On the trustworthiness landscape of state-of-the-art generative models: A comprehensive survey

M Fan, C Chen, C Wang, J Huang - arXiv preprint arXiv:2307.16680, 2023 - arxiv.org
Diffusion models and large language models have emerged as leading-edge generative
models and have sparked a revolutionary impact on various aspects of human life. However …

Mma-diffusion: Multimodal attack on diffusion models

Y Yang, R Gao, X Wang, TY Ho… - Proceedings of the …, 2024 - openaccess.thecvf.com
In recent years Text-to-Image (T2I) models have seen remarkable advancements gaining
widespread adoption. However this progress has inadvertently opened avenues for …

Attacks and defenses for generative diffusion models: A comprehensive survey

VT Truong, LB Dang, LB Le - arXiv preprint arXiv:2408.03400, 2024 - arxiv.org
Diffusion models (DMs) have achieved state-of-the-art performance on various generative
tasks such as image synthesis, text-to-image, and text-guided image-to-image generation …

Improving the Adversarial Transferability of Vision Transformers with Virtual Dense Connection

J Zhang, Y Huang, Z Xu, W Wu, MR Lyu - Proceedings of the AAAI …, 2024 - ojs.aaai.org
With the great achievement of vision transformers (ViTs), transformer-based approaches
have become the new paradigm for solving various computer vision tasks. However, recent …

Backpropagation path search on adversarial transferability

Z Xu, Z Gu, J Zhang, S Cui, C Meng… - Proceedings of the …, 2023 - openaccess.thecvf.com
Deep neural networks are vulnerable to adversarial examples, dictating the imperativeness
to test the model's robustness before deployment. Transfer-based attackers craft adversarial …

Pixel is a Barrier: Diffusion Models Are More Adversarially Robust Than We Think

H Xue, Y Chen - arXiv preprint arXiv:2404.13320, 2024 - arxiv.org
Adversarial examples for diffusion models are widely used as solutions for safety concerns.
By adding adversarial perturbations to personal images, attackers can not edit or imitate …

Curvature-Invariant Adversarial Attacks for 3D Point Clouds

J Zhang, W Gu, Y Huang, Z Jiang, W Wu… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
Imperceptibility is one of the crucial requirements for adversarial examples. Previous
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …

A survey of defenses against ai-generated visual media: Detection, disruption, and authentication

J Deng, C Lin, Z Zhao, S Liu, Q Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Deep generative models have demonstrated impressive performance in various computer
vision applications, including image synthesis, video generation, and medical analysis …

Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models

H Yu, J Chen, X Ding, Y Zhang, T Tang… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
The high-quality generation results of conditional diffusion models have brought about
concerns regarding privacy and copyright issues. As a possible technique for preventing the …

[HTML][HTML] Intelligent Prediction of Ore Block Shapes Based on Novel View Synthesis Technology

L Bi, D Bai, B Chen - Applied Sciences, 2024 - mdpi.com
To address the problem of incomplete perception of limited viewpoints of ore blocks in future
remote and intelligent shoveling-dominated mining scenarios, a method of using new view …