Cited By
View all- Ye XZhang QCui SYing ZSun JDu X(2024)Mitigating Adversarial Attacks in Object Detection through Conditional Diffusion ModelsMathematics10.3390/math1219309312:19(3093)Online publication date: 2-Oct-2024
- Wang HGuo SHe JChen KZhang SZhang TXiang TCai JKankanhalli MPrabhakaran BBoll SSubramanian RZheng LSingh VCesar PXie LXu D(2024)EvilEdit: Backdooring Text-to-Image Diffusion Models in One SecondProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3680689(3657-3665)Online publication date: 28-Oct-2024
- Vice JAkhtar NHartley RMian A(2024)BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative ModelsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338605819(4865-4880)Online publication date: 8-Apr-2024
- Show More Cited By