A continual collection of papers related to safety of Text-to-Image/Text-to-Video Models (T2I/T2V Safety).
π‘ Topic 1: The Jailbreak Attack/Defense methods on T2I/T2V Models.
Here, safety is defined as stopping models from following malicious instructions and generating toxic content, including violence, NSFW, privacy violation, animal abuse, child abuse, sexual, misinformation, etc. (please refer to [the system card of DALLΒ·E3])
π‘ Topic 2: Digital Watermarking for T2I Safety.
Digital Watermarking is broadly used for the verification, authenticity, and traceability of images. It can also trace the copyright and ownership of the T2I models.
π‘ Topic 3: Attribution for T2I Methods.
To determine whether an image is generated by AIGC methods, and by which model (e.g. Stable Diffusion, DALL-E, etc.), we can attribute an image to its generator, in proactive and passive ways.
- π§βπ¬ Author: Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao
- π« Affiliation: Johns Hopkins University, Duke University
- π Link: [Code] [arXiv:2305.12082]
- π Note: π₯ (S&P 2024)
- π§βπ¬ Author: Yijun Yang, Ruiyuan Gao, Xiaosen Wang, Tsung-Yi Ho, Nan Xu, Qiang Xu
- π« Affiliation: The Chinese University of Hong Kong, Huawei Singular Security Lab, Institute of Automation, Chinese Academy of Sciences, Beijing Wenge Technology Co. Ltd
- π Link: [Code] [arXiv:2311.17516]
- π Note: π₯ (CVPR2024)
- π§βπ¬ Author: Han Liu, Yuhao Wu, Shixuan Zhai, Bo Yuan, Ning Zhang
- π« Affiliation: Washington University in St. Louis, Rutgers University
- π Link: [Code] [CVPR:2023]
- π Note: π₯ (CVPR2023)
- π§βπ¬ Author: Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang
- π« Affiliation: CISPA Helmholtz Center for Information Security
- π Link: [[Code]] [arXiv:2302.09923]
- π Note: π₯ (USENIX Security 2024)
[4] Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Model
- π§βπ¬ Author: Yimo Deng, Huangxun Chen
- π« Affiliation: The Hong Kong University of Science and Technology, Northeastern University
- π Link: [Code] [arXiv:2302.09923]
- π Note:
- π§βπ¬ Author: Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren
- π« Affiliation: Zhejiang University, ZJU-Hangzhou Global Scientific and Technological Innovation Center,
- π Link: [[Code]] [arXiv:2309.14122]
- π Note:
- π§βπ¬ Author: Xiaoxuan Han and Songlin Yang and Wei Wang and Yang Li and Jing Dong
- π« Affiliation: University of Chinese Academy of Sciences
- π Link: [Code] [arXiv:2404.19382]
- π Note: Adversarial Concept Restoration
[7] Adversarial Nibbler: An Open Red-Teaming Method for Identifying Diverse Harms in Text-to-Image Generation
- π§βπ¬ Author: Jessica Quaye, Alicia Parrish, Oana Inel, Charvi Rastogi, Hannah Rose Kirk, Minsuk Kahng, Erin van Liemt, Max Bartolo, Jess Tsang, Justin White, Nathan Clement, Rafael Mosquera, Juan Ciro, Vijay Janapa Reddi, Lora Aroyo
- π« Affiliation: Harvard University, Google Research, University of Zurich, Carnegie Mellon University, University of Oxford, University College London, Cohere, MLCommon
- π Link: [Code] [arXiv:2403.12075]
- π Note: Adversarial Nibbler Dataset
- π§βπ¬ Author: Jiachen Ma, Anda Cao, Zhiqing Xiao, Jie Zhang, Chao Ye, Junbo Zhao
- π« Affiliation: Zhejiang University, ETH Zurich
- π Link: [[Code]] [arXiv:2404.02928]
- π Note:
[9] UPAM: Unified Prompt Attack in Text-to-Image Generation Models Against Both Textual Filters and Visual Checkers
- π§βπ¬ Author: Duo Peng, Qiuhong Ke, Jun Liu
- π« Affiliation: Singapore University of Technology and Design, Monash University.
