# scalable_kernel_inverse_optimization__f6d87566.pdf Scalable Kernel Inverse Optimization Youyuan Long Delft Center for Systems and Control Delft University of Technology The Netherlands longyouyuan432@gmail.com Tolga Ok Delft Center for Systems and Control Delft University of Technology The Netherlands T.Ok@tudelft.nl Pedro Zattoni Scroccaro Delft Center for Systems and Control Delft University of Technology The Netherlands P.Zattoni Scroccaro@tudelft.nl Peyman Mohajerin Esfahani Delft Center for Systems and Control Delft University of Technology The Netherlands P.Mohajerin Esfahani@tudelft.nl Inverse Optimization (IO) is a framework for learning the unknown objective function of an expert decision-maker from a past dataset. In this paper, we extend the hypothesis class of IO objective functions to a reproducing kernel Hilbert space (RKHS), thereby enhancing feature representation to an infinite-dimensional space. We demonstrate that a variant of the representer theorem holds for a specific training loss, allowing the reformulation of the problem as a finite-dimensional convex optimization program. To address scalability issues commonly associated with kernel methods, we propose the Sequential Selection Optimization (SSO) algorithm to efficiently train the proposed Kernel Inverse Optimization (KIO) model. Finally, we validate the generalization capabilities of the proposed KIO model and the effectiveness of the SSO algorithm through learning-from-demonstration tasks on the Mu Jo Co benchmark. 1 Introduction Inverse Optimization (IO) is distinct from traditional optimization problems, where we typically seek the optimal decision variables by optimizing an objective function over a set of constraints. In contrast, inverse optimization works in reverse by inferring the optimization objective given the optimal solution. The inherent assumption in IO is that an agent generates its decision by solving an optimization problem. The assumed optimization problem is called the Forward Optimization Problem (FOP), which is parametric in the exogenous signal ˆs with the corresponding optimal solution ˆu. Therefore, IO aims to deduce the objective function of the FOP from a dataset of exogenous signal and decision pairs, {(ˆsi, ˆui)}N i=1. In this work, we assume the constraints are known a priori. Consequently, we can leverage the FOP derived from the expert s dataset by solving it to mimic the expert s behavior when encountering new exogenous signals. IO has garnered widespread attention within several fields, giving rise to numerous studies encompassing both theoretical and applied research. Application domains include vehicle routing [11, 31, 41], transportation system modeling [29, 8], portfolio optimization [25, 39, 23], power systems [9, 16, 32], electric vehicle charging problems [17], network design [15], healthcare problems [5], as well as controller design [2, 14]. For a more detailed discussion on different applications of IO, we refer the readers to the recent survey paper [10]. IO can be categorized into classic IO and data-driven IO. In classic IO, only a single signal-decision pair is considered, where the decision is assumed to be the optimal solution of the FOP (i.e., there is 38th Conference on Neural Information Processing Systems (Neur IPS 2024). no noise), and different classes of FOPs have been studied, such as linear conic problems [1, 36, 20]. However, in real-world applications, there are usually many observations of signal-decision pairs, and due to the presence of noise, it is usually unreasonable to assume that all observed decisions are optimal w.r.t a single, true data-generating FOP. Additionally, for complex tasks, the chosen FOP may only approximate the task, not allowing for perfect replication of the observed behavior from the expert. These cases are referred to as data-driven IO problems. In such scenarios, a loss function is usually used to compute the discrepancy between observed data and the decision generated by the learned FOP. Examples of loss functions include the 2-norm distance loss [4], suboptimality loss [25], variational inequality loss [8], KKT loss [21], and augmented suboptimality loss [40]. In data-driven IO, the objective function of the FOP is typically non-linear with respect to an exogenous signal ˆs. Hence, classical methods that learn an FOP based on linear function classes may oversimplify the problem and lead to suboptimal solutions. One effective approach for addressing the expressibility issue in data-driven IO problems is the introduction of kernel methods. These methods have been extensively studied within the context of IO [35, 8] and have shown promising results for scaling IO to address practical problems. The application of kernel methods in IO allows for the exploration of a broader class of optimization problems, thereby enhancing the model s ability to generalize from observed decisions to unseen situations. Specifically, using a kernelized approach facilitates the embedding of decision data into a richer feature space, enabling the deduction of an FOP that not only fits the training data but also exhibits strong generalization capabilities. Contributions. We list the contributions of this work as follows: (1) Kernelized IO Formulation: We propose a novel Kernel Inverse Optimization (KIO) model based on suboptimality loss [25]. The proposed approach leverages kernel methods to enable IO models to operate on infinite-dimensional feature spaces, which allows KIO to outperform existing imitation learning (IL) algorithms on complex continuous control tasks in low-data regimes. (2) Sequential Selection Optimization Algorithm: To address the quadratic computational complexity of the proposed KIO model, we introduce the Sequential Selection Optimization (SSO) algorithm inspired by coordinate descent style updates. This algorithm selectively optimizes components of the decision variable, greatly enhancing efficiency and scalability while provably converging to the same solution of our proposed KIO model. (3) Open Source Code: To foster reproducibility and further research, we provide an opensource implementation of the proposed KIO model