Siew-Kei Lam

Papers in Database (1)

attack arXiv Aug 9, 2025 · Aug 2025

Towards Effective Prompt Stealing Attack against Text-to-Image Diffusion Models

Shiqian Zhao, Chong Wang, Yiming Li et al. · Nanyang Technological University · National University of Singapore +2 more

Reverse-engineers valuable user prompts from T2I showcase images by interacting with a local proxy diffusion model

Model Theft Sensitive Information Disclosure visionnlpgenerative
PDF