ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2303.05762
  4. Cited By
TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets

TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets

10 March 2023
Weixin Chen
D. Song
Bo-wen Li
    DiffM
ArXivPDFHTML

Papers citing "TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets"

50 / 57 papers shown
Title
BadVideo: Stealthy Backdoor Attack against Text-to-Video Generation
BadVideo: Stealthy Backdoor Attack against Text-to-Video Generation
Ke Xu
Mingli Zhu
Jiarong Ou
R. J. Chen
Xin Tao
Pengfei Wan
Baoyuan Wu
DiffM
AAML
VGen
53
0
0
23 Apr 2025
Backdoor Defense in Diffusion Models via Spatial Attention Unlearning
Backdoor Defense in Diffusion Models via Spatial Attention Unlearning
Abha Jha
Ashwath Vaithinathan Aravindan
Matthew Salaway
Atharva Sandeep Bhide
Duygu Nur Yaldiz
AAML
70
0
0
21 Apr 2025
What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale
What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale
Xiaoyong Yuan
Xiaolong Ma
Linke Guo
Lan Zhang
DiffM
42
0
0
21 Apr 2025
Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models
Parasite: A Steganography-based Backdoor Attack Framework for Diffusion Models
Jianfei Chen
Yu Pan
Yi Du
Chunkai Wu
Lin Wang
DiffM
35
0
0
08 Apr 2025
Embedding Hidden Adversarial Capabilities in Pre-Trained Diffusion Models
Embedding Hidden Adversarial Capabilities in Pre-Trained Diffusion Models
Lucas Beerens
D. Higham
DiffM
WIGM
60
0
0
05 Apr 2025
Hiding Images in Diffusion Models by Editing Learned Score Functions
Hiding Images in Diffusion Models by Editing Learned Score Functions
Haoyu Chen
Yunqiao Yang
Nan Zhong
Kede Ma
DiffM
68
0
0
24 Mar 2025
Silent Branding Attack: Trigger-free Data Poisoning Attack on Text-to-Image Diffusion Models
Sangwon Jang
June Suk Choi
Jaehyeong Jo
Kimin Lee
Sung Ju Hwang
DiffM
WIGM
84
1
0
12 Mar 2025
Backdoor Attacks on Discrete Graph Diffusion Models
Jiawen Wang
Samin Karim
Yuan Hong
Binghui Wang
DiffM
68
0
0
08 Mar 2025
A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models
A Dual-Purpose Framework for Backdoor Defense and Backdoor Amplification in Diffusion Models
Vu Tuan Truong Long
Bao Le
DiffM
AAML
216
0
0
26 Feb 2025
BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model
BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model
Weilin Lin
Nanjun Zhou
Yijiao Wang
Jianze Li
Hui Xiong
Li Liu
AAML
DiffM
190
0
0
17 Feb 2025
TrojFlow: Flow Models are Natural Targets for Trojan Attacks
TrojFlow: Flow Models are Natural Targets for Trojan Attacks
Zhengyang Qi
Xiaohua Xu
AAML
92
0
0
21 Dec 2024
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models
Yuning Han
Bingyin Zhao
Rui Chu
Feng Luo
Biplab Sikdar
Yingjie Lao
DiffM
AAML
86
1
0
16 Dec 2024
Robust and Transferable Backdoor Attacks Against Deep Image Compression
  With Selective Frequency Prior
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Yi Yu
Yufei Wang
Wenhan Yang
Lanqing Guo
Shijian Lu
Ling-yu Duan
Yap-Peng Tan
Alex C. Kot
AAML
86
4
0
02 Dec 2024
On the Fairness, Diversity and Reliability of Text-to-Image Generative
  Models
On the Fairness, Diversity and Reliability of Text-to-Image Generative Models
J. Vice
Naveed Akhtar
Richard I. Hartley
Ajmal Mian
EGVM
71
0
0
21 Nov 2024
SoK: Unifying Cybersecurity and Cybersafety of Multimodal Foundation Models with an Information Theory Approach
Ruoxi Sun
Jiamin Chang
Hammond Pearce
Chaowei Xiao
B. Li
Qi Wu
Surya Nepal
Minhui Xue
40
0
0
17 Nov 2024
Embedding Watermarks in Diffusion Process for Model Intellectual
  Property Protection
Embedding Watermarks in Diffusion Process for Model Intellectual Property Protection
Jijia Yang
Sen Peng
Xiaohua Jia
WIGM
39
0
0
29 Oct 2024
How to Backdoor Consistency Models?