- π Link: [[Code]] [arXiv:2405.11336]
- π Note: π₯ ICML 2024
- π§βπ¬ Author: Minseon Kim, Hyomin Lee, Boqing Gong, Huishuai Zhang, Sung Ju Hwang
- π« Affiliation: KAIST, Korea University, Peiking University, DeepAuto.ai
- π Link: [[Code]] [arXiv:2405.16567]
- π Note:
- π§βπ¬ Author: Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao
- π« Affiliation: University of Chicago
- π Link: [[Code]] [arXiv:2310.13828]
- π Note:
- π§βπ¬ Author: Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo
- π« Affiliation: Shandong University, CISPA Helmholtz Center for Information Security, Netflix Eyeline Studios
- π Link: [[Code]] [arXiv:2408.00523]
- π Note:
- π§βπ¬ Author: Minseon Kim, Hyomin Lee, Boqing Gong, Huishuai Zhang, Sung Ju Hwang
- π« Affiliation: KAIST, Korea University, Peiking University, DeepAuto.ai
- π Link: [[Code]] [arXiv:2405.16567]
- π Note:
- π§βπ¬ Author: Yijun Yang, Ruiyuan Gao, Xiao Yang, Jianyuan Zhong, Qiang Xu
- π« Affiliation: The Chinese University of Hong Kong, Hong Kong, Tsinghua University
- π Link: [Code] [arXiv:2403.01446]
- π Note:
- π§βπ¬ Author: Zongyu Wu, Hongcheng Gao, Yueze Wang, Xiang Zhang, Suhang Wang
- π« Affiliation: The Pennsylvania State University, University of Chinese Academy of Sciences, Tianjin University
- π Link: [Code] [arXiv:2402.10882]
- π Note:
- π§βπ¬ Author: Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu
- π« Affiliation: USSLAB, Zhejiang University, Johns Hopkins University
- π Link: [Code] [arXiv:2404.06666]
- π Note: π₯ ACM CCS 2024
[3] Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples
- π§βπ¬ Author: Chumeng Liang, Xiaoyu Wu, Yang Hua, Jiaru Zhang, Yiming Xue, Tao Song, Zhengui Xue, Ruhui Ma, Haibing Guan
- π« Affiliation: USSLAB, Zhejiang University, Johns Hopkins University
- π Link: [Code] [arXiv:2302.04578]
- π Note: ICML 2023 (Oral)
- π§βπ¬ Author: Thanh Van Le, Hao Phung, Thuan Hoang Nguyen, Quan Dao, Ngoc Tran, Anh Tran
- π« Affiliation: VinAI Research, Vanderbilt University
- π Link: [Code] [arXiv:2303.15433]
- π Note: ICCV 2023
- π§βπ¬ Author: Runtao Liu, Ashkan Khakzar, Jindong Gu, Qifeng Chen, Philip Torr, and Fabio Pizzati
- π« Affiliation: Hong Kong University of Science and Technology, University of Oxford,
- π Link: [Code] [arXiv:2404.08031]
- π Note: ECCV 2024
- π§βπ¬ Author: Yimeng Zhang, Xin Chen, Jinghan Jia, Yihua Zhang, Chongyu Fan, Jiancheng Liu, Mingyi Hong, Ke Ding, Sijia Liu
- π« Affiliation: Michigan State University, Applied ML, Intel, University of Minnesota
- π Link: [Code] [arXiv:2405.15234]
- π Note:
- π§βπ¬ Author: Jiwoo Hong, Sayak Paul, Noah Lee, Kashif Rasul, James Thorne, Jongheon Jeong
- π« Affiliation: KAIST AI, Hugging Face, Korea University
- π Link: [Code] [arXiv:2406.06424]
- π Note:
- π§βπ¬ Author: Yong-Hyun Park, Sangdoo Yun, Jin-Hwa Kim, Junho Kim, Geonhui Jang, Yonghyun Jeong, Junghyo Jo, Gayoung Lee,
- π« Affiliation: Seoul National University, Korea University, NAVER AI Lab, NAVER Cloud, Korea Institute for Advanced Study (KIAS), AI Institute of Seoul National University or SNU AIIS
- π Link: [Code] [arXiv:2406.06424]
- π Note:
- π§βπ¬ Author: Rohit Gandikota, Joanna Materzynska, Jaden Fiotto-Kaufman, David Bau
- π« Affiliation: Northeastern University, Massachusetts Institute of Technology
- π Link: [Code] [arXiv:2303.07345][Project]
- π Note: ICCV 2023 oral
- π§βπ¬ Author: Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang
- π« Affiliation: CISPA Helmholtz Center for Information Security, TU Delf
- π Link: [Code] [arXiv:2405.03486]
- π Note: 30 Apr 2024 Arxiv
[1] Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models
- π§βπ¬ Author: Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang
- π« Affiliation: CISPA Helmholtz Center for Information Security, Delft University of Technology
- π Link: [Code] [arXiv:2305.13873]
- π Note: π₯ (ACM CCS 2023)
- π§βπ¬ Author: Pierre Fernandez, Guillaume Couairon, HervΒ΄e JΒ΄egou, Matthijs Douze, Teddy Furon
- π« Affiliation: Meta AI, Centre Inria de lβUniversitΒ΄ e de Rennes, Sorbonne University
- π Link: [Code] [arXiv:2303.15435]
- π Note: ICCV 2023
