{"id":"https://openalex.org/W7127271214","doi":"https://doi.org/10.48550/arxiv.2602.00420","title":"Text is All You Need for Vision-Language Model Jailbreaking","display_name":"Text is All You Need for Vision-Language Model Jailbreaking","publication_year":2026,"publication_date":"2026-01-31","ids":{"openalex":"https://openalex.org/W7127271214","doi":"https://doi.org/10.48550/arxiv.2602.00420"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.00420","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024875373","display_name":"Y. S. Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chen, Yihang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124943572","display_name":"Zhao Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu, Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124898353","display_name":"Youyuan Jiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiang, Youyuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124902185","display_name":"Tianle Zheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zheng, Tianle","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5124960610","display_name":"Cho-Jui Hsieh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hsieh, Cho-Jui","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024875373"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.007899999618530273,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.005400000140070915,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6571000218391418},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6543999910354614},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5968000292778015},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.546500027179718},{"id":"https://openalex.org/keywords/distraction","display_name":"Distraction","score":0.5234000086784363}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7519999742507935},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6571000218391418},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6543999910354614},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5968000292778015},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.546500027179718},{"id":"https://openalex.org/C2776378700","wikidata":"https://www.wikidata.org/wiki/Q3030775","display_name":"Distraction","level":2,"score":0.5234000086784363},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42329999804496765},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.3650999963283539},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32280001044273376},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.00420","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.00420","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.00420","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.00420","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.751224935054779,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Large":[0],"Vision-Language":[1],"Models":[2],"(LVLMs)":[3],"are":[4,87,186],"increasingly":[5],"equipped":[6],"with":[7,112],"robust":[8,188],"safety":[9,131,159],"safeguards":[10,46],"to":[11,14,90,103,162,189],"prevent":[12],"responses":[13],"harmful":[15,67,92],"or":[16,29],"disallowed":[17],"prompts.":[18],"However,":[19],"these":[20,45],"defenses":[21,198],"often":[22],"focus":[23],"on":[24],"analyzing":[25],"explicit":[26],"textual":[27],"inputs":[28],"relevant":[30],"visual":[31],"scenes.":[32],"In":[33],"this":[34,126,138],"work,":[35],"we":[36,63,79,95],"introduce":[37],"Text-DJ,":[38],"a":[39,65,81,108,168,178],"novel":[40],"jailbreak":[41],"attack":[42,139],"that":[43,86,125,185],"bypasses":[44],"by":[47,141],"exploiting":[48],"the":[49,91,104,113,116,121,130,157,164,195],"model's":[50,158],"Optical":[51],"Character":[52],"Recognition":[53],"(OCR)":[54],"capability.":[55],"Our":[56],"methodology":[57],"consists":[58],"of":[59,83,110,115,133,171],"three":[60],"stages.":[61],"First,":[62],"decompose":[64],"single":[66],"query":[68],"into":[69,146],"multiple":[70],"and":[71,100,152],"semantically":[72],"related":[73],"but":[74],"more":[75],"benign":[76],"sub-queries.":[77],"Second,":[78],"pick":[80],"set":[82],"distraction":[84,101],"queries":[85,102],"maximally":[88],"irrelevant":[89,172],"query.":[93],"Third,":[94],"present":[96],"all":[97],"decomposed":[98],"sub-queries":[99,117,166],"LVLM":[105],"simultaneously":[106],"as":[107],"grid":[109],"images,":[111,147],"position":[114],"being":[118],"middle":[119],"within":[120,167],"grid.":[122],"We":[123,136],"demonstrate":[124],"method":[127],"successfully":[128],"circumvents":[129],"alignment":[132],"state-of-the-art":[134],"LVLMs.":[135],"argue":[137],"succeeds":[140],"(1)":[142],"converting":[143],"text-based":[144,150],"prompts":[145],"bypassing":[148],"standard":[149],"filters,":[151],"(2)":[153],"inducing":[154],"distractions,":[155],"where":[156],"protocols":[160],"fail":[161],"link":[163],"scattered":[165],"high":[169],"number":[170],"queries.":[173],"Overall,":[174],"our":[175],"findings":[176],"expose":[177],"critical":[179],"vulnerability":[180],"in":[181],"LVLMs'":[182],"OCR":[183],"capabilities":[184],"not":[187],"dispersed,":[190],"multi-image":[191],"adversarial":[192],"inputs,":[193],"highlighting":[194],"need":[196],"for":[197,199],"fragmented":[200],"multimodal":[201],"inputs.":[202]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-04T00:00:00"}