and the SSO algorithm, along with the source code of the experiments in Github1. Notation Rn + denotes the space of n-dimensional non-negative vectors. The identity square matrix with dimension n is denoted by In. For a symmetric matrix Q, the inequality Q 0 (respectively, Q 0) means that Q is positive semi-definite (respectively, positive definite). The trace of a matrix Q is denoted as Tr(Q). Given a vector x Rn, we use the shorthand notation x 2 Q := x Qx. Symmetric block matrices are described by the upper diagonal elements while the lower diagonal elements are replaced by * . The Frobenius norm of matrix Q is denoted as Q F . The notation Qij represents the element in the i-th row and j-th column of the matrix Q. The Euclidean inner product of x and y is denoted as x y. 2 Preliminaries 2.1 Inverse Optimization In general, to solve a data-driven IO problem, we need to design two components: the Forward Optimization Problem (FOP) and the loss function. Specifically, the FOP corresponds to the optimization problem we aim to fit to the observed dataset ˆD = {(ˆsi, ˆui)}N i=1, where each input-output pair (ˆsi, ˆui) S Rn. In this paper, we use the hat notation (e.g., ˆs) to denote objects that depend on the dataset. Our goal is to find a parameter vector θ Θ such that FOP(θ, ˆs) := min u U(ˆs) Fθ(ˆs, u), (1) 1https://github.com/Longyouyuan/Scalable-Kernel-Inverse-Optimization replicates the data as closely as possible by minimizing a loss function, akin to classical empirical risk minimization problems. In this work, we focus on lifting the learning problem based on quadratic FOPs. These FOPs include linear constraints and continuous decision variables, as defined by Fθ(ˆs, u) := u θuuu + 2ϕ(ˆs) θsuu and U(ˆs) := {u Rn : M(ˆs)u W(ˆs)} , (2) where θ := (θuu, θsu), θuu Rn n, θsu Rm n, M(s) Rm n, W(s) Rm, and ϕ : S Rm is the feature function that maps ˆs to a higher-dimensional feature space to enhance the model s capacity. To simplify notation, we omit the explicit dependence of M and W on s, denoting them as ˆ M and ˆW, respectively. To learn θ, we solve a regularized loss minimization problem using the Suboptimality Loss [25] min θ Θ k R(θ) + 1 i=1 max ui U(ˆsi) Fθ(ˆsi, ˆui) Fθ(ˆsi, ui) , (3) where Θ := {θ = (θuu, θsu) : θuu In}, R(θ) := θuu 2 F + θsu 2 F , and k is a positive regularization parameter. The constraint θuu In prevents the trivial solution θuu = θsu = 0 and guarantees that the resulting FOP is a convex optimization problem. Moreover, since Fθ is linear in θ, the optimization program (3) is convex w.r.t. θ, and it can be reformulated from the minimax form to a single minimization problem. This reformulation is based on dualizing the inner maximization problems of (3) and combining the resulting minimization problems. Proposition 1 (LMI reformulation [2]). For the hypothesis function and feasible set in (2), the optimization program (3) is equivalent to min θ,λi,γi k R(θ) + 1 Fθ(ˆsi, ˆui) + 1 4γi + ˆW i λi s.t. θ = (θuu, θsu), θuu In, λi Rd +, γi R i N θuu ˆ M i λi + 2θ suϕ(ˆsi) γi 2.2 The Kernel Method The kernel method is a powerful technique used in machine learning and statistics that exploits the structure of data embedded in a higher-dimensional space. The kernel method has found numerous applications, including Support Vector Machines [12], Kernel Principal Component Analysis [33], and Kernel Linear Discriminant Analysis [6]. The fundamental idea behind the kernel method is to implicitly map input data into a higher-dimensional space without explicitly computing the transformation, thus enabling algorithms to capture complex patterns and non-linear relationships without heavy computational burden [35]. The kernel method generalizes the hypothesis of the optimization problem to a nonlinear function class based on a Reproducing Kernel Hilbert Space (RKHS) H. In this work, we primarily focus on lifting the original parametric optimization problem of the form min θ Θ ℓ {(fθ(ˆsi), ˆsi, ˆui)}N i=1 , θ F , where fθ : S Rn such that fθsu(s) u := ϕ(s) θsuu, following Definition (2). The lifted problem is then defined as min f H ℓ {(f(ˆsi), ˆsi, ˆui)}N i=1 , f H with f in an RKHS H. By lifting the function class to H, we effectively optimize over nonlinear hypotheses. In a vector-valued RKHS H equipped with the inner product , H, as defined in [24], given a proper kernel function K : S S Rn n that is symmetric and positive definite, Moore-Aronszajn s reproducing kernels theory implies that there exists a unique RKHS with the reproducing properties induced by matrix-valued K, such that f H : f(s) u = f, K( , s)u H with a linear operator K( , s) : Rn H. Furthermore, the Riesz representation theorem states that for every s S and u Rn, there exists a unique function K( , s)u H for all f H. Recall that the lifted optimization problem is formed over all nonlinear hypotheses via f H. However, as a result of the reproducing property [34], we can write the lifted optimization problem in the infinite-dimensional inner product space. Hence, the resulting optimization problem has the form min f H ℓ n f, K( , ˆsi)u H, ˆsi, ˆui o N In what follows, we show that the solution of the optimization problem (5) exists and is finite when the problem is built over a finite dataset ˆD of size N. We leverage the Representer theorem [35], which for an arbitrary loss function, as in (5), states that the solution admits the kernel representation of the form f (s) = PN i=1 K(ˆsi, s)αi with αi Rn. This result effectively suggests that optimizing over an infinite-dimensional RKHS has a sparse solution over the linear hypotheses. 