{"id":"https://openalex.org/W7137846091","doi":"https://doi.org/10.48550/arxiv.2603.13435","title":"CtrlAttack: A Unified Attack on World-Model Control in Diffusion Models","display_name":"CtrlAttack: A Unified Attack on World-Model Control in Diffusion Models","publication_year":2026,"publication_date":"2026-03-13","ids":{"openalex":"https://openalex.org/W7137846091","doi":"https://doi.org/10.48550/arxiv.2603.13435"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.13435","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13435","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.13435","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123664594","display_name":"Shuhan Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xu, Shuhan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129719250","display_name":"Siyuan Liang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liang, Siyuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zheng, Hongling","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zheng, Hongling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129651598","display_name":"Yong Luo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luo, Yong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129654871","display_name":"Han Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hu, Han","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129751065","display_name":"Lefei Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Lefei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129750783","display_name":"Dacheng Tao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao, Dacheng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5123664594"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8974000215530396,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8974000215530396,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.033799998462200165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.00989999994635582,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.7343000173568726},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5192999839782715},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3853999972343445},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.3028999865055084},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.2994000017642975},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.2700999975204468}],"concepts":[{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.7343000173568726},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5444999933242798},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5192999839782715},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3853999972343445},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.37959998846054077},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32829999923706055},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3215000033378601},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3028999865055084},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.25450000166893005},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.13435","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13435","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.13435","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13435","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4518141448497772,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Diffusion-based":[0],"image-to-video":[1],"(I2V)":[2],"models":[3,205],"increasingly":[4],"exhibit":[5],"world-model-like":[6],"properties":[7],"by":[8,32,162],"implicitly":[9],"capturing":[10],"temporal":[11,54,110,120,160],"dynamics.":[12,211],"However,":[13],"existing":[14],"studies":[15],"have":[16],"mainly":[17],"focused":[18],"on":[19,75],"visual":[20],"quality":[21],"and":[22,24,62,103,138,149,176,190,194],"controllability,":[23],"the":[25,28,33,43,47,64,90,96,114,125,128,132,164,173,180,185,188,199,207],"robustness":[26],"of":[27,49,66,187,203,209],"state":[29,87,116,210],"transition":[30],"learned":[31],"model":[34],"remains":[35],"understudied.":[36],"To":[37],"fill":[38],"this":[39],"gap,":[40],"we":[41,77,94,123],"are":[42],"first":[44],"to":[45,84,127,135,169],"analyze":[46],"vulnerability":[48],"I2V":[50,204],"models,":[51],"find":[52],"that":[53,145],"control":[55],"mechanisms":[56],"constitute":[57],"a":[58,79,99,105],"new":[59],"attack":[60,72,140,165],"surface,":[61],"reveal":[63],"challenge":[65],"modeling":[67],"them":[68],"uniformly":[69],"under":[70,147],"different":[71],"settings.":[73,141],"Based":[74],"this,":[76],"propose":[78],"trajectory-control":[80],"attack,":[81],"called":[82],"CtrlAttack,":[83],"interfere":[85],"with":[86],"evolution":[88],"during":[89],"generation":[91],"process.":[92],"Specifically,":[93],"represent":[95],"perturbation":[97,126,152],"as":[98],"low-dimensional":[100,148],"velocity":[101],"field":[102,108],"construct":[104],"continuous":[106],"displacement":[107],"via":[109],"integration,":[111],"thereby":[112],"affecting":[113],"model's":[115],"transitions":[117],"while":[118,183],"maintaining":[119],"consistency;":[121],"meanwhile,":[122],"map":[124],"observation":[129],"space,":[130],"making":[131],"method":[133,155],"applicable":[134],"both":[136],"white-box":[137,174],"black-box":[139,181],"Experimental":[142],"results":[143],"show":[144],"even":[146],"strongly":[150],"regularized":[151],"constraints,":[153],"our":[154],"can":[156],"still":[157],"significantly":[158],"disrupt":[159],"consistency":[161],"increasing":[163],"success":[166],"rate":[167],"(ASR)":[168],"over":[170,177],"90%":[171],"in":[172,179],"setting":[175],"80%":[178],"setting,":[182],"keeping":[184],"variation":[186],"FID":[189],"FVD":[191],"within":[192],"6":[193],"130,":[195],"respectively,":[196],"thus":[197],"revealing":[198],"potential":[200],"security":[201],"risk":[202],"at":[206],"level":[208]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2026-03-18T00:00:00"}
