Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models.
Changjiang LiRen PangBochuan CaoJinghui ChenFenglong MaShouling JiTing WangPublished in: CoRR (2024)
Keyphrases
- diffusion models
- security threats
- security mechanisms
- security problems
- diffusion model
- security vulnerabilities
- security protocols
- security measures
- java card
- countermeasures
- information diffusion
- information security
- security issues
- cyber attacks
- security risks
- security requirements
- access control
- social networks
- influence maximization
- cryptographic protocols
- intrusion detection
- smart card
- viral marketing
- network security
- information flow
- intrusion detection system
- multiscale
- computer networks