{"id":"https://openalex.org/W7127296917","doi":"https://doi.org/10.48550/arxiv.2602.00350","title":"ReLAPSe: Reinforcement-Learning-trained Adversarial Prompt Search for Erased concepts in unlearned diffusion models","display_name":"ReLAPSe: Reinforcement-Learning-trained Adversarial Prompt Search for Erased concepts in unlearned diffusion models","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7127296917","doi":"https://doi.org/10.48550/arxiv.2602.00350"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.00350","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120025411","display_name":"Ignacy Kolton","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kolton, Ignacy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120025410","display_name":"Kacper Marzol","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marzol, Kacper","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000466672","display_name":"Pawe\u0142 Batorski","orcid":"https://orcid.org/0009-0007-0450-4141"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Batorski, Pawe\u0142","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090307584","display_name":"M. Mazur","orcid":"https://orcid.org/0000-0002-3440-8173"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mazur, Marcin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070897658","display_name":"Paul Swoboda","orcid":"https://orcid.org/0000-0003-4065-8758"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Swoboda, Paul","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124934977","display_name":"Przemys\u0142aw Spurek","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Spurek, Przemys\u0142aw","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5120025411"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4805000126361847,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4805000126361847,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.3560999929904938,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.018300000578165054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7495999932289124},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5842000246047974},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5385000109672546},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.511900007724762},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4763999879360199},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.37070000171661377},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.36730000376701355}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7495999932289124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6796000003814697},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5842000246047974},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5385000109672546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5249999761581421},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.511900007724762},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4763999879360199},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3781000077724457},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.37070000171661377},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.36730000376701355},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.36660000681877136},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.32280001044273376},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C40506919","wikidata":"https://www.wikidata.org/wiki/Q7452469","display_name":"Sequence learning","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2630999982357025},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C2779321571","wikidata":"https://www.wikidata.org/wiki/Q7936605","display_name":"Visual learning","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.00350","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.00350","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.00350","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.00350","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Machine":[0],"unlearning":[1,161],"is":[2,185],"a":[3,74,83,106,164],"key":[4],"defense":[5],"mechanism":[6],"for":[7,30,167],"removing":[8],"unauthorized":[9],"concepts":[10],"from":[11,60,141],"text-to-image":[12],"diffusion":[13,100,172],"models,":[14],"yet":[15],"recent":[16],"evidence":[17],"shows":[18],"that":[19,78],"latent":[20,64,121],"visual":[21,65,122,179],"information":[22],"often":[23],"persists":[24],"after":[25],"unlearning.":[26],"Existing":[27],"adversarial":[28,76],"approaches":[29],"exploiting":[31],"this":[32],"leakage":[33],"are":[34,41],"constrained":[35],"by":[36],"fundamental":[37],"limitations:":[38],"optimization-based":[39],"methods":[40],"computationally":[42],"expensive":[43],"due":[44],"to":[45,127,144],"per-instance":[46,142],"iterative":[47],"search.":[48],"At":[49],"the":[50,61,99,125,139],"same":[51],"time,":[52],"reasoning-based":[53],"and":[54,108,156],"heuristic":[55],"techniques":[56],"lack":[57],"direct":[58],"feedback":[59,110],"target":[62],"model's":[63,101],"representations.":[66],"To":[67],"address":[68],"these":[69],"challenges,":[70],"we":[71],"introduce":[72],"ReLAPSe,":[73],"policy-based":[75],"framework":[77],"reformulates":[79],"concept":[80],"restoration":[81,130],"as":[82,105,182],"reinforcement":[84],"learning":[85],"problem.":[86],"ReLAPSe":[87,148],"trains":[88],"an":[89],"agent":[90,126],"using":[91],"Reinforcement":[92],"Learning":[93],"with":[94,120],"Verifiable":[95],"Rewards":[96],"(RLVR),":[97],"leveraging":[98],"noise":[102],"prediction":[103],"loss":[104],"model-intrinsic":[107],"verifiable":[109],"signal.":[111],"This":[112],"closed-loop":[113],"design":[114],"directly":[115],"aligns":[116],"textual":[117],"prompt":[118],"manipulation":[119],"residuals,":[123],"enabling":[124],"learn":[128],"transferable":[129],"strategies":[131],"rather":[132],"than":[133],"optimizing":[134],"isolated":[135],"prompts.":[136],"By":[137],"pioneering":[138],"shift":[140],"optimization":[143],"global":[145],"policy":[146],"learning,":[147],"achieves":[149],"efficient,":[150],"near-real-time":[151],"recovery":[152],"of":[153,170],"fine-grained":[154],"identities":[155],"styles":[157],"across":[158],"multiple":[159],"state-of-the-art":[160],"methods,":[162],"providing":[163],"scalable":[165],"tool":[166],"rigorous":[168],"red-teaming":[169],"unlearned":[171],"models.":[173],"Some":[174],"experimental":[175],"evaluations":[176],"involve":[177],"sensitive":[178],"concepts,":[180],"such":[181],"nudity.":[183],"Code":[184],"available":[186],"at":[187],"https://github.com/gmum/ReLaPSe":[188]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-04T00:00:00"}
