ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2303.15433
  4. Cited By
Anti-DreamBooth: Protecting users from personalized text-to-image
  synthesis

Anti-DreamBooth: Protecting users from personalized text-to-image synthesis

27 March 2023
T. Le
Hao Phung
Thuan Hoang Nguyen
Quan Dao
Ngoc N. Tran
Anh Tran
ArXivPDFHTML

Papers citing "Anti-DreamBooth: Protecting users from personalized text-to-image synthesis"

13 / 63 papers shown
Title
Warfare:Breaking the Watermark Protection of AI-Generated Content
Warfare:Breaking the Watermark Protection of AI-Generated Content
Guanlin Li
Yifei Chen
Jie M. Zhang
Shangwei Guo
Shangwei Guo
Tianwei Zhang
Jiwei Li
Tianwei Zhang
WIGM
47
3
0
27 Sep 2023
Security and Privacy on Generative Data in AIGC: A Survey
Security and Privacy on Generative Data in AIGC: A Survey
Tao Wang
Yushu Zhang
Shuren Qi
Ruoyu Zhao
Zhihua Xia
Jian Weng
43
41
0
18 Sep 2023
My Art My Choice: Adversarial Protection Against Unruly AI
My Art My Choice: Adversarial Protection Against Unruly AI
Anthony Rhodes
Ram Bhagat
U. Ciftci
Ilke Demir
DiffM
20
4
0
06 Sep 2023
DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion
  Customization
DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization
Xiaoyu Ye
Hao Huang
Jiaqi An
Yongtao Wang
WIGM
19
21
0
19 Aug 2023
Generative Watermarking Against Unauthorized Subject-Driven Image
  Synthesis
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Y. Ma
Zhengyu Zhao
Xinlei He
Zheng Li
Michael Backes
Yang Zhang
AAML
WIGM
9
21
0
13 Jun 2023
Unlearnable Examples for Diffusion Models: Protect Data from
  Unauthorized Exploitation
Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Zhengyue Zhao
Jinhao Duan
Xingui Hu
Kaidi Xu
Chenan Wang
Rui Zhang
Zidong Du
Qi Guo
Yunji Chen
DiffM
WIGM
14
26
0
02 Jun 2023
Mix-of-Show: Decentralized Low-Rank Adaptation for Multi-Concept
  Customization of Diffusion Models
Mix-of-Show: Decentralized Low-Rank Adaptation for Multi-Concept Customization of Diffusion Models
Yuchao Gu
Xintao Wang
Jay Zhangjie Wu
Yujun Shi
Yunpeng Chen
...
Shuning Chang
Wei Yu Wu
Yixiao Ge
Ying Shan
Mike Zheng Shou
DiffM
16
166
0
29 May 2023
Mist: Towards Improved Adversarial Examples for Diffusion Models
Mist: Towards Improved Adversarial Examples for Diffusion Models
Chumeng Liang
Xiaoyu Wu
DiffM
20
25
0
22 May 2023
Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling
  Augmentation Framework
Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Ruijia Wu
Yuhang Wang
Huafeng Shi
Zhipeng Yu
Yichao Wu
Ding Liang
DiffM
6
9
0
06 May 2023
Prompt Stealing Attacks Against Text-to-Image Generation Models
Prompt Stealing Attacks Against Text-to-Image Generation Models
Xinyue Shen
Y. Qu
Michael Backes
Yang Zhang
17
31
0
20 Feb 2023
Muse: Text-To-Image Generation via Masked Generative Transformers
Muse: Text-To-Image Generation via Masked Generative Transformers
Huiwen Chang
Han Zhang
Jarred Barber
AJ Maschinot
José Lezama
...
Kevin Patrick Murphy
William T. Freeman
Michael Rubinstein
Yuanzhen Li
Dilip Krishnan
DiffM
197
515
0
02 Jan 2023
UnGANable: Defending Against GAN-based Face Manipulation
UnGANable: Defending Against GAN-based Face Manipulation
Zheng Li
Ning Yu
A. Salem
Michael Backes
Mario Fritz
Yang Zhang
AAML
PICV
CVBM
38
22
0
03 Oct 2022
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
247
5,813
0
08 Jul 2016
Previous
12