“…Safety filters can be efficiently implemented using, e.g., reachability analysis [11], [12], invariance control [13], [14], barrier functions [15], [16], or command governors [17]. These implementations usually use predictive control techniques [18]- [20], where an optimal control problem is iteratively solved online on a moving time horizon. By increasing this time horizon, the region of operation of the safe backup controller, also known as the safe set, can be enlarged [21].…”