{"id":"https://openalex.org/W4403791541","doi":"https://doi.org/10.1145/3664647.3681243","title":"Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization","display_name":"Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization","publication_year":2024,"publication_date":"2024-10-26","ids":{"openalex":"https://openalex.org/W4403791541","doi":"https://doi.org/10.1145/3664647.3681243"},"language":"en","primary_location":{"id":"doi:10.1145/3664647.3681243","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664647.3681243","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664647.3681243","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086523502","display_name":"Yisu Liu","orcid":"https://orcid.org/0009-0002-8490-472X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yisu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100595021","display_name":"Jinyang An","orcid":"https://orcid.org/0009-0009-0327-3809"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyang An","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017704875","display_name":"Wanqian Zhang","orcid":"https://orcid.org/0000-0001-5734-4072"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanqian Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002436544","display_name":"Dayan Wu","orcid":"https://orcid.org/0000-0002-8604-7226"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dayan Wu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101650770","display_name":"J GU","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingzi Gu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067997634","display_name":"Zheng Lin","orcid":"https://orcid.org/0000-0002-8432-1658"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Lin","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100442321","display_name":"Weiping Wang","orcid":"https://orcid.org/0000-0002-8618-4992"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiping Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5086523502"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.9365,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.92683842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3587","last_page":"3596"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.7256243228912354},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6716499924659729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6602562069892883},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.6459811925888062},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36397117376327515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3306533694267273},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09629446268081665},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07234662771224976}],"concepts":[{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.7256243228912354},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6716499924659729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6602562069892883},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.6459811925888062},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36397117376327515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3306533694267273},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09629446268081665},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07234662771224976},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664647.3681243","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664647.3681243","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664647.3681243","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664647.3681243","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM International Conference on Multimedia","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W398859631","https://openalex.org/W1834627138","https://openalex.org/W1982471090","https://openalex.org/W2612690371","https://openalex.org/W2774644650","https://openalex.org/W2963839617","https://openalex.org/W2963966654","https://openalex.org/W2969985801","https://openalex.org/W3034552680","https://openalex.org/W3035574324","https://openalex.org/W3092709185","https://openalex.org/W3127084502","https://openalex.org/W3164572690","https://openalex.org/W3174508664","https://openalex.org/W3200063310","https://openalex.org/W3204817308","https://openalex.org/W3206071277","https://openalex.org/W4212774754","https://openalex.org/W4214926101","https://openalex.org/W4281255367","https://openalex.org/W4281485151","https://openalex.org/W4297811796","https://openalex.org/W4304015019","https://openalex.org/W4304092092","https://openalex.org/W4312911690","https://openalex.org/W4312914048","https://openalex.org/W4312933868","https://openalex.org/W4312977351","https://openalex.org/W4361003656","https://openalex.org/W4377231695","https://openalex.org/W4386072096","https://openalex.org/W4386076215","https://openalex.org/W4386076425","https://openalex.org/W4386590770","https://openalex.org/W4387968109","https://openalex.org/W4390871705","https://openalex.org/W4390873345","https://openalex.org/W4390874393","https://openalex.org/W4402753564","https://openalex.org/W4402980344"],"related_works":["https://openalex.org/W2072016134","https://openalex.org/W2351168932","https://openalex.org/W2465690287","https://openalex.org/W2108143034","https://openalex.org/W2376389741","https://openalex.org/W1997850251","https://openalex.org/W2084549431","https://openalex.org/W913430005","https://openalex.org/W1509695971","https://openalex.org/W1985021129"],"abstract_inverted_index":{"With":[0],"the":[1,15,24,63,70,87,95,106,120,127,133,139,142,146,165,176],"development":[2],"of":[3,44,141,145,181,186],"diffusion-based":[4],"customization":[5,64],"methods":[6,178],"like":[7],"DreamBooth,":[8],"individuals":[9],"now":[10],"have":[11,28],"access":[12],"to":[13,32,51,61,85,124,162],"train":[14],"models":[16],"that":[17,105],"can":[18],"generate":[19],"their":[20],"personalized":[21],"images.":[22],"Despite":[23],"convenience,":[25],"malicious":[26],"users":[27,53],"misused":[29],"these":[30],"techniques":[31],"create":[33],"fake":[34],"images,":[35],"thereby":[36],"triggering":[37],"a":[38,80,157,170],"privacy":[39],"security":[40],"crisis.":[41],"In":[42,72],"light":[43],"this,":[45],"proactive":[46],"adversarial":[47,57,82],"attacks":[48],"are":[49,59],"proposed":[50],"protect":[52],"against":[54],"customization.":[55],"The":[56],"examples":[58],"trained":[60],"distort":[62],"model's":[65],"outputs":[66],"and":[67,102,131,155,184,193],"thus":[68],"block":[69],"misuse.":[71],"this":[73],"paper,":[74],"we":[75,118,137],"propose":[76,119],"DisDiff":[77,174],"(Disrupting":[78],"Diffusion),":[79],"novel":[81,158],"attack":[83,154],"method":[84],"disrupt":[86,132],"diffusion":[88,147],"model":[89,148],"outputs.":[90],"We":[91],"first":[92],"delve":[93],"into":[94],"intrinsic":[96],"image-text":[97],"relationships,":[98],"well-known":[99],"as":[100],"cross-attention,":[101],"empirically":[103],"find":[104],"subject-identifier":[107],"token":[108],"plays":[109],"an":[110],"important":[111],"role":[112],"in":[113,169],"guiding":[114],"image":[115],"generation.":[116],"Thus,":[117],"Cross-Attention":[121],"Erasure":[122],"module":[123],"explicitly":[125],"\"erase\"":[126],"indicated":[128],"attention":[129],"maps":[130],"text":[134],"guidance.":[135],"Besides,":[136],"analyze":[138],"influence":[140],"sampling":[143],"process":[144],"on":[149,198],"Projected":[150],"Gradient":[151],"Descent":[152],"(PGD)":[153],"introduce":[156],"Merit":[159],"Sampling":[160],"Scheduler":[161],"adaptively":[163],"modulate":[164],"perturbation":[166],"updating":[167],"amplitude":[168],"step-aware":[171],"manner.":[172],"Our":[173],"outperforms":[175],"state-of-the-art":[177],"by":[179],"12.75%":[180],"FDFR":[182],"scores":[183,188],"7.25%":[185],"ISM":[187],"across":[189],"two":[190,194],"facial":[191],"benchmarks":[192],"commonly":[195],"used":[196],"prompts":[197],"average.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