How to Backdoor Consistency Models?
Chengen Wang
Murat Kantarcioglu
DiffM
AAML
189
1
0
14 Oct 2024
Training Data Attribution: Was Your Model Secretly Trained On Data
  Created By Mine?
Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Likun Zhang
Hao Wu
Lefei Zhang
Fengyuan Xu
Jin Cao
Fenghua Li
Ben Niu
TDI
23
1
0
24 Sep 2024
PureDiffusion: Using Backdoor to Counter Backdoor in Generative
  Diffusion Models
PureDiffusion: Using Backdoor to Counter Backdoor in Generative Diffusion Models
V. T. Truong
Long Bao Le
DiffM
34
4
0
20 Sep 2024
Understanding Implosion in Text-to-Image Generative Models
Understanding Implosion in Text-to-Image Generative Models
Wenxin Ding
Cathy Y. Li
Shawn Shan
Ben Y. Zhao
Haitao Zheng
36
0
0
18 Sep 2024
Score Forgetting Distillation: A Swift, Data-Free Method for Machine Unlearning in Diffusion Models
Score Forgetting Distillation: A Swift, Data-Free Method for Machine Unlearning in Diffusion Models
Tianqi Chen
Shujian Zhang
Mingyuan Zhou
DiffM
83
3
0
17 Sep 2024
TERD: A Unified Framework for Safeguarding Diffusion Models Against
  Backdoors
TERD: A Unified Framework for Safeguarding Diffusion Models Against Backdoors
Yichuan Mo
Hui Huang
Mingjie Li
Ang Li
Yisen Wang
AAML
DiffM
32
16
0
09 Sep 2024
Attacks and Defenses for Generative Diffusion Models: A Comprehensive
  Survey
Attacks and Defenses for Generative Diffusion Models: A Comprehensive Survey
V. T. Truong
Luan Ba Dang
Long Bao Le
DiffM
MedIm
56
16
0
06 Aug 2024
Backdoor Attacks against Image-to-Image Networks
Backdoor Attacks against Image-to-Image Networks
Wenbo Jiang
Hongwei Li
Jiaming He
Rui Zhang
Guowen Xu
Tianwei Zhang
Rongxing Lu
AAML
43
3
0
15 Jul 2024
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion
  Models
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models
Changjiang Li
Ren Pang
Bochuan Cao
Jinghui Chen
Fenglong Ma
Shouling Ji
Ting Wang
DiffM
41
3
0
14 Jun 2024
Invisible Backdoor Attacks on Diffusion Models
Invisible Backdoor Attacks on Diffusion Models
Sen Li
Junchi Ma
Minhao Cheng
WIGM
47
10
0
02 Jun 2024
Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable
Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable
Haozhe Liu
Wentian Zhang
Bing Li
Bernard Ghanem
Jürgen Schmidhuber
DiffM
WIGM
AAML
36
1
0
01 May 2024
UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models
UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models
Zihan Guan
Mengxuan Hu
Sheng Li
Anil Vullikanti
DiffM
AAML
47
10
0
01 Apr 2024
Exploring Privacy and Fairness Risks in Sharing Diffusion Models: An
  Adversarial Perspective
Exploring Privacy and Fairness Risks in Sharing Diffusion Models: An Adversarial Perspective
Xinjian Luo
Yangfan Jiang
Fei Wei
Yuncheng Wu
Xiaokui Xiao
Beng Chin Ooi
DiffM
46
4
0
28 Feb 2024
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models
Yang Sui
Huy Phan
Jinqi Xiao
Tian-Di Zhang
Zijie Tang
Cong Shi
Yan Wang
Yingying Chen
Bo Yuan
DiffM
AAML
32
12
0
05 Feb 2024
Preference Poisoning Attacks on Reward Model Learning
Preference Poisoning Attacks on Reward Model Learning
Junlin Wu
Jiong Wang
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
AAML
32
5
0
02 Feb 2024
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Wenqi Wei
Ling Liu
31
16
0
02 Feb 2024
EraseDiff: Erasing Data Influence in Diffusion Models
EraseDiff: Erasing Data Influence in Diffusion Models
Jing Wu
Trung Le
Munawar Hayat
Mehrtash Harandi
DiffM
69
14
0
11 Jan 2024
Scissorhands: Scrub Data Influence via Connection Sensitivity in
  Networks