3 Kernel Inverse Optimization In this section, we extend the Inverse Optimization (IO) model proposed by [2] to incorporate kernel methods. We consider a hypothesis class of the form in Equation (1). However, kernelizing such hypotheses is not straightforward. Instead, we argue that by kernelizing the optimization problem associated with the loss function described in Equation (3), we can obtain a forward optimization problem (FOP) that minimizes the kernelized objective F(s, u). In Theorem 1, we dualize the problem in (3) and show that the optimal solution for θ su, when plugged into FOP(θ su, θuu, ˆs), admits an affine function of N coefficients w.r.t ˆs. The resulting FOP, obtained by Theorem 1, takes a form consistent with the representer theorem when the loss function and kernel are defined appropriately, as discussed later in this section. Theorem 1 (Kernel reformulation). The Lagrangian dual of the optimization program (4) is min P,Λi,Γi 1 4k ˆuiˆu i N Λi j=1 κ(ˆsi, ˆsj) ˆui s.t. P 0, Λi 0, Γi Rn i N ˆsi N 2 ˆ MiΓi 0 i N Λi Γi 1 4N where κ(ˆsi, ˆsj) = ϕ(ˆsi) ϕ(ˆsj) is the scalar-valued kernel function. The primal variables θuu and θsu can be recovered using ˆuiˆu i N Λi i=1 ϕ(ˆsi)1 2Γ i ˆu i N Proof. See Appendix A.1. Notice that the complexity of the optimization program (6) does not depend on the dimensionality of the feature vector ϕ(ˆsi). Consequently, this allows us to use kernels generated from infinitedimensional feature spaces, e.g., the Gaussian (a.k.a. radial basis function) kernel κ(ˆsi, ˆsj) = exp( γ ˆsi ˆsj 2 2). Program (6) is a convex optimization problem and can be solved using off-theshelf solvers, such as MOSEK [3]. Once solved, we can recover the optimal primal variables θ uu and θ su from the optimal dual variables Λ i , Γ i and P using (7). Notice that the dimensionality of θ su depends on ϕ, meaning it can be an infinite-dimensional matrix. However, our ultimate goal is to learn an FOP that replicates the behavior observed in the data. By combining (7) with (1), we have that, for the signal (ˆsnew, ˆ Mnew, ˆWnew), the resulting FOP is min ˆ Mnewu ˆ Wnew u 1 ˆuiˆu i N Λ i i=1 κ(ˆsnew, ˆsi)2 which again does not depend on the dimensionality of ϕ, but only on the kernel function κ. However, a key difference between solving the IO problem using the kernel reformulation of Theorem 1 and other classical IO approaches (e.g., [25, 2, 40]) is that the resulting FOP (8) explicitly depends on the entire training dataset ˆD. These models are sometimes called nonparametric models [26], indicating that the number of parameters of the model (in our case, P , Λ i , and Γ i for all i N) depends on the size of the training dataset. Remark 1 (A potential variant of representer theorem). In the primal problem (4), a regularized empirical risk loss is optimized over a set of constraints. In the learned objective function of the FOP (8), the term related to the features ˆsi (the linear coefficient of the optimizer u) can be represented as a finite linear combination of kernel products evaluated on the input points in the training set data, i.e., f ( ) = PN i=1 κ(ˆsi, )αi with α Rn. A similar forward optimization problem can be obtained using a loss function defined in a vector-valued RKHS H with a corresponding kernel function K for functions f : S Rn, as discussed in Section 2.2, via ℓH(f, θuu, ˆD) = k f H + 1 i=1 max ui U( ˆsi) F(ˆsi, ˆui; θuu, f) F(ˆsi, ui; θuu, f) , where F(s, u; θuu, f) = u θuuu + f, K( , s)u H and K(s, s ) Rn Rn is set to be a diagonal matrix, with diagonal entries corresponding to the same scalar kernel κ, such that: K(s, s )jj = κ(s, s ) for j {1, . . . , n}. Based on the representer theorem, the solution to the optimization problem min f H ℓH(f, θuu, ˆD) admits the form f (s) = PN i=1 K(s, ˆsi)αi = PN i=1 κ(s, ˆsi)αi. This result indicates that the learned FOP (8) exhibits characteristics consistent with the representer theorem, implying a potential variant in the context of inverse optimization. In the class of cost functions studied in this paper (2), θuu can be interpreted as a matrix that penalizes the components of the decision vector u. However, in many problems, it is assumed that the expert generating the data equally penalizes each dimension of u, or equivalently, uses θuu = In. This assumption holds, for instance, in the Gymnasium Mu Jo Co environments [38], where the reward settings for all tasks apply the same penalty to each dimension of the decision vector. Intuitively, this means that the expert trained under such reward settings aims to reduce the magnitude of the decision vector uniformly across all dimensions, rather than favoring any specific dimension. Therefore, assuming θuu = In as prior knowledge can reduce model complexity and lead to faster training, without degrading model performance. Corollary 1 (Kernel reformulation for θuu = In). The Lagrangian dual of the optimization program (4) with θuu = In is min Λi,Γi: i S 1 k j=1 κ(ˆsi, ˆsj) ˆui s.t. Λi 0, Γi Rn i S ˆWi N 2 ˆ MiΓi 0 i S Λi Γi 1 4N where κ(ˆsi, ˆsj) = ϕ(ˆsi) ϕ(ˆsj) is the kernel function and S = {1, . . . , N}. The primal variable θsu can be recovered using (7). The proof of Corollary 1 is the same as the proof of Theorem 1 under the assumption that θuu = In, and is therefore omitted here. S represents an index set, where all decision variables whose indices belong to S will be optimized, while decision variables whose indices do not belong to S retain their original values and are treated as constants. In Corollary 1, all variables will be optimized, so S is the set comprising natural numbers from 1 to N. The concept of the index set S is introduced to make Problem (9) compatible with the sub-optimization problems based on the coordinate descent method outlined in Section 4. In the following section, we will focus on algorithms to solve Problem (9). However, all ideas also apply to the general problem (6). 