- π§βπ¬ Author: Yuxin Wen, John Kirchenbauer, Jonas Geiping, Tom Goldstein
- π« Affiliation: University of Maryland
- π Link: [Code] [NeurIPS 2023]
- π Note: NeurIPS 2023
- π§βπ¬ Author: Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Weiming Zhang, Nenghai Yu
- π« Affiliation: University of Science and Technology of China, National University of Singapore
- π Link: [Code] [arXiv:2404.04956]
- π Note: CVPR 2024
- π§βπ¬ Author: Xuanyu Zhang, Runyi Li, Jiwen Yu, Youmin Xu, Weiqi Li, Jian Zhang
- π« Affiliation: Peking University
- π Link: [Code] [arXiv:2312.08883]
- π Note: CVPR 2024
- π§βπ¬ Author: Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang
- π« Affiliation: Peking University
- π Link: [Code] [arXiv:2402.17210]
- π Note: CVPR 2024
- π§βπ¬ Author: Vishal Asnani, John Collomosse, Tu Bui, Xiaoming Liu, Shruti Agarwal
- π« Affiliation: Adobe Research, Michigan State University, University of Surrey
- π Link: [Code] [arXiv:2403.09914]
- π Note: CVPR 2024
- π§βπ¬ Author: Na Zhao, Kejiang Chen, Weiming Zhang, and Nenghai Yu
- π« Affiliation: University of Science and Technology of China
- π Link: [Code] [arXiv:2312.06488]
- π Note: IEEE TDSC 2023
- π§βπ¬ Author: Chang Liu, Jie Zhang, Tianwei Zhang, Xi Yang, Weiming Zhang, Nenghai Yu
- π« Affiliation: University of Science and Technology of China, Nanyang Technological University
- π Link: [Code] [arXiv:2312.03410]
- π Note: NDSS 2024
- π§βπ¬ Author: Guangyu Chen, Yu Wu, Shujie Liu, Tao Liu, Xiaoyong Du, Furu Wei
- π« Affiliation: Microsoft Research Asia, Renmin University of China
- π Link: [Code] [arXiv:2308.12770]
- π Note:
[9] Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models
- π§βπ¬ Author: Ge Luo, Junqiang Huang, Manman Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang
- π« Affiliation: Fudan University
- π Link: [Code] [arXiv:2311.13619]
- π Note:
- π§βπ¬ Author: Runyi Hu, Jie Zhang, Ting Xu, Tianwei Zhang, Jiwei Li
- π« Affiliation: Zhejiang University, Nanyang Technological University, University of Science and Technology of China
- π Link: [Code] [arXiv:2402.12688]
- π Note:
- π§βπ¬ Author: Lijun Zhang, Xiao Liu, Antoni Viros Martin, Cindy Xiong Bearfield, Yuriy Brun, Hui Guan
- π« Affiliation: University of Massachusetts, IBM
- π Link: [Code] [arXiv:2401.04247]
- π Note:
- π§βπ¬ Author: Robin San Roman, Pierre Fernandez, Alexandre DΓ©fossez, Teddy Furon, Tuan Tran, Hady Elsahar
- π« Affiliation: FAIR, Meta
- π Link: [Code] [arXiv:2401.17264]
- π Note:
- π§βπ¬ Author: Rui Min, Sen Li, Hongyang Chen, Minhao Cheng
- π« Affiliation: Hong Kong University of Science and Technology, Zhejiang Lab, Pennsylvania State University
- π Link: [Code] [arXiv:2403.10893]
- π Note:
- π§βπ¬ Author: Zhengyuan Jiang, Moyang Guo, Yuepeng Hu, Neil Zhenqiang Gong
- π« Affiliation: Duke University
- π Link: [Code] [arXiv:2404.04254]
- π Note:
- π§βπ¬ Author: Katherine Xu, Lingzhi Zhang, Jianbo Shi
- π« Affiliation: University of Pennsylvania, Adobe Inc.
- π Link: [Code] [arXiv:2403.19653]
- π Note:
[2] Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models
- π§βπ¬ Author: Meiling Li, Zhenxing Qian, Xinpeng Zhang
- π« Affiliation: Fudan University
- π Link: [Code] [arXiv:2403.01489]
- π Note:
- π§βπ¬ Author: Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma
- π« Affiliation: Rutgers University, Sony AI, Virginia Tech, University of Massachusetts Amherst
- π Link: [Code] [NeurIPS 23]
- π Note: NeurIPS 2023
- π§βπ¬ Author: Yibo Miao, Yifan Zhu, Yinpeng Dong, Lijia Yu, Jun Zhu, Xiao-Shan Gao
- π« Affiliation: Chinese Academy of Sciences, Tsinghua University
- π Link: [arXiv:2407.05965]
- π Note:
- π§βπ¬ Author: Josef Dai, Tianle Chen, Xuyao Wang, Ziran Yang, Taiye Chen, Jiaming Ji, Yaodong Yang
- π« Affiliation: Peking University
- π Link: [homepage][code] arXiv:2406.14477]
- π Note:
- π§βπ¬ Author: Yan Pang, Aiping Xiong, Yang Zhang, Tianhao Wang
- π« Affiliation: University of Virginia, Penn State University, CISPA Helmholtz Center for Information Security
- π Link: [code] arXiv:2407.12581]
- π Note:
Thanks to the 3D-Gaussian-Splatting-Papers.