{"id":"https://openalex.org/W4416961063","doi":"https://doi.org/10.1109/tifs.2025.3639957","title":"A Gray-Box Attack Against Latent Diffusion Model-Based Image Editing by Posterior Collapse","display_name":"A Gray-Box Attack Against Latent Diffusion Model-Based Image Editing by Posterior Collapse","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416961063","doi":"https://doi.org/10.1109/tifs.2025.3639957"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3639957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3639957","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/TIFS.2025.3639957","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038495575","display_name":"Zhongliang Guo","orcid":"https://orcid.org/0000-0002-6025-3021"},"institutions":[{"id":"https://openalex.org/I16835326","display_name":"University of St Andrews","ror":"https://ror.org/02wn5qz54","country_code":"GB","type":"education","lineage":["https://openalex.org/I16835326"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Zhongliang Guo","raw_affiliation_strings":["School of Computer Science, University of St Andrews, St Andrews, U.K","School of Computer Science, University of St Andrews, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-6025-3021","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of St Andrews, St Andrews, U.K","institution_ids":["https://openalex.org/I16835326"]},{"raw_affiliation_string":"School of Computer Science, University of St Andrews, United Kingdom","institution_ids":["https://openalex.org/I16835326"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113407755","display_name":"Chun Tong Lei","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chun Tong Lei","raw_affiliation_strings":["Department of Data Science, City University of Hong Kong, Hong Kong, China","Department of Data Science, City University of Hong Kong, China"],"raw_orcid":"https://orcid.org/0009-0004-1835-500X","affiliations":[{"raw_affiliation_string":"Department of Data Science, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Data Science, City University of Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101624499","display_name":"Lei Fang","orcid":"https://orcid.org/0000-0003-3624-371X"},"institutions":[{"id":"https://openalex.org/I16835326","display_name":"University of St Andrews","ror":"https://ror.org/02wn5qz54","country_code":"GB","type":"education","lineage":["https://openalex.org/I16835326"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lei Fang","raw_affiliation_strings":["School of Computer Science, University of St Andrews, St Andrews, U.K","School of Computer Science, University of St Andrews, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0003-3624-371X","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of St Andrews, St Andrews, U.K","institution_ids":["https://openalex.org/I16835326"]},{"raw_affiliation_string":"School of Computer Science, University of St Andrews, United Kingdom","institution_ids":["https://openalex.org/I16835326"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034822677","display_name":"Shuai Zhao","orcid":"https://orcid.org/0000-0001-5174-5182"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shuai Zhao","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Singapore, Singapore","College of Computing and Data Science, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-5174-5182","affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075030149","display_name":"Yifei Qian","orcid":"https://orcid.org/0000-0003-2881-1422"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yifei Qian","raw_affiliation_strings":["School of Computer Science, University of Nottingham, Nottingham, U.K","School of Computer Science, University of Nottingham, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0003-2881-1422","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Nottingham, Nottingham, U.K","institution_ids":["https://openalex.org/I142263535"]},{"raw_affiliation_string":"School of Computer Science, University of Nottingham, United Kingdom","institution_ids":["https://openalex.org/I142263535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102212132","display_name":"Jingyu Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jingyu Lin","raw_affiliation_strings":["Department of Data Science and Artificial Intelligence, Monash University, Melbourne, Australia","Department of Data Science and Artificial Intelligence, Monash University, Australia"],"raw_orcid":"https://orcid.org/0000-0003-1897-4148","affiliations":[{"raw_affiliation_string":"Department of Data Science and Artificial Intelligence, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department of Data Science and Artificial Intelligence, Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043817623","display_name":"Zeyu Wang","orcid":"https://orcid.org/0000-0003-0985-4478"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeyu Wang","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-0985-4478","affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072508861","display_name":"Cunjian Chen","orcid":"https://orcid.org/0000-0002-2926-9762"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Cunjian Chen","raw_affiliation_strings":["Department of Data Science and Artificial Intelligence, Monash University, Melbourne, Australia","Department of Data Science and Artificial Intelligence, Monash University, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2926-9762","affiliations":[{"raw_affiliation_string":"Department of Data Science and Artificial Intelligence, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department of Data Science and Artificial Intelligence, Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020799762","display_name":"Ognjen Arandjelovi\u0107","orcid":"https://orcid.org/0000-0002-9314-194X"},"institutions":[{"id":"https://openalex.org/I16835326","display_name":"University of St Andrews","ror":"https://ror.org/02wn5qz54","country_code":"GB","type":"education","lineage":["https://openalex.org/I16835326"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ognjen Arandjelovi\u0107","raw_affiliation_strings":["School of Computer Science, University of St Andrews, St Andrews, U.K","School of Computer Science, University of St Andrews, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-9314-194X","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of St Andrews, St Andrews, U.K","institution_ids":["https://openalex.org/I16835326"]},{"raw_affiliation_string":"School of Computer Science, University of St Andrews, United Kingdom","institution_ids":["https://openalex.org/I16835326"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041734550","display_name":"Chun Pong Lau","orcid":"https://orcid.org/0000-0003-3748-4160"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chun Pong Lau","raw_affiliation_strings":["Department of Data Science, City University of Hong Kong, Hong Kong, China","Department of Data Science, City University of Hong Kong, China"],"raw_orcid":"https://orcid.org/0000-0003-3748-4160","affiliations":[{"raw_affiliation_string":"Department of Data Science, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Data Science, City University of Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5038495575"],"corresponding_institution_ids":["https://openalex.org/I16835326"],"apc_list":null,"apc_paid":null,"fwci":6.5198,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96626544,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"12918","last_page":"12933"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8859999775886536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8859999775886536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.048700001090765,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.008100000210106373,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5800999999046326},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4542999863624573},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4471000134944916},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.40560001134872437},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.39419999718666077},{"id":"https://openalex.org/keywords/misappropriation","display_name":"Misappropriation","score":0.36559998989105225},{"id":"https://openalex.org/keywords/image-restoration","display_name":"Image restoration","score":0.3483000099658966},{"id":"https://openalex.org/keywords/image-editing","display_name":"Image editing","score":0.33469998836517334},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.31690001487731934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8496999740600586},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5800999999046326},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4778999984264374},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4542999863624573},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4471000134944916},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.40560001134872437},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C2780858551","wikidata":"https://www.wikidata.org/wiki/Q3824105","display_name":"Misappropriation","level":2,"score":0.36559998989105225},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.3483000099658966},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.33469998836517334},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3174999952316284},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.31690001487731934},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3156999945640564},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.28290000557899475},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2799000144004822},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.26330000162124634},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.2535000145435333},{"id":"https://openalex.org/C160174412","wikidata":"https://www.wikidata.org/wiki/Q873806","display_name":"Thumbnail","level":3,"score":0.250900000333786}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2025.3639957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3639957","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:research-repository.st-andrews.ac.uk:10023/33281","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TIFS.2025.3639957","pdf_url":null,"source":{"id":"https://openalex.org/S4306400230","display_name":"St Andrews Research Repository (St Andrews Research Repository)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I16835326","host_organization_name":"University of St Andrews","host_organization_lineage":["https://openalex.org/I16835326"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"Journal article"}],"best_oa_location":{"id":"pmh:oai:research-repository.st-andrews.ac.uk:10023/33281","is_oa":true,"landing_page_url":"https://doi.org/10.1109/TIFS.2025.3639957","pdf_url":null,"source":{"id":"https://openalex.org/S4306400230","display_name":"St Andrews Research Repository (St Andrews Research Repository)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I16835326","host_organization_name":"University of St Andrews","host_organization_lineage":["https://openalex.org/I16835326"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"Journal article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advancements":[1],"in":[2,64,131,212],"Latent":[3],"Diffusion":[4],"Models":[5],"(LDMs)":[6],"have":[7,26],"revolutionized":[8],"image":[9,133,203],"synthesis":[10],"and":[11,19,52,87,101,218,220],"manipulation,":[12],"raising":[13],"significant":[14],"concerns":[15],"about":[16],"data":[17],"misappropriation":[18],"intellectual":[20],"property":[21],"infringement.":[22],"While":[23],"adversarial":[24],"attacks":[25],"been":[27],"extensively":[28],"explored":[29],"as":[30],"a":[31,74,110],"protective":[32],"measure":[33],"against":[34],"such":[35],"misuse":[36],"of":[37,120,156],"generative":[38],"AI,":[39],"current":[40],"approaches":[41],"are":[42],"severely":[43],"limited":[44],"by":[45,143,164,182],"their":[46],"heavy":[47],"reliance":[48],"on":[49,105,140,166],"model-specific":[50,141],"knowledge":[51,142],"substantial":[53],"computational":[54,215],"costs.":[55],"Drawing":[56],"inspiration":[57],"from":[58,80],"the":[59,69,148,167,175],"posterior":[60],"collapse":[61,94,100,121],"phenomenon":[62],"observed":[63],"VAE":[65,97,149,168],"training,":[66],"we":[67,90,108],"propose":[68],"Posterior":[70],"Collapse":[71],"Attack":[72],"(PCA),":[73],"novel":[75],"framework":[76],"for":[77,177],"protecting":[78],"images":[79],"unauthorized":[81,202],"manipulation.":[82,134],"Through":[83],"comprehensive":[84],"theoretical":[85],"analysis":[86],"empirical":[88],"validation,":[89],"identify":[91],"two":[92],"distinct":[93],"phenomena":[95],"during":[96],"inference:":[98],"diffusion":[99],"concentration":[102],"collapse.":[103],"Based":[104],"this":[106],"discovery,":[107],"design":[109],"unified":[111],"loss":[112],"function":[113],"that":[114],"can":[115],"flexibly":[116],"achieve":[117],"both":[118],"types":[119],"through":[122],"parameter":[123],"adjustment,":[124],"each":[125],"corresponding":[126],"to":[127,146,190],"different":[128],"protection":[129,163,213],"objectives":[130],"preventing":[132,201],"Our":[135,226],"method":[136],"significantly":[137],"reduces":[138],"dependence":[139],"requiring":[144],"access":[145],"only":[147],"encoder,":[150],"which":[151],"constitutes":[152],"less":[153],"than":[154],"4%":[155],"LDM":[157,197,224],"parameters.":[158],"Notably,":[159],"PCA":[160,189,208],"achieves":[161],"prompt-invariant":[162],"operating":[165],"encoder":[169],"before":[170],"text":[171],"conditioning":[172],"occurs,":[173],"eliminating":[174],"need":[176],"empty":[178],"prompt":[179],"optimization":[180],"required":[181],"existing":[183,210],"methods.":[184],"This":[185],"minimal":[186],"requirement":[187],"enables":[188],"maintain":[191],"adequate":[192],"transferability":[193],"across":[194,222],"various":[195],"VAE-based":[196,223],"architectures":[198],"while":[199],"effectively":[200],"editing.":[204],"Extensive":[205],"experiments":[206],"show":[207],"outperforms":[209],"techniques":[211],"effectiveness,":[214],"efficiency":[216],"(runtime":[217],"VRAM),":[219],"generalization":[221],"variants.":[225],"code":[227],"is":[228],"available":[229],"at":[230],"https://github.com/ZhongliangGuo/PosteriorCollapseAttack.":[231]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-03T00:00:00"}