4 Sequential Selection Optimization Solving the kernel IO problem (9) involves optimizing a Semidefinite Program (SDP), which can become prohibitively costly if the number of semidefinite constraints and optimization variables grows too large. In our case, the size of the SDP grows quadratically with the size of the training dataset N. For instance, in our experiments, solving (9) with N = 20000 using CVXPY [13] requires up to 256GB of memory. Therefore, in this section, we propose a coordinate descent-type algorithm to find an approximate solution to (9) by iteratively optimizing only a subset of the coordinates at each iteration, keeping all other coordinates fixed. We define a pair of variables Λi and Γi as the i-th coordinate, denoted as {Λi, Γi}. In Problem (9), each coordinate is decoupled in the constraints, which enables the use of the coordinate descent framework here. We call this method Sequential Selection Optimization (SSO), and present it in Algorithm 1. Algorithm 1 Sequential Selection Optimization (SSO) 1: Initialize {Λi, Γi}N i=1 2: for t = 1, . . . , T do 3: Select a batch of p coordinates S = {ai}p i=1, where ai {1, . . . , N} 4: Update {Λai, Γai}p i=1 based on (9) with S 5: end for Here, we explain each step of Algorithm 1: (i) Initialization of the optimization variables. In general, the variables are usually initialized randomly or set to 0 or 1. These methods are simple but may not provide a good initial guess. (ii) Selection of a batch of p coordinates. The most straightforward approach to selecting p coordinates is to choose them cyclically. Alternatively, we can select the coordinates at random at each iteration (not necessarily with equal probability). Lastly, we can choose coordinates greedily, selecting the components corresponding to the greatest descent or those with the largest gradient or subgradient at the current iteration [37]. (iii) Solving the KIO subproblem to update the selected coordinates. The mathematical expression of the subproblem is Problem (9) with S, where S is a set containing the indices of the coordinates that need to be updated. Note that the coordinates whose indices / S remain fixed. Therefore, the number of quadratic terms in (9) scales with |S|2 rather than N 2. Next, we propose two heuristics to accelerate the convergence speed of the SSO algorithm: a heuristic method for choosing which coordinates (line 3 of Algorithm 1) to optimize, and a warm-up trick to improve the initialization of the optimization variables (line 1 of Algorithm 1). 4.1 Heuristic for choosing coordinates At each iteration of Algorithm 1, intuitively, the largest improvement will be made by updating the least optimal set of p variables. One way to evaluate their degree of suboptimality is to choose the variables with the most significant violation of the Karush-Kuhn-Tucker (KKT) conditions of the primal version of Program (9) (i.e., (4) with θuu = In), inspired by the Sequential Minimal Optimization (SMO) method from [30]. Proposition 2. For optimal decision variables of Problem (9), the coordinate {Λi, Γi} that satisfies ˆWi N 2 ˆ MiΓi > 0, (10) should also satisfy Tr Λi Γi 1 4N In 2θ suϕ(ˆsi) 2θ suϕ(ˆsi) 2 2 Proof. See Appendix A.2. Proposition 2 is based on KKT conditions. Based on Condition (11), we can define the KKT violation condition as kkt_violator(i) := Tr Λi Γi 1 4N In 2θ suϕ(ˆsi) 2θ suϕ(ˆsi) 2 2 Using the violation condition (12), we can establish the following heuristic method to construct the set S in Algorithm 1: given the current values of {Λi, Γi}N i=1 at iteration t, we choose the p coordinates that satisfy Condition (10) with the maximum KKT violation (12). In practice, we additionally select some random coordinates to update at each iteration, ensuring that all coordinates have the chance to be updated, including those that initially do not meet the criteria specified in Condition (10) and would otherwise never be updated. This random selection is inspired by the proven convergence of coordinate descent algorithms with uniformly random and cyclic coordinate selection [27, 7]. 4.2 Warm-up trick for improved initialization Another component of Algorithm 1 that may have a significant practical impact is how the optimization variables {Λi, Γi}N i=1 are initialized. A poor initial guess (e.g., Λi = Γi = 0) can lead to slow solver convergence or even result in numerical instability. Here, we propose a simple warm-up trick that leads to a better initialization of the optimization variables. First, we divide the original dataset ˆD into n non-overlapping sub-datasets ˆD1, . . . , ˆDn and solve the n small problems (9) for each of these sub-datasets (Ni = | ˆDi| and S is the set of indices of all the data in ˆDi). We then concatenate the optimal solutions of these n solved small problems to form an initial guess. Even when the original problem (9) is intractable due to a large training dataset (i.e., large N), each subproblem remains tractable for a small enough batch size Ni, and its solutions are still feasible with respect to (9). 5 Numerical Experiments 5.1 Performance Evaluation In this evaluation, KIO is implemented in its simplified version (9), incorporating a Gaussian kernel, and tested on continuous control datasets from the D4RL benchmark [18]. The model is trained using the SSO Algorithm 1. In each task, the model s performance is assessed over 100 test episodes, and the score2 for KIO is the average score across these 100 episodes. The parentheses following KIO scores indicate the amount of data used. For comparison, four additional agents are selected for this experiment. IO is the inverse optimization model without the kernel method, introduced in Proposition 1. To illustrate the effect of the kernel method, both the KIO and IO models are trained on identical datasets. The scores of two behavior cloning agents, BC(TD3+BC) [19] and BC(CQL) [22], are taken from two offline reinforcement learning algorithms in which the entire dataset of 1 million samples was used for training. These papers implemented their respective behavior cloning agents using D4RL datasets, serving as baselines to compare against their proposed offline reinforcement learning algorithms. In these studies, BC(TD3+BC) and BC(CQL) were evaluated over 10 seeds and 3 seeds, respectively. The Teacher is the agent responsible for generating the dataset and serves as the target for imitation learning in this experiment. Table 1: Performance of KIO, IO, two Behavior Cloning (BC) agents, and the Teacher agent on Mu Jo Co tasks from the D4RL benchmark on the normalized return metric. The numbers in parentheses represent the amount of data used by KIO and IO, and the score for KIO in each task is the average score over 100 episodes. Task KIO IO BC(TD3+BC)[19] BC(CQL)[22] Teacher Hopper-expert 109.9 (5k) 31.8 111.5 109.0 108.5 Hopper-medium 50.2 (5k) 20.6 30.0 29.0 47.2 Walker2d-expert 108.5 (10k) 0.9 56.0 125.7 107.1 Walker2d-medium 74.6 (5k) 0.0 11.4 6.6 68.1 Halfcheetah-expert 84.4 (10k) -1.7 105.2 107.0 