Revealing Vulnerabilities in Stable Diffusion via Targeted Attacks.
Chenyu ZhangLanjun WangAnan LiuPublished in: CoRR (2024)
Keyphrases
- countermeasures
- security flaws
- security vulnerabilities
- security risks
- security mechanisms
- buffer overflow
- information security
- denial of service
- attack graphs
- dos attacks
- security breaches
- anisotropic diffusion
- attack scenarios
- watermarking scheme
- intrusion detection
- security issues
- authentication scheme
- security threats
- attack graph
- diffusion process
- web services
- security requirements
- data corruption
- security protocols
- attack detection
- traffic analysis
- tensor field
- image processing
- ddos attacks
- network security
- digital images
- information diffusion