Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3512290.3528818acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Are evolutionary algorithms safe optimizers?

Published: 08 July 2022 Publication History

Abstract

We consider a type of constrained optimization problem, where the violation of a constraint leads to an irrevocable loss, such as breakage of a valuable experimental resource/platform or loss of human life. Such problems are referred to as safe optimization problems (SafeOPs). While SafeOPs have received attention in the machine learning community in recent years, there was little interest in the evolutionary computation (EC) community despite some early attempts between 2009 and 2011. Moreover, there is a lack of acceptable guidelines on how to benchmark different algorithms for SafeOPs, an area where the EC community has significant experience in. Driven by the need for more eficient algorithms and benchmark guidelines for SafeOPs, the objective of this paper is to reignite the interest of the EC community in this problem class. To achieve this we (i) provide a formal definition of SafeOPs and contrast it to other types of optimization problems that the EC community is familiar with, (ii) investigate the impact of key SafeOP parameters on the performance of selected safe optimization algorithms, (iii) benchmark EC against state-of-the-art safe optimization algorithms from the machine learning community, and (iv) provide an open-source Python framework to replicate and extend our work.

Supplemental Material

PDF File
Supplemental material.

References

[1]
Richard Allmendinger. 2012. Tuning Evolutionary Search for Closed-Loop Optimization. Ph.D. Dissertation. The University of Manchester, UK.
[2]
Richard Allmendinger and Joshua D. Knowles. 2011. Evolutionary Search in Lethal Environments. In International Conference on Evolutionary Computation Theory and Applications. SciTePress, 63--72.
[3]
François Bachoc, Céline Helbert, and Victor Picheny. 2020. Gaussian process optimization with failures: Classification and convergence proof. Journal of Global Optimization (2020).
[4]
Thomas Baeck, DB Fogel, and Z Michalewicz. 2000. Evolutionary Computation 1: Basic Algorithms and Operators. Vol. 1. CRC Press.
[5]
Felix Berkenkamp, Andreas Krause, and Angela P. Schoellig. 2016. Bayesian Optimization with Safety Constraints: Safe and Automatic Parameter Tuning in Robotics. Arxiv preprint arXiv:1602.04450 (2016). http://arxiv.org/abs/1602.04450
[6]
Felix Berkenkamp, Andreas Krause, and Angela P. Schoellig. 2021. Bayesian optimization with safety constraints: safe and automatic parameter tuning in robotics. Machine Learning (June 2021).
[7]
Felix Berkenkamp, Angela P. Schoellig, and Andreas Krause. 2016. Safe controller optimization for quadrotors with Gaussian processes. In 2016 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 491--496.
[8]
Erdem Bıyık, Jonathan Margoliash, Shahrouz Ryan Alimo, and Dorsa Sadigh. 2019. Efficient and Safe Exploration in Deterministic Markov Decision Processes with Unknown Transition Models. In 2019 American Control Conference (ACC). IEEE, 1792--1799.
[9]
Stefano De Blasi and Alexander Gepperth. 2020. SASBO: Self-Adapting Safe Bayesian Optimization. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA). 220--225.
[10]
Carlos A Coello Coello. 2002. Theoretical and numerical constraint-handling techniques used with evolutionary algorithms: a survey of the state of the art. Computer methods in applied mechanics and engineering 191, 11-12 (2002), 1245--1287.
[11]
Rikky R. P. R. Duivenvoorden, Felix Berkenkamp, Nicolas Carion, Andreas Krause, and Angela P. Schoellig. 2017. Constrained Bayesian Optimization with Particle Swarms for Safe Adaptive Controller Tuning. IFAC-PapersOnLine 50, 1 (2017), 11800--11807.
[12]
Nikolaus Hansen, Steffen Finck, Raymond Ros, and Anne Auger. 2009. Real-Parameter Black-Box Optimization Benchmarking 2009: Noiseless Functions Definitions. Research Report RR-6829. INRIA. https://hal.inria.fr/inria-00362633
[13]
H. Kaji, Kokolo Ikeda, and Hajime Kita. 2009. Avoidance of constraint violation for experiment-based evolutionary multi-objective optimization. In Proceedings of the 2009 Congress on Evolutionary Computation (CEC 2009). IEEE Press, Piscataway, NJ, 2756--2763.
[14]
Youngmin Kim, Richard Allmendinger, and Manuel López-Ibáñez. 2021. Safe Learning and Optimization Techniques: Towards a Survey of the State of the Art. In Trustworthy AI - Integrating Learning, Optimization and Reasoning. TAILOR 2020, Fredrik Heintz, Michela Milano, and Barry O'Sullivan (Eds.). Lecture Notes in Computer Science, Vol. 12641. Springer, Cham, Switzerland, 123--139.
[15]
Zbigniew Michalewicz. 1995. A Survey of Constraint Handling Techniques in Evolutionary Computation Methods. In Evolutionary Programming.
[16]
Matthieu Sacher, Régis Duvigneau, Olivier Le Maitre, Mathieu Durand, Elisa Berrini, Frédéric Hauville, and Jacques-André Astolfi. 2018. A classification approach to eficient global optimization in presence of non-computable domains. Structural and Multidisciplinary Optimization 58, 4 (2018), 1537--1557.
[17]
Mark Schillinger, Benjamin Hartmann, Patric Skalecki, Mona Meister, Duy Nguyen-Tuong, and Oliver Nelles. 2017. Safe active learning and safe Bayesian optimization for tuning a PI-controller. IFAC-PapersOnLine 50, 1 (2017), 5967--5972.
[18]
Niranjan Srinivas, Andreas Krause, Sham Kakade, and Matthias Seeger. 2010. Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design. In Proceedings of the 27th International Conference on International Conference on Machine Learning (Haifa, Israel) (ICML'10). Omnipress, Madison, WI, USA, 1015--1022.
[19]
Yanan Sui, Alkis Gotovos, Joel W. Burdick, and Andreas Krause. 2015. Safe Exploration for Optimization with Gaussian Processes. In Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, Francis Bach and David Blei (Eds.), Vol. 37. 997--1005.
[20]
Yanan Sui, Vincent Zhuang, Joel W. Burdick, and Yisong Yue. 2018. Stagewise Safe Bayesian Optimization with Gaussian Processes. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018 (Proceedings of Machine Learning Research, Vol. 80), Jennifer G. Dy and Andreas Krause (Eds.). PMLR, 4788--4796.
[21]
D. Zubanovic, A. Hidic, A. Hajdarevic, N. Nosovic, and S. Konjicija. 2014. Performance analysis of parallel master-slave Evolutionary strategies (μ,λ) model python implementation for CPU and GPGPU. In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 1609--1613.

Cited By

View all
  • (2024)CMA-ES for Safe OptimizationProceedings of the Genetic and Evolutionary Computation Conference10.1145/3638529.3654193(722-730)Online publication date: 14-Jul-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '22: Proceedings of the Genetic and Evolutionary Computation Conference
July 2022
1472 pages
ISBN:9781450392372
DOI:10.1145/3512290
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 July 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bayesian optimization
  2. benchmarking
  3. constrained optimization
  4. safe optimization
  5. safety constraints

Qualifiers

  • Research-article

Data Availability

Funding Sources

  • Spanish Ministry of Science and Innovation (MICINN)

Conference

GECCO '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,532 of 4,029 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)CMA-ES for Safe OptimizationProceedings of the Genetic and Evolutionary Computation Conference10.1145/3638529.3654193(722-730)Online publication date: 14-Jul-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media