88.1 Halfcheetah-medium 39.0 (5k) -3.1 36.6 36.1 40.7 Evaluation for KIO. Table 1 presents the final experimental results, where KIO achieves competitive scores in four out of six tasks. In these tasks, except for a slightly lower score in the Halfcheetah-expert task compared to the teacher agent, KIO s scores are either close to or exceed those of the teacher agent, indicating strong learning capabilities in complex control tasks. However, 2Regarding the definition of the score for one episode, we refer readers to the official documentation of Gymnasium [38] and the D4RL paper [18]. without the kernel method, the IO model demonstrates weak learning capabilities, achieving low scores in the Hopper task and failing to learn in the other two more challenging tasks. We argue that the weak performance of the IO model is due to the limitations of its hypothesis class, which lacks the richness needed to learn an effective policy for imitation learning tasks. This limitation arises from its reliance on predefined feature spaces, which may fail to capture the complexities of more sophisticated environments. All hyperparameters used in this experiment for KIO are listed in Appendix B. Task SCS SSO Obj Value Score Obj Value Score Hopper-expert 185.219 109.9 185.220 110.2 Hopper-medium 218.761 50.2 218.761 51.8 Walker2d-expert 140.121 108.5 140.121 109.2 Walker2d-medium 151.117 74.6 151.117 74.9 Halfcheetah-expert 165.041 84.4 165.041 83.8 Halfcheetah-medium 188.184 39.0 188.184 39.7 Table 2: Final Objective Function Value and Score (average return over 100 evaluations) for SCS [28] and SSO (20 iterations for all tasks) algorithms. The ultimate Objective Function Values of the two algorithms are nearly identical, yet across the majority of tasks, SSO achieves a slightly higher score compared to SCS. 0 5 10 15 20 Hopper-expert Hopper-medium Walker2d-expert Walker2d-medium Halfcheetah-expert Halfcheetah-medium Figure 1: Convergence curves for SSO. Evaluation for SSO. Table 2 presents the optimal objective function values and task scores obtained by the centralized algorithm, Splitting Conic Solver (SCS) [28], and the distributed algorithm, Sequential Selection Optimization (SSO), for solving Problem (9). In this experiment, SCS is employed to directly address the large-scale problem (9) with |S| = N. The corresponding solution is evaluated 100 times, and the average score is taken as the final result. Meanwhile, SSO addresses the large-scale problem by solving a series of subproblems. After each iteration, the current solution is evaluated 100 times, and the average score is recorded. After 20 iterations, there are 20 corresponding scores, and we select the highest score along with the objective function value from the last iteration and report it. The results show that SSO and SCS yield nearly identical optimal objective function values. However, except for the Halfcheetah-medium task, SSO achieved higher scores across all other tasks. Figure 1 displays the convergence performance of the SSO algorithm across six distinct tasks, with the horizontal axis representing the number of iterations and the vertical axis representing the error between the current objective function value and the optimal objective function value (calculated by SCS) in Problem (9). The SSO algorithm demonstrates a fast convergence rate. By the 10th iteration, the errors for all tasks are below 0.1, and by the 20th iteration, the errors have further diminished to approximately 1e-4 for all tasks. In the previous evaluation of the SSO algorithm, we limited the maximum training data to 10k to ensure that we could directly solve Problem (9) without SSO. Thereby, we were able to compare the results with and without the SSO algorithm. However, to further verify the effectiveness of the SSO algorithm, we tested it on a new task (the medium-expert dataset) using 100k data points. At this scale, due to memory limitations, we were unable to solve Problem (9) directly without the SSO algorithm, thus the effectiveness of the SSO algorithm is inferred solely from its experimental performance. Table 3 presents the results of the KIO model optimized by the SSO algorithm. The results indicate that the KIO model achieves competitive results and scales effectively to larger data sizes. We list the hyperparameters used in this experiment in Appendix B. 5.2 Ablation Studies We perform ablation studies to understand the contribution of each individual component: Heuristic Coordinates Selection (Section 4.1) and Warm-Up Trick (Section 4.2). Our results, presented in Figure 2, compare the performance of SSO with and without each component (all model hyperparameters remain unchanged as shown in Appendix B). We use the Hopper task as the testing task, with the first 5000 data points from the D4RL Hopper-expert dataset as training data. The block coordinate for each iteration consists of 2500 coordinates (|S| = 2500). When applying the Warm-Up Trick, we partition the data Table 3: Performance of KIO, two Behavior Cloning (BC) agents, and the Teacher agent on Mu Jo Co tasks from the D4RL benchmark on the normalized return metric. The numbers in parentheses represent the amount of data used by KIO, and the score for KIO in each task is the average score over 100 episodes. Task KIO BC(TD3+BC) BC(CQL) Teacher Hopper-medium-expert 79.6 (100k) 89.6 111.9 64.8 Walker2d-medium-expert 100.1 (100k) 12.0 11.3 82.7 Halfcheetah-medium-expert 46.4 (100k) 67.6 35.8 64.4 into two equal parts and solve two subproblems (9), each with |S| = 2500. Therefore, the computational time required for the Warm-Up Trick is approximately equal to the time 0 5 10 15 20 10 5 10 4 10 3 10 2 10 1 1 10 10 2 10 3 10 4 10 5 10 6 10 7 Activate Heuristic Naive CD Heuristic Warm Up Heuristic+Warm Up Heuristic Activated Figure 2: Convergence curves on the Mu Jo Co Hopper task with the first 5k data points from the D4RL Hopper-expert dataset. The vertical axis represents the difference between the current objective function value and the optimal value. Sequential Selection Optimization (orange) exhibits the fastest convergence rate. needed for two iterations of the SSO algorithm. In Figure 2, we present the results of 20 iterations, with the vertical axis representing the difference between the current objective function value and the optimal value in Problem (9). Both the Heuristic Coordinates Selection, abbreviated as Heuristic in Figure 2, and Warm Up Trick significantly accelerate the algorithm. With the Warm-Up Trick, the initial objective function value is markedly reduced. Without the Warm-Up Trick, the Heuristic curve requires approximately 10 iterations to reach the initial values of the SSO curve, whereas the Warm Up Trick requires only about the time of two iterations. The Heuristic Coordinates Selection results in rapid descent of the error curves. The Warm Up curve, however, becomes nearly flat after a few iterations, until the 17th iteration when the Heuristic Coordinates Selection method is activated, causing a rapid decrease in the curve. 6 Conclusion and Limitations We introduced Kernel Inverse Optimization (KIO), an inverse optimization model leveraging kernel methods, along with its simplified variant and the theoretical derivations. Subsequently, we proposed the Sequential Selection Optimization (SSO) algorithm for training the KIO model, which addresses memory issues by decomposing the original problem into a series of subproblems. Our empirical results demonstrate that KIO exhibits strong learning capabilities in complex control tasks, while the SSO algorithm achieves rapid convergence to the optimal solution within a limited number of iterations. One of the limitations of this model is the computational cost of adding a new data point. In that case, all training data are required to compute the coefficients for the FOP problem (see FOP (8)) for that point. Thus, as the amount of training data grows, so does the computational cost. Another limitation is the absence of theoretical analysis on the convergence rate of the SSO algorithm, which we leave for future research. Furthermore, in our numerical experiments in Section 5, the proposed KIO model, even with the SSO algorithm, required substantial memory resources up to 256 GB when using 100k data points. However, we believe that further optimization in implementation could reduce these memory requirements. Finally, in our numerical experiments in Section 5, we observed that initialization strategies critically impact the performance of the SSO algorithm. Thus, exploring alternative initialization strategies beyond the one proposed in Section 4.2 presents a promising direction for future work. Acknowledgments This work is partially supported by the European Research Council (ERC) under the European Unions Horizon 2020 research and innovation programme (TRUST-949796). [1] Ravindra K Ahuja and James B Orlin. Inverse optimization. Operations research, 49(5):771 783, 2001. [2] Syed Adnan Akhtar, Arman Sharifi Kolarijani, and Peyman Mohajerin Esfahani. Learning for control: An inverse optimization approach. IEEE Control Systems Letters, 6:187 192, 2021. [3] Mosek Ap S. Mosek optimization toolbox for matlab. User s Guide and Reference Manual, Version, 4:1, 2019. [4] Anil Aswani, Zuo-Jun Shen, and Auyon Siddiq. Inverse optimization with noisy data. Operations Research, 66(3):870 892, 2018. [5] Turgay Ayer. Inverse optimization for assessing emerging technologies in breast cancer screening. Annals of operations research, 230:57 85, 2015. [6] Gaston Baudat and Fatiha Anouar. Generalized discriminant analysis using a kernel approach. Neural computation, 12(10):2385 2404, 2000. [7] Dimitri Bertsekas. Convex optimization algorithms. Athena Scientific, 2015. [8] Dimitris Bertsimas, Vishal Gupta, and Ioannis Ch Paschalidis. Data-driven estimation in equilibrium using inverse optimization. Mathematical Programming, 153:595 633, 2015. [9] John R Birge, Ali Hortaçsu, and J Michael Pavlin. Inverse optimization for the recovery of market structure from market outcomes: An application to the miso electricity market. Operations Research, 65(4):837 855, 2017. [10] Timothy CY Chan, Rafid Mahmood, and Ian Yihang Zhu. Inverse optimization: Theory and applications. Operations Research, 2023. [11] Lu Chen, Yuyi Chen, and André Langevin. An inverse optimization approach for a capacitated vehicle routing problem. European Journal of Operational Research, 295(3):1087 1098, 2021. [12] Corinna Cortes and Vladimir Vapnik. Support-vector networks. Machine learning, 20:273 297, 1995. [13] Steven Diamond and Stephen Boyd. CVXPY: A Python-embedded modeling language for convex optimization. Journal of Machine Learning Research, 17(83):1 5, 2016. [14] Ioannis Dimanidis, Tolga Ok, and Peyman Mohajerin Esfahani. Offline reinforcement learning via inverse optimization. preprint available at https://mohajerinesfahani.github.io/ Publications/journal/2024/RL_Inv.pdf, 2024. [15] András Faragó, Áron Szentesi, and Balázs Szviatovszki. Inverse optimization in high-speed networks. Discrete Applied Mathematics, 129(1):83 98, 2003. [16] Ricardo Fernández-Blanco, Juan Miguel Morales, and Salvador Pineda. Forecasting the price-response of a pool of buildings via homothetic inverse optimization. Applied Energy, 290:116791, 2021. [17] Ricardo Fernández-Blanco, Juan Miguel Morales, Salvador Pineda, and Álvaro Porras. Inverse optimization with kernel regression: Application to the power forecasting and bidding of a fleet of electric vehicles. Computers & Operations Research, 134:105405, 2021. [18] Justin Fu, Aviral Kumar, Ofir Nachum, George Tucker, and Sergey Levine. D4rl: Datasets for deep data-driven reinforcement learning, 2020. [19] Scott Fujimoto and Shixiang Shane Gu. A minimalist approach to offline reinforcement learning. Advances in neural information processing systems, 34:20132 20145, 2021. [20] Garud Iyengar and Wanmo Kang. Inverse conic programming with applications. Operations Research Letters, 33(3):319 330, 2005. [21] Arezou Keshavarz, Yang Wang, and Stephen Boyd. Imputing a convex objective function. In 2011 IEEE international symposium on intelligent control, pages 613 619. IEEE, 2011. [22] Aviral Kumar, Aurick Zhou, George Tucker, and Sergey Levine. Conservative q-learning for offline reinforcement learning. Advances in Neural Information