{"id":"https://openalex.org/W7117308532","doi":"https://doi.org/10.1109/tifs.2025.3648660","title":"Toward Dataset Copyright Evasion Attack Against Personalized Text-to-Image Diffusion Models","display_name":"Toward Dataset Copyright Evasion Attack Against Personalized Text-to-Image Diffusion Models","publication_year":2025,"publication_date":"2025-12-26","ids":{"openalex":"https://openalex.org/W7117308532","doi":"https://doi.org/10.1109/tifs.2025.3648660"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3648660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3648660","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038862367","display_name":"Kuofeng Gao","orcid":"https://orcid.org/0000-0002-5667-8238"},"institutions":[{"id":"https://openalex.org/I4210114105","display_name":"Tsinghua\u2013Berkeley Shenzhen Institute","ror":"https://ror.org/02hhwwz98","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210114105","https://openalex.org/I95457486","https://openalex.org/I99065089"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kuofeng Gao","raw_affiliation_strings":["Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210114105","https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026010912","display_name":"Yufei Zhu","orcid":"https://orcid.org/0000-0002-1298-5607"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yufei Zhu","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113134285","display_name":"Yiming Li","orcid":"https://orcid.org/0000-0001-5871-2316"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yiming Li","raw_affiliation_strings":["Nanyang Technological University, Jurong West, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022446997","display_name":"Jiawang Bai","orcid":"https://orcid.org/0000-0002-1472-6465"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiawang Bai","raw_affiliation_strings":["Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121349247","display_name":"Yong Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114105","display_name":"Tsinghua\u2013Berkeley Shenzhen Institute","ror":"https://ror.org/02hhwwz98","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210114105","https://openalex.org/I95457486","https://openalex.org/I99065089"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yang","raw_affiliation_strings":["Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210114105","https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101942240","display_name":"Zhen Li","orcid":"https://orcid.org/0000-0003-3338-228X"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhifeng Li","raw_affiliation_strings":["Tencent, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tencent, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089213156","display_name":"Shu-Tao Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114105","display_name":"Tsinghua\u2013Berkeley Shenzhen Institute","ror":"https://ror.org/02hhwwz98","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210114105","https://openalex.org/I95457486","https://openalex.org/I99065089"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shu-Tao Xia","raw_affiliation_strings":["Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210114105","https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5038862367"],"corresponding_institution_ids":["https://openalex.org/I4210114105","https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.81329681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"725","last_page":"740"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8174999952316284,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8174999952316284,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.10499999672174454,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.007799999788403511,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8709999918937683},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6880000233650208},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6820999979972839},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.5885999798774719},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4691999852657318},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.42160001397132874},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3919999897480011},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.3686000108718872},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.36500000953674316}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8773999810218811},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8709999918937683},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6880000233650208},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6820999979972839},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.5885999798774719},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47839999198913574},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4691999852657318},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4383000135421753},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.42160001397132874},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.36500000953674316},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3433000147342682},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3230000138282776},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.32010000944137573},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3089999854564667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29269999265670776},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.29120001196861267},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2822999954223633},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.27489998936653137},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C3770464","wikidata":"https://www.wikidata.org/wiki/Q775963","display_name":"Smoothing","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.26840001344680786},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.25690001249313354}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2025.3648660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3648660","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/212335","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/212335","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2151092698","https://openalex.org/W2473418344","https://openalex.org/W2739244955","https://openalex.org/W2942091739","https://openalex.org/W2964184826","https://openalex.org/W3014625547","https://openalex.org/W3021342796","https://openalex.org/W3090698787","https://openalex.org/W3217374154","https://openalex.org/W4281672231","https://openalex.org/W4283717982","https://openalex.org/W4312388283","https://openalex.org/W4312740349","https://openalex.org/W4312819349","https://openalex.org/W4312933868","https://openalex.org/W4362714395","https://openalex.org/W4379116771","https://openalex.org/W4386072096","https://openalex.org/W4386076050","https://openalex.org/W4386076425","https://openalex.org/W4386076532","https://openalex.org/W4386113271","https://openalex.org/W4387967988","https://openalex.org/W4387968150","https://openalex.org/W4389279189","https://openalex.org/W4390872151","https://openalex.org/W4390872387","https://openalex.org/W4390873054","https://openalex.org/W4393148714","https://openalex.org/W4394586040","https://openalex.org/W4394593019","https://openalex.org/W4404102669","https://openalex.org/W4404725244","https://openalex.org/W4411337324","https://openalex.org/W4413145132","https://openalex.org/W4413145835","https://openalex.org/W4415795398"],"related_works":[],"abstract_inverted_index":{"Text-to-image":[0],"(T2I)":[1],"diffusion":[2,146],"models":[3,16,85,160],"enable":[4],"high-quality":[5],"image":[6,130],"generation":[7],"conditioned":[8],"on":[9,50,87,163],"textual":[10],"prompts.":[11],"However,":[12],"fine-tuning":[13,41],"these":[14,82],"pre-trained":[15],"for":[17],"personalization":[18],"raises":[19],"concerns":[20],"about":[21],"unauthorized":[22],"dataset":[23,29],"usage.":[24],"To":[25,132],"address":[26],"this":[27,74,133],"issue,":[28],"ownership":[30,92],"verification":[31],"(DOV)":[32],"has":[33],"recently":[34],"been":[35],"proposed,":[36],"which":[37],"embeds":[38],"watermarks":[39,47,125],"into":[40],"datasets":[42,89],"via":[43],"backdoor":[44,105],"techniques.":[45],"These":[46],"remain":[48],"dormant":[49],"benign":[51],"samples":[52,165,190],"but":[53],"produce":[54],"owner-specified":[55],"outputs":[56],"when":[57,124],"triggered.":[58],"Despite":[59],"its":[60],"promise,":[61],"the":[62,98,138,156,186,210],"robustness":[63],"of":[64,100,150,188],"DOV":[65,143,221],"against":[66],"copyright":[67],"evasion":[68],"attacks":[69,102],"(CEA)":[70],"remains":[71],"unexplored.":[72],"In":[73,111],"paper,":[75],"we":[76,135,175,181,201],"investigate":[77],"how":[78],"adversaries":[79],"can":[80],"circumvent":[81],"mechanisms,":[83],"enabling":[84],"trained":[86],"watermarked":[88,164,178],"to":[90,119,168,195,208],"bypass":[91],"verification.":[93],"We":[94],"begin":[95],"by":[96,104,155],"analyzing":[97],"limitations":[99],"potential":[101],"achieved":[103],"removal,":[106],"including":[107],"TPD":[108,113],"and":[109,191,199],"T2IShield.":[110],"practice,":[112],"suffers":[114],"from":[115,185],"inconsistent":[116],"effectiveness":[117],"due":[118],"randomness,":[120],"while":[121,223],"T2IShield":[122],"fails":[123],"are":[126],"embedded":[127],"as":[128],"local":[129],"patches.":[131],"end,":[134],"introduce":[136],"CEAT2I,":[137],"first":[139],"CEA":[140],"specifically":[141],"targeting":[142],"in":[144],"T2I":[145,159],"models.":[147],"CEAT2I":[148,217],"consists":[149],"three":[151],"stages:":[152],"(1)":[153],"motivated":[154],"observation":[157],"that":[158,216],"converge":[161],"faster":[162],"with":[166],"respect":[167],"intermediate":[169],"features":[170],"rather":[171],"than":[172],"training":[173],"loss,":[174],"reliably":[176],"detect":[177],"samples;":[179],"(2)":[180],"iteratively":[182],"ablate":[183],"tokens":[184],"prompts":[187],"detected":[189],"monitor":[192],"feature":[193],"shifts":[194],"identify":[196],"trigger":[197],"tokens;":[198],"(3)":[200],"apply":[202],"a":[203],"closed-form":[204],"concept":[205],"erasure":[206],"method":[207],"remove":[209],"injected":[211],"watermarks.":[212],"Extensive":[213],"experiments":[214],"demonstrate":[215],"effectively":[218],"evades":[219],"state-of-the-art":[220],"mechanisms":[222],"preserving":[224],"model":[225],"performance.":[226],"The":[227],"code":[228],"is":[229],"available":[230],"at":[231],"https://github.com/csyufei/CEAT2I.":[232]},"counts_by_year":[],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-12-26T00:00:00"}
