{"id":"https://openalex.org/W7138890939","doi":"https://doi.org/10.48550/arxiv.2603.17828","title":"TINA: Text-Free Inversion Attack for Unlearned Text-to-Image Diffusion Models","display_name":"TINA: Text-Free Inversion Attack for Unlearned Text-to-Image Diffusion Models","publication_year":2026,"publication_date":"2026-03-18","ids":{"openalex":"https://openalex.org/W7138890939","doi":"https://doi.org/10.48550/arxiv.2603.17828"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.17828","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17828","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.17828","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xiang, Qianlong","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiang, Qianlong","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130092521","display_name":"Miao Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Miao","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129766454","display_name":"Haoyu Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Haoyu","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080128600","display_name":"Kun Wang","orcid":"https://orcid.org/0000-0003-0691-7058"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Kun","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129855474","display_name":"Junhui Hou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hou, Junhui","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129916894","display_name":"Liqiang Nie","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nie, Liqiang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.4399999976158142,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.4399999976158142,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.39570000767707825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.020500000566244125,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.8834999799728394},{"id":"https://openalex.org/keywords/inversion","display_name":"Inversion (geology)","score":0.7700999975204468},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7014999985694885},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6549000144004822},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.45249998569488525},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.31349998712539673}],"concepts":[{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.8834999799728394},{"id":"https://openalex.org/C1893757","wikidata":"https://www.wikidata.org/wiki/Q3653001","display_name":"Inversion (geology)","level":3,"score":0.7700999975204468},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7014999985694885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.670199990272522},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6549000144004822},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.45249998569488525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43689998984336853},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.31349998712539673},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.2824000120162964},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2791000008583069},{"id":"https://openalex.org/C66024118","wikidata":"https://www.wikidata.org/wiki/Q1122506","display_name":"Computational model","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C2986089797","wikidata":"https://www.wikidata.org/wiki/Q6501338","display_name":"Visual attention","level":3,"score":0.2565000057220459},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2529999911785126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.17828","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17828","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.17828","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.17828","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4836733341217041}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Although":[0],"text-to-image":[1,72],"diffusion":[2],"models":[3,196],"exhibit":[4],"remarkable":[5],"generative":[6,103,118],"power,":[7],"concept":[8,108],"erasure":[9,34,53,68],"techniques":[10],"are":[11],"essential":[12],"for":[13,105,216],"their":[14],"safe":[15],"deployment":[16],"to":[17,41,81,99,170],"prevent":[18],"the":[19,31,37,50,71,76,106,134,172],"creation":[20],"of":[21,33,52,203],"harmful":[22],"content.":[23],"This":[24],"has":[25,47,59],"fostered":[26],"a":[27,62,93,102,116,143,156],"dynamic":[28],"interplay":[29],"between":[30],"development":[32],"defenses":[35,132],"and":[36,44],"adversarial":[38,57],"probes":[39],"designed":[40],"bypass":[42],"them,":[43],"this":[45,56,88,150],"co-evolution":[46,58],"progressively":[48],"enhanced":[49],"efficacy":[51],"methods.":[54],"However,":[55,113],"converged":[60],"on":[61,221],"narrow,":[63],"text-centric":[64,131,162],"paradigm":[65],"that":[66,75,176,190,206,218],"equates":[67],"with":[69,198],"severing":[70],"mapping,":[73],"ignoring":[74],"underlying":[77],"visual":[78,94,117,223],"knowledge":[79],"related":[80],"undesired":[82],"concepts":[83,194],"still":[84,110],"persist.":[85],"To":[86,137],"substantiate":[87],"claim,":[89],"we":[90,140],"investigate":[91],"from":[92,195],"perspective,":[95],"leveraging":[96],"DDIM":[97,125],"inversion":[98,126,180],"probe":[100,152],"whether":[101],"pathway":[104,119],"erased":[107,135,193],"can":[109],"be":[111],"found.":[112],"identifying":[114],"such":[115],"is":[120,127],"challenging":[121],"because":[122],"standard":[123,179],"text-guided":[124],"actively":[128],"resisted":[129],"by":[130,153],"within":[133],"model.":[136],"address":[138],"this,":[139],"introduce":[141],"TINA,":[142],"novel":[144],"Text-free":[145],"INversion":[146],"Attack,":[147],"which":[148],"enforces":[149],"visual-only":[151],"operating":[154],"under":[155],"null-text":[157],"condition,":[158],"thereby":[159],"avoiding":[160],"existing":[161],"defenses.":[163],"Moreover,":[164],"TINA":[165,191,204],"integrates":[166],"an":[167,213],"optimization":[168],"procedure":[169],"overcome":[171],"accumulating":[173],"approximation":[174],"errors":[175],"arise":[177],"when":[178],"operates":[181],"without":[182],"its":[183],"usual":[184],"textual":[185],"guidance.":[186],"Our":[187],"experiments":[188],"demonstrate":[189],"regenerates":[192],"treated":[197],"state-of-the-art":[199],"unlearning.":[200],"The":[201],"success":[202],"proves":[205],"current":[207],"methods":[208],"merely":[209],"obscure":[210],"concepts,":[211],"highlighting":[212],"urgent":[214],"need":[215],"paradigms":[217],"operate":[219],"directly":[220],"internal":[222],"knowledge.":[224]},"counts_by_year":[],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2026-03-20T00:00:00"}
