{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:04:51Z","timestamp":1775070291537,"version":"3.50.1"},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100015401","name":"Shaanxi Province Key Research and Development Projects","doi-asserted-by":"publisher","award":["2024GX-YBXM-556"],"award-info":[{"award-number":["2024GX-YBXM-556"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133393","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T07:52:31Z","timestamp":1774338751000},"page":"133393","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Force everything to one: Targeted output redirection against diffusion-based customