{"id":"https://openalex.org/W4415537440","doi":"https://doi.org/10.1145/3746027.3754928","title":"Universally Unfiltered and Unseen: Input-Agnostic Multimodal Jailbreaks against Text-to-Image Model Safeguards","display_name":"Universally Unfiltered and Unseen: Input-Agnostic Multimodal Jailbreaks against Text-to-Image Model Safeguards","publication_year":2025,"publication_date":"2025-10-25","ids":{"openalex":"https://openalex.org/W4415537440","doi":"https://doi.org/10.1145/3746027.3754928"},"language":null,"primary_location":{"id":"doi:10.1145/3746027.3754928","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3754928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Song Yan","orcid":"https://orcid.org/0009-0008-5704-2486"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Song Yan","raw_affiliation_strings":["Information Engineering University, Zhengzhou, Henan, China"],"raw_orcid":"https://orcid.org/0009-0008-5704-2486","affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101529425","display_name":"Hui Wei","orcid":"https://orcid.org/0000-0002-2144-2065"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wei","raw_affiliation_strings":["School of Computer Science, Wuhan University, Wuhan, Hubei, China"],"raw_orcid":"https://orcid.org/0000-0002-2144-2065","affiliations":[{"raw_affiliation_string":"School of Computer Science, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027205215","display_name":"Jinlong Fei","orcid":"https://orcid.org/0000-0001-8499-9402"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinlong Fei","raw_affiliation_strings":["Information Engineering University, Zhengzhou, Henan, China"],"raw_orcid":"https://orcid.org/0000-0001-8499-9402","affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Guoliang Yang","orcid":"https://orcid.org/0009-0004-7624-6442"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoliang Yang","raw_affiliation_strings":["Information Engineering University, Zhengzhou, Henan, China"],"raw_orcid":"https://orcid.org/0009-0004-7624-6442","affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058084433","display_name":"Zhengyu Zhao","orcid":"https://orcid.org/0000-0003-0745-4294"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengyu Zhao","raw_affiliation_strings":["Xi'an Jiaotong University, Xi'an, Shanxi, China"],"raw_orcid":"https://orcid.org/0000-0003-0745-4294","affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong University, Xi'an, Shanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401164","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0003-3846-9157"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["School of Computer Science, Wuhan University, Wuhan, Hubei, China"],"raw_orcid":"https://orcid.org/0000-0003-3846-9157","affiliations":[{"raw_affiliation_string":"School of Computer Science, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28659418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"11279","last_page":"11287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/paraphrase","display_name":"Paraphrase","score":0.7207000255584717},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5691999793052673},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5174000263214111},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.5001000165939331},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.49300000071525574},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4171999990940094}],"concepts":[{"id":"https://openalex.org/C2780922921","wikidata":"https://www.wikidata.org/wiki/Q255189","display_name":"Paraphrase","level":2,"score":0.7207000255584717},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6872000098228455},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5691999793052673},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5174000263214111},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.49300000071525574},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3977999985218048},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3772999942302704},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.29280000925064087},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.29100000858306885},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.2581999897956848},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3746027.3754928","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3754928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W4312933868","https://openalex.org/W4386066536","https://openalex.org/W4387839270","https://openalex.org/W4388858734","https://openalex.org/W4390871724","https://openalex.org/W4394007006","https://openalex.org/W4402264152"],"related_works":[],"abstract_inverted_index":{"Various":[0],"(text)":[1],"prompt":[2,104,135],"filters":[3,105],"and":[4,46,54,65,91,122,137],"(image)":[5],"safety":[6,89,138],"checkers":[7,90],"have":[8,36],"been":[9,37],"implemented":[10],"to":[11,26,44,86,101],"mitigate":[12],"the":[13,83,114,129,149],"misuse":[14],"of":[15,31,116,161],"Text-to-Image":[16],"(T2I)":[17],"models":[18],"in":[19],"creating":[20],"Not-Safe-For-Work":[21],"(NSFW)":[22],"content.":[23,163],"In":[24],"order":[25],"expose":[27],"potential":[28],"security":[29],"vulnerabilities":[30],"such":[32],"safeguards,":[33],"multimodal":[34,69,151],"jailbreaks":[35,41],"studied.":[38],"However,":[39],"existing":[40],"are":[42],"limited":[43],"prompt-specific":[45],"image-specific":[47],"perturbations,":[48],"which":[49],"suffer":[50],"from":[51,97],"poor":[52],"scalability":[53],"time-consuming":[55],"optimization.":[56],"To":[57],"address":[58],"these":[59],"limitations,":[60],"we":[61],"propose":[62],"Universally":[63],"Unfiltered":[64],"Unseen":[66],"(U3)-Attack,":[67],"a":[68,93,98],"jailbreak":[70,152],"attack":[71],"method":[72],"against":[73],"T2I":[74,124],"safeguards.":[75],"Specifically,":[76],"U3-Attack":[77,118,141],"optimizes":[78,92],"an":[79],"adversarial":[80],"patch":[81],"on":[82,119,128],"image":[84],"background":[85],"universally":[87,102],"bypass":[88,103],"safe":[94],"paraphrase":[95],"set":[96],"sensitive":[99],"word":[100],"while":[106],"eliminating":[107],"redundant":[108],"computations.":[109],"Extensive":[110],"experimental":[111],"results":[112],"demonstrate":[113],"superiority":[115],"our":[117,140],"both":[120,134],"open-source":[121],"commercial":[123,130],"models.":[125],"For":[126],"example,":[127],"Runway-inpainting":[131],"model":[132],"with":[133],"filter":[136],"checker,":[139],"achieves":[142],"approximately":[143],"4\u00d7":[144],"higher":[145],"success":[146],"rates":[147],"than":[148],"state-of-the-art":[150],"attack,":[153],"MMA-Diffusion.":[154],"Content":[155],"Warning:":[156],"This":[157],"paper":[158],"includes":[159],"examples":[160],"NSFW":[162]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-25T00:00:00"}