Processing Systems, 33:1179 1191, 2020. [23] Jonathan Yu-Meng Li. Inverse optimization of convex risk functions. Management Science, 67(11):7113 7141, 2021. [24] Charles A Micchelli and Massimiliano Pontil. On learning vector-valued functions. Neural computation, 17(1):177 204, 2005. [25] Peyman Mohajerin Esfahani and Daniel Kuhn. Data-driven distributionally robust optimization using the wasserstein metric: performance guarantees and tractable reformulations. Mathematical Programming, 171(1-2):115 166, 2018. [26] Kevin P. Murphy. Probabilistic machine learning: an introduction. MIT press, 2022. [27] Yu Nesterov. Efficiency of coordinate descent methods on huge-scale optimization problems. SIAM Journal on Optimization, 22(2):341 362, 2012. [28] Brendan O Donoghue, Eric Chu, Neal Parikh, and Stephen Boyd. Conic optimization via operator splitting and homogeneous self-dual embedding. Journal of Optimization Theory and Applications, 169(3):1042 1068, June 2016. [29] Michael Patriksson. The traffic assignment problem: models and methods. Courier Dover Publications, 2015. [30] John Platt. Sequential minimal optimization: A fast algorithm for training support vector machines. Technical report, Microsoft, 1998. [31] Mikael Rönnqvist, Gunnar Svenson, Patrik Flisberg, and Lars-Erik Jönsson. Calibrated route finder: Improving the safety, environmental consciousness, and cost effectiveness of truck routing in sweden. Interfaces, 47(5):372 395, 2017. [32] Javier Saez-Gallego, Juan M Morales, Marco Zugno, and Henrik Madsen. A data-driven bidding model for a cluster of price-responsive consumers of electricity. IEEE Transactions on Power Systems, 31(6):5001 5011, 2016. [33] Bernhard Schölkopf, Alexander Smola, and Klaus-Robert Müller. Kernel principal component analysis. In International conference on artificial neural networks, pages 583 588. Springer, 1997. [34] Bernhard Scholkopf and Alexander J. Smola. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge, MA, USA, 2001. [35] Soroosh Shafieezadeh-Abadeh, Daniel Kuhn, and Peyman Mohajerin Esfahani. Regularization via mass transportation. Journal of Machine Learning Research, 20(103):1 68, 2019. [36] Zahed Shahmoradi and Taewoo Lee. Quantile inverse optimization: Improving stability in inverse linear programming. Operations research, 70(4):2538 2562, 2022. [37] Hao-Jun Michael Shi, Shenyinying Tu, Yangyang Xu, and Wotao Yin. A primer on coordinate descent algorithms. ar Xiv preprint ar Xiv:1610.00040, 2016. [38] Mark Towers, Jordan K. Terry, Ariel Kwiatkowski, John U. Balis, Gianluca de Cola, Tristan Deleu, Manuel Goulão, Andreas Kallinteris, Arjun KG, Markus Krimmel, Rodrigo Perez Vicente, Andrea Pierré, Sander Schulhoff, Jun Jet Tai, Andrew Tan Jin Shen, and Omar G. Younis. Gymnasium, March 2023. [39] Shi Yu, Haoran Wang, and Chaosheng Dong. Learning risk preferences from investment portfolios using inverse optimization. Research in International Business and Finance, 64:101879, 2023. [40] Pedro Zattoni Scroccaro, Bilge Atasoy, and Peyman Mohajerin Esfahani. Learning in inverse optimization: Incenter cost, augmented suboptimality loss, and algorithms. Operations Research, 2024. [41] Pedro Zattoni Scroccaro, Piet van Beek, Peyman Mohajerin Esfahani, and Bilge Atasoy. Inverse optimization for routing problems. Transportation Science, 2024. A Technical Proofs A.1 Proof of Theorem 1 First, let P, λi and Λi Γi αi be the Lagrange multiplier associated with the constraints θuu Im, λi Rd + and θuu ˆ M i λi + 2θ suϕ(ˆsi) γi 0 respectively, where P, Λi Rn n, Γi Rn, λi Rd and γi R. Then define the Lagrangian function L(θuu, θsu, λi, γi, P, λi, Λi, Γi, αi) =k θuu 2 F + k θsu 2 F Tr(P(θuu In)) ˆu i θuuˆui + 2ϕ(ˆsi) θsuˆui + 1 4γi + ˆW i λi i=1 Tr Λi Γi αi θuu ˆ M i λi + 2θ suϕ(ˆsi) γi (13) and the Lagrange dual problem max P, λi,Λi,Γi,αi inf θuu,θsu,λi,γi L(θuu, θsu, λi, γi, P, λi, Λi, Γi, αi) s.t. P 0, λi Rd +, i N Λi Γi αi When the Lagrangian function (13) is at the point of the infimum with respect to θuu, θsu, λi, γi, we have L θuu = 2kθuu + 1 i=1 ˆuiˆu i P + i=1 Λi = 0 θuu = 1 ˆuiˆu i N Λi L θsu = 2kθsu + 2 i=1 ϕ(ˆsi) ˆu i N 2Γ i i=1 ϕ(ˆsi)1 2Γ i ˆu i N L λi = ˆWi N λi 2 ˆ MiΓi = 0 λi = ˆWi N 2 ˆ MiΓi L γi = 1 4N αi = 0 αi = 1 4N Finally, substituting the expressions for θuu, θsu, λi, and αi into the Lagrange dual problem (14) and simplifying completes the proof. A.2 Proof of Proposition 2 Note that Problem (9) is the dual problem of Problem (4) with θuu = In. Here, we enumerate the five KKT conditions that will be employed i=1 ϕ(ˆsi) 2Γ i ˆu i N , (stationarity) (15a) λi = ˆWi N 2 ˆ MiΓi, i N, (stationarity) (15b) λi λi = 0, i N, (complementary slackness) (15c) Tr Λi Γi 1 4N In ˆ M i λi + 2θ suϕ(ˆsi) γi = 0, i N, (complementary slackness) (15d) λi Rd +, i N. (primal feasibility) (15e) First, we choose coordinate i that satisfy Condition (10). Then based on KKT condition (15b), we have λi > 0. (16) Next, based on conditions in (15c) and (15e), one can obtain λi = 0. (17) Substituting the result (17) into Condition (15d) yields Tr Λi Γi 1 4N In 2θ suϕ(ˆsi) γi γi is the decision variable of Problem (4) with θuu = In. Next, let s solve for its expression. By utilizing the Schur complement, we can prove the following two constraints are equivalent In ˆ M i λi + 2θ suϕ(ˆsi) γi 0 γi ˆ M i λi + 2θ suϕ(ˆsi) 2 Therefore, Problem (4) with θuu = In can be equivalently expressed as min θsu,γi,λi k θsu 2 F + 1 N PN i=1 2ˆu T i θT suϕ(ˆsi) + 1 4γi + ˆW i λi s.t. λi Rd +, γi R, i N γi ˆ M i λi + 2θ suϕ(ˆsi) 2 Here, the variable γi is highlighted. It can be easily proven that when γi attain its optimal values, the equality in the last constraint should hold: γi = ˆ M i λi + 2θ suϕ(ˆsi) 2 2. Note that λi = 0 (17), then the expression of γi is γi = 2θ suϕ(ˆsi) 2 Substituting (20) into (18), one can obtain Condition (11). B Hyperparameters of KIO Table 4 provides the hyperparameters used in the experiments in Section 5. Table 4: KIO Environment Specific Parameters. N is the size of the dataset, p is the number of coordinates that are updated in one iteration of SSO, k is the regularization coefficient, and scalar is the multiplier used in the implementation to avoid