ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2302.06588
  4. Cited By
Raising the Cost of Malicious AI-Powered Image Editing

Raising the Cost of Malicious AI-Powered Image Editing

13 February 2023
Hadi Salman
Alaa Khaddaj
Guillaume Leclerc
Andrew Ilyas
A. Madry
    DiffM
ArXivPDFHTML

Papers citing "Raising the Cost of Malicious AI-Powered Image Editing"

27 / 27 papers shown
Title
Visual Watermarking in the Era of Diffusion Models: Advances and Challenges
Visual Watermarking in the Era of Diffusion Models: Advances and Challenges
Junxian Duan
Jiyang Guan
Wenkui Yang
Ran He
WIGM
43
0
0
13 May 2025
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
DCT-Shield: A Robust Frequency Domain Defense against Malicious Image Editing
Aniruddha Bala
Rohit Chowdhury
Rohan Jaiswal
Siddharth Roheda
DiffM
AAML
76
0
0
24 Apr 2025
How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
Basavasagar Patil
Akansha Kalra
Guanhong Tao
Daniel S. Brown
AAML
76
0
0
06 Feb 2025
Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures
Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures
Marc Schmitt
Pantelis Koutroumpis
45
0
0
03 Jan 2025
Nearly Zero-Cost Protection Against Mimicry by Personalized Diffusion Models
Nearly Zero-Cost Protection Against Mimicry by Personalized Diffusion Models
Namhyuk Ahn
Kiyoon Yoo
Wonhyuk Ahn
Daesik Kim
Seung-Hun Nam
AAML
WIGM
DiffM
90
0
0
16 Dec 2024
Edit Away and My Face Will not Stay: Personal Biometric Defense against Malicious Generative Editing
Edit Away and My Face Will not Stay: Personal Biometric Defense against Malicious Generative Editing
Hanhui Wang
Yihua Zhang
Ruizheng Bai
Yue Zhao
Sijia Liu
Z. Tu
AAML
PICV
98
2
0
25 Nov 2024
Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Shilin Lu
Zihan Zhou
Jiayou Lu
Yuanzhi Zhu
A. Kong
WIGM
97
10
0
24 Oct 2024
DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image
  Editing
DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing
June Suk Choi
Kyungmin Lee
Jongheon Jeong
Saining Xie
Jinwoo Shin
Kimin Lee
DiffM
AAML
33
2
0
08 Oct 2024
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
SCA: Highly Efficient Semantic-Consistent Unrestricted Adversarial Attack
Zihao Pan
Weibin Wu
Yuhang Cao
Zibin Zheng
DiffM
AAML
65
1
0
03 Oct 2024
Dormant: Defending against Pose-driven Human Image Animation
Dormant: Defending against Pose-driven Human Image Animation
Jiachen Zhou
Mingsi Wang
Tianlin Li
Guozhu Meng
Kai Chen
67
3
0
22 Sep 2024
Adversarial Attacks on Parts of Speech: An Empirical Study in
  Text-to-Image Generation
Adversarial Attacks on Parts of Speech: An Empirical Study in Text-to-Image Generation
G M Shahariar
Jia Chen
Jiachen Li
Yue Dong
34
0
0
21 Sep 2024
Pixel Is Not a Barrier: An Effective Evasion Attack for Pixel-Domain Diffusion Models
Pixel Is Not a Barrier: An Effective Evasion Attack for Pixel-Domain Diffusion Models
Chun-Yen Shih
Li-Xuan Peng
Jia-Wei Liao
Ernie Chu
Cheng-Fu Chou
Jun-Cheng Chen
AAML
DiffM
41
1
0
21 Aug 2024
A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse
A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse
Zhongliang Guo
Lei Fang
Jingyu Lin
Yifei Qian
Shuai Zhao
Zeyu Wang
Zeyu Wang
Cunjian Chen
Ognjen Arandjelović
Chun Pong Lau
DiffM
AAML
40
6
0
20 Aug 2024
Attacks and Defenses for Generative Diffusion Models: A Comprehensive
  Survey
Attacks and Defenses for Generative Diffusion Models: A Comprehensive Survey
V. T. Truong
Luan Ba Dang
Long Bao Le
DiffM
MedIm
56
16
0
06 Aug 2024
Pixel is a Barrier: Diffusion Models Are More Adversarially Robust Than
  We Think
Pixel is a Barrier: Diffusion Models Are More Adversarially Robust Than We Think
Haotian Xue
Yongxin Chen
DiffM
AAML
43
3
0
20 Apr 2024
IMMA: Immunizing text-to-image Models against Malicious Adaptation
IMMA: Immunizing text-to-image Models against Malicious Adaptation
Yijia Zheng
Raymond A. Yeh
47
8
0
30 Nov 2023
EditShield: Protecting Unauthorized Image Editing by Instruction-guided
  Diffusion Models
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models
Ruoxi Chen
Haibo Jin
Yixin Liu
Jinyin Chen
Haohan Wang
Lichao Sun
26
10
0
19 Nov 2023
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations
  Against Unauthorized Data Usage in Diffusion-Based Generative AI
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI
Bochuan Cao
Changjiang Li
Ting Wang
Jinyuan Jia
Bo Li
Jinghui Chen
DiffM
31
21
0
30 Oct 2023
Toward effective protection against diffusion based mimicry through
  score distillation
Toward effective protection against diffusion based mimicry through score distillation
Haotian Xue
Chumeng Liang
Xiaoyu Wu
Yongxin Chen
DiffM
AAML
35
32
0
02 Oct 2023
Warfare:Breaking the Watermark Protection of AI-Generated Content
Warfare:Breaking the Watermark Protection of AI-Generated Content
Guanlin Li
Yifei Chen
Jie Zhang
Shangwei Guo
Shangwei Guo
Tianwei Zhang
Jiwei Li
Tianwei Zhang
WIGM
58
3
0
27 Sep 2023
My Art My Choice: Adversarial Protection Against Unruly AI
My Art My Choice: Adversarial Protection Against Unruly AI
Anthony Rhodes
Ram Bhagat
U. Ciftci
Ilke Demir
DiffM
42
4
0
06 Sep 2023
JPEG Compressed Images Can Bypass Protections Against AI Editing
JPEG Compressed Images Can Bypass Protections Against AI Editing
Pedro Sandoval-Segura
Jonas Geiping
Tom Goldstein
DiffM
16
10
0
05 Apr 2023
Unlearnable Examples: Making Personal Data Unexploitable
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
156
190
0
13 Jan 2021
Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics
Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics
Yuezun Li
Xin Yang
Pu Sun
H. Qi
Siwei Lyu
149
1,046
0
27 Sep 2019
A Style-Based Generator Architecture for Generative Adversarial Networks
A Style-Based Generator Architecture for Generative Adversarial Networks
Tero Karras
S. Laine
Timo Aila
285
10,354
0
12 Dec 2018
Image-to-Image Translation with Conditional Adversarial Networks
Image-to-Image Translation with Conditional Adversarial Networks
Phillip Isola
Jun-Yan Zhu
Tinghui Zhou
Alexei A. Efros
SSeg
212
19,450
0
21 Nov 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
1