1 code implementation • 11 Feb 2025 • Sen Peng, Mingyue Wang, Jianfei He, Jijia Yang, Xiaohua Jia
In this paper, we first reveal that the primary reason adversarial examples are effective as protective perturbations in latent diffusion models is the distortion of their latent representations, as demonstrated through qualitative and quantitative experiments.
no code implementations • 25 Dec 2024 • Sen Peng, Jijia Yang, Mingyue Wang, Jianfei He, Xiaohua Jia
Diffusion-based text-to-image models have shown immense potential for various image-related tasks.
no code implementations • 29 Oct 2024 • Jijia Yang, Sen Peng, Xiaohua Jia
In practical application, the widespread deployment of diffusion models often necessitates substantial investment in training.