Login / Signup
Invisible Backdoor Attacks on Diffusion Models.
Sen Li
Junchi Ma
Minhao Cheng
Published in:
CoRR (2024)
Keyphrases
</>
diffusion models
diffusion model
information diffusion
social networks
viral marketing
influence maximization
anisotropic diffusion
information processing
social media
supply chain
medical imaging
greedy algorithm