numerical instabilities. Environment Dataset k scalar p Hopper-expert 0:5k 1e-6 200N 0.5N Hopper-medium 0:5k 1e-6 200N 0.5N Hopper-medium-expert First 50k + Last 50k 1e-6 200N 0.1N walker2d-expert 0:5k+10k:15k 1e-5 50N 0.5N walker2d-medium 15k:20k 1e-5 50N 0.5N walker2d-medium-expert First 50k + Last 50k 1e-5 50N 0.1N Halfcheetah-expert 325k:330k+345k:350k 5e-6 50N 0.5N Halfcheetah-medium 10k:15k 5e-6 50N 0.5N Halfcheetah-medium-expert First 50k + Last 50k 1e-6 50N 0.1N C Ablation Study on Kernel Function Table 5: Performance of KIO on Mu Jo Co tasks from the D4RL benchmark on the normalized return metric. The scores in each task represent the average score over 100 episodes within the range of one standard deviation. Task RBF Laplace Linear Hopper-medium 51 6.4 41 5.1 24 0.05 Hopper-expert 109.9 0.4 71 26.7 28 0.5 Walker2d-medium 72 14 43 28.2 -0.19 0.006 Walker2d-expert 109.1 0.3 103.1 22.6 -0.02 0.1 Halfcheetah-medium 32.4 12.2 52 10.5 -0.8 0.6 Halfcheetah-expert 78.8 24.9 59.1 35.5 2.0 3.1 In addition to the studies presented in Section 5.2, we conducted experiments to evaluate our proposed model using different kernels commonly employed in machine learning: Gaussian (RBF), Laplacian, and linear kernels. The results for the RBF kernel in Table 5 differ slightly from those in Table 3 due to using a different dataset partition for normalizing the states. Neur IPS Paper Checklist The checklist is designed to encourage best practices for responsible machine learning research, addressing issues of reproducibility, transparency, research ethics, and societal impact. Do not remove the checklist: The papers not including the checklist will be desk rejected. The checklist should follow the references and follow the (optional) supplemental material. The checklist does NOT count towards the page limit. Please read the checklist guidelines carefully for information on how to answer these questions. For each question in the checklist: You should answer [Yes] , [No] , or [NA] . [NA] means either that the question is Not Applicable for that particular paper or the relevant information is Not Available. Please provide a short (1 2 sentence) justification right after your answer (even for NA). The checklist answers are an integral part of your paper submission. They are visible to the reviewers, area chairs, senior area chairs, and ethics reviewers. You will be asked to also include it (after eventual revisions) with the final version of your paper, and its final version will be published with the paper. The reviewers of your paper will be asked to use the checklist as one of the factors in their evaluation. While "[Yes] " is generally preferable to "[No] ", it is perfectly acceptable to answer "[No] " provided a proper justification is given (e.g., "error bars are not reported because it would be too computationally expensive" or "we were unable to find the license for the dataset we used"). In general, answering "[No] " or "[NA] " is not grounds for rejection. While the questions are phrased in a binary way, we acknowledge that the true answer is often more nuanced, so please just use your best judgment and write a justification to elaborate. All supporting evidence can appear either in the main paper or the supplemental material, provided in appendix. If you answer [Yes] to a question, in the justification please point to the section(s) where related material for the question can be found. IMPORTANT, please: Delete this instruction block, but keep the section heading Neur IPS paper checklist", Keep the checklist subsection headings, questions/answers and guidelines below. Do not modify the questions and only use the provided macros for your answers. Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: The claims regarding extending the existing Inverse Optimization (IO) framework to kernel-methods is provided in Theorem 1 and in Equation (8). The claims regarding the effectiveness of the proposed Sequential Selection Optimization (SSO) and the generalization capabilities of Kernel Inverse Optimization (KIO) are justified in Section 5. Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: See the second paragraph of Section 6. Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [Yes] Justification: The proof Theorem 1 and Proposition 2 are provided in Appendix A.1 and A.2 respectively. The proof of Corollary 1 is the same as the proof of Theorem 1 with the assumption that θuu = In, and is therefore omitted. Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and crossreferenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: We provided all hyperparameters for model training along with the original source code in Python. Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] Justification: We provided the original source code along with documentation explaining how to use the code. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/ public/guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: In Section 5, we provide the experimental details, while all hyperparameters are provided in Appendix B. Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [No] Justification: The proposed algorithm and the evaluations in Mu Jo Co are all deterministic, hence, we did not provide error bars regarding the experimental results. Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: We run our experiments on a machine with 8 CPU cores. However, the main computational bottleneck is the memory, which is stated in the conclusion section 6. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [NA] Justification: Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: Our paper poses no such risks and we do not release any model or dataset. Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [NA] Justification: Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [NA] Justification: Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [NA] Justification: The paper does not involve crowdsourcing nor research with human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [NA] Justification: The paper does not involve crowdsourcing nor research with human subjects. Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.