{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:50:06Z","timestamp":1740102606544,"version":"3.37.3"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1109\/ictai59109.2023.00093","type":"proceedings-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T19:19:02Z","timestamp":1703099942000},"page":"586-594","source":"Crossref","is-referenced-by-count":0,"title":["Destruction-Restoration Suppresses Data Protection Perturbations against Diffusion Models"],"prefix":"10.1109","author":[{"given":"Tianrui","family":"Qin","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences,Shenzhen,China"}]},{"given":"Xitong","family":"Gao","sequence":"additional","affiliation":[{"name":"Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences,Shenzhen,China"}]},{"given":"Juanjuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences,Shenzhen,China"}]},{"given":"Kejiang","family":"Ye","sequence":"additional","affiliation":[{"name":"Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Anti-DreamBooth: Protecting users from personalized text-to-image synthesis","author":"Van Le","year":"2023","journal-title":"ICCV"},{"key":"ref2","article-title":"Raising the cost of malicious ai-powered image editing","author":"Salman","year":"2023","journal-title":"ICML"},{"key":"ref3","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","author":"Sohl-Dickstein","year":"2015","journal-title":"ICML"},{"key":"ref4","article-title":"Denoising diffusion probabilistic models","author":"Ho","year":"2020","journal-title":"NeurIPS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref6","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020","journal-title":"ICLR"},{"year":"2022","key":"ref7","article-title":"Midjourney"},{"key":"ref8","article-title":"Hierarchical text-conditional image generation with clip latents","author":"Ramesh","year":"2022","journal-title":"arXiv preprint arXiv:2204.06125"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00582"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01764"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01606-8"},{"key":"ref14","article-title":"Image Shortcut Squeezing: Countering perturbative availability poisons with compression","author":"Liu","year":"2023","journal-title":"ICML"},{"key":"ref15","article-title":"JPEG compressed images can bypass protections against ai editing","author":"Sandoval-Segura","year":"2023","journal-title":"arXiv preprint arXiv:2304.02234"},{"key":"ref16","article-title":"Learning the unlearnable: Adversarial augmentations suppress unlearnable example attacks","author":"Qin","year":"2023","journal-title":"arXiv preprint arXiv:2303.15127"},{"key":"ref17","first-page":"393","article-title":"Investigation on the effect of a gaussian blur in image filtering and segmentation","volume-title":"Proceedings ELMAR-2011","author":"Gedraite"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/30.125072"},{"key":"ref19","article-title":"Unlearnable examples: Making personal data unexploitable","author":"Huang","year":"2021","journal-title":"ICLR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539241"},{"key":"ref21","article-title":"Robust unlearnable examples: Protecting data privacy against adversarial learning","author":"Fu","year":"2022","journal-title":"ICLR"},{"key":"ref22","article-title":"Glaze: Protecting artists from style mimicry by text-to-image models","author":"Shan","year":"2023","journal-title":"USENIX Security"},{"key":"ref23","article-title":"Diffusion models for adversarial purification","author":"Nie","year":"2022","journal-title":"ICML"},{"key":"ref24","article-title":"(certified!!) Adversarial robustness for free!","author":"Carlini","year":"2023","journal-title":"ICLR"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2015.2439281"},{"article-title":"Denoising diffusion restoration models","year":"2022","author":"Kawar","key":"ref26"},{"key":"ref27","article-title":"Glide: Towards photo-realistic image generation and editing with text-guided diffusion models","author":"Nichol","year":"2021","journal-title":"arXiv preprint arXiv:2112.10741"},{"key":"ref28","article-title":"Diffusion models beat GANs on image synthesis","author":"Dhariwal","year":"2021","journal-title":"NeurIPS"},{"article-title":"Stable diffusion","year":"2022","author":"AI","key":"ref29"},{"key":"ref30","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014","journal-title":"ICLR"},{"key":"ref31","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015","journal-title":"ICLR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00568"},{"key":"ref33","article-title":"MORA: Improving ensemble robustness evaluation with model reweighing attack","author":"Yu","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref34","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2018","journal-title":"ICLR"},{"key":"ref35","first-page":"27374","article-title":"Autoregressive perturbations for data poisoning","volume":"35","author":"Sandoval-Segura","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref36","article-title":"Fawkes: Protecting privacy against unauthorized deep learning models","author":"Shan","year":"2020","journal-title":"USENIX Security"},{"key":"ref37","article-title":"Lowkey: Leveraging adversarial attacks to protect social media users from facial recognition","author":"Cherepanova","year":"2021","journal-title":"ICLR"},{"key":"ref38","article-title":"Adversarial examples make strong poisons","author":"Fowl","year":"2021","journal-title":"NeurIPS"},{"key":"ref39","article-title":"APBench: A unified benchmark for availability poisoning attacks and defenses","author":"Qin","year":"2023","journal-title":"arXiv preprint arXiv:2308.03258"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"article-title":"Score-based generative modeling through stochastic differential equations","year":"2021","author":"Song","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00569"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"ref47","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","author":"Heusel","year":"2017","journal-title":"NeurIPS"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2011.2109730"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358222"},{"key":"ref52","article-title":"Adversarial robustness of learning-based static malware classifiers","author":"Saha","year":"2023","journal-title":"arXiv preprint arXiv:2303.13372"},{"key":"ref53","article-title":"Erasing concepts from diffusion models","author":"Gandikota","year":"2023","journal-title":"arXiv preprint arXiv:2303.07345"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00393"}],"event":{"name":"2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI)","start":{"date-parts":[[2023,11,6]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2023,11,8]]}},"container-title":["2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10356387\/10356231\/10356476.pdf?arnumber=10356476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:14:57Z","timestamp":1705090497000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10356476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/ictai59109.2023.00093","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]}}}