Scissorhands: Scrub Data Influence via Connection Sensitivity in Networks
Jing Wu
Mehrtash Harandi
31
14
0
11 Jan 2024
The Stronger the Diffusion Model, the Easier the Backdoor: Data
  Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline
The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline
Haonan Wang
Qianli Shen
Yao Tong
Yang Zhang
Kenji Kawaguchi
37
23
0
07 Jan 2024
Quantifying Bias in Text-to-Image Generative Models
Quantifying Bias in Text-to-Image Generative Models
J. Vice
Naveed Akhtar
Richard I. Hartley
Ajmal Mian
30
10
0
20 Dec 2023
On Exact Inversion of DPM-Solvers
On Exact Inversion of DPM-Solvers
Seongmin Hong
Kyeonghyun Lee
Suh Yoon Jeon
Hyewon Bae
Se Young Chun
DiffM
29
21
0
30 Nov 2023
VA3: Virtually Assured Amplification Attack on Probabilistic Copyright
  Protection for Text-to-Image Generative Models
VA3: Virtually Assured Amplification Attack on Probabilistic Copyright Protection for Text-to-Image Generative Models
Xiang Li
Qianli Shen
Kenji Kawaguchi
27
4
0
29 Nov 2023
Trustworthy Large Models in Vision: A Survey
Trustworthy Large Models in Vision: A Survey
Ziyan Guo
Li Xu
Jun Liu
MU
66
0
0
16 Nov 2023
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning
  Effects in Diffusion Models
From Trojan Horses to Castle Walls: Unveiling Bilateral Data Poisoning Effects in Diffusion Models
Zhuoshi Pan
Yuguang Yao
Gaowen Liu
Bingquan Shen
H. V. Zhao
Ramana Rao Kompella
Sijia Liu
DiffM
AAML
27
2
0
04 Nov 2023
RAEDiff: Denoising Diffusion Probabilistic Models Based Reversible
  Adversarial Examples Self-Generation and Self-Recovery
RAEDiff: Denoising Diffusion Probabilistic Models Based Reversible Adversarial Examples Self-Generation and Self-Recovery
Fan Xing
Xiaoyi Zhou
Xuefeng Fan
Zhuo Tian
Yan Zhao
DiffM
19
0
0
25 Oct 2023
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image
  Generative Models
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Shawn Shan
Wenxin Ding
Josephine Passananti
Stanley Wu
Haitao Zheng
Ben Y. Zhao
SILM
DiffM
31
44
0
20 Oct 2023
Invisible Watermarking for Audio Generation Diffusion Models
Invisible Watermarking for Audio Generation Diffusion Models
Xirong Cao
Xia Li
D. Jadav
Yanzhao Wu
Zhehui Chen
Chen Zeng
Wenqi Wei
WIGM
33
9
0
22 Sep 2023
AI-Generated Content (AIGC) for Various Data Modalities: A Survey
AI-Generated Content (AIGC) for Various Data Modalities: A Survey
Lin Geng Foo
Hossein Rahmani
Xiaozhong Liu
78
31
0
27 Aug 2023
Backdooring Textual Inversion for Concept Censorship
Backdooring Textual Inversion for Concept Censorship
Yutong Wu
Jiehan Zhang
Florian Kerschbaum
Tianwei Zhang
DiffM
37
7
0
21 Aug 2023
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
J. Vice
Naveed Akhtar
Richard I. Hartley
Ajmal Mian
SILM
DiffM
34
18
0
31 Jul 2023
VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion
  Models
VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models
Sheng-Yen Chou
Pin-Yu Chen
Tsung-Yi Ho
DiffM
15
53
0
12 Jun 2023
Intellectual Property Protection of Diffusion Models via the Watermark
  Diffusion Process
Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process
Sen Peng
Yufei Chen
Cong Wang
Xiaohua Jia
WIGM
11
13
0
06 Jun 2023
Spear or Shield: Leveraging Generative AI to Tackle Security Threats of
  Intelligent Network Services
Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services
Hongyang Du
Dusit Niyato
Jiawen Kang
Zehui Xiong
K. Lam
Ya-Nan Fang
Yonghui Li
AAML
29
13
0
04 Jun 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
13
20
0
11 May 2023
12
Next