators, rather than having to deal with explicit policies. In the following and in Algorithm 2 we replace to Lemma 4. This moves the definitions closer to the baseline and makes for an easier comparison.

We roughly follow the proof strategy in [18], but deal with the additional complexity of having safe sets that are defined in a more difficult way (indirectly through the policy). This is non-trivial and the safe sets are carefully designed in order to ensure that the algorithm works for general nonlinear systems.

We start by listing some fundamental properties of the sets that we defined below. Lemma 5. It holds for all

(vii) S

(viii)

Proof. (i) and (ii) follow directly form the definition of

(iv) Let . Then there exists such that we have that as well and thus

(vii) Let

(viii) By definition of we have for all that . Now we have

which in turn implies . The last inequality follows from Lemma 5 (iii) and (vii) together with the induction assumption that

Given these set properties, we first consider what happens if the safe set does not expand after collecting data points. We use these results later to conclude that the safe set must either expand or that the maximum level set is reached. We denote by

the data point the is sampled according to (6). Lemma 6. For any , then for any , it holds that

Proof. We modify the results for q = 1 by [35] to this lemma, but use the different definition for from [34]. Even though the goal of [35, Lemma 5.4] is different from ours, we can still apply their reasoning to bound the amplitude of the confidence interval of the dynamics. In particular, in [35, Lemma 5.4], we have according to Lemma 3. Then

where . The result then follows analogously to [35, Lemma 5.4] by noting that

according to the definition of in this paper and using the Cauchy-Schwarz inequality.

The previous result allows us to bound the width of the confidence intervals: Corollary 2. For any , if , then for any n such that , it holds that

Proof. Direct consequence of Lemma 6 together with the definition of C and Q.

Corollary 3. For any as defined in Lemma 6, let be the smallest integer satisfying

, then, for any it holds that

Proof. The result trivially follows from substituting in the bound in Corollary 2.

Lemma 7. For any

Proof. As in [18, Lemma 6]. Assume, to the contrary, that . By defini-tion , therefore . Iteratively applying to both sides, we get in the limit . But then, by Lemma 5,(vi) and (ix), we get

which contradicts the assumption that

Lemma 8. For any , if , then the following holds with probability at least

Proof. By Lemma 7, we have that . By definition, this means that there exist

Now we assume, to the contrary, that (the safe set cannot decrease due to Lemma 5 (ix)). This implies that and . Due to Corollary 2, it follows that

Thus, to conclude that according to (5), we need to show that . To this end, we use Lemma 5 (iii) and show that . Consider , we know that there exists a

where the second inequality follows from Corollary 2. This implies that and thus . This, in turn, implies that , which is a contradiction.

Lemma 9. For any , the following holds with probability at least

Proof. Proof by induction. For the base case, by definition.

For the induction step, assume that for some . Let . Then, by definition,

which, by Corollary 1, implies that

Now since by the induction hypothesis, in order to conclude that we need to show that

Let , then there exist

which, by Corollary 1, implies that

which means that since and therefore holds by the induction hypothesis. We use (iii) to conclude that , which concludes the proof.

Lemma 10. Let be the smallest integer, such that . Then, there exists such that holds with probability

Proof. By contradiction. Assume, to the contrary, that for all . From Lemma 5 (ix) we know that . Since is increasing in n, we have that . Thus, we must have

so that for any , it holds that . In particular, for

then there exists a

Proof. A direct consequence of Lemma 10 and Corollary 3.

A.4 Safety and policy adaptation

In the following, we denote the true region of attraction of (1) under a policy Lemma 11.

Proof. By definition, we have for all that the exists

where the first inequality follows from Corollary 1 and the second one by Lipschitz continuity, see Lemma 1.

By definition of in (11), it follows that for all we have that Moreover, is a level set of the Lyapunov function by definition. Thus the result follows from Theorem 2.

Lemma 12.

Proof. This holds for by definition. For , by defition, we have for all there exists an

where the first inequality follows from Corollary 1 and the second one by Lipschitz continuity, see Lemma 1. Since by Lemma 11, we have that

Theorem 4. Assume -sub-Gaussian measurement noise and that the model error in (1) has RKHS norm smaller than . Under the assumptions of Theorem 2, with , and with measurements collected according to (6), let be the smallest positive integer so that where . Let be the true region of attraction of (1) under a policy . For any , and , the following holds jointly with probability at least

(i) V

Proof. See Lemmas 11 and 12 for (i) and (ii), respectively. Part (iii) is a direct consequence of Corollary 4 and Lemma 9.

designed for accessibility and to further open science