Imitating Unknown Policies via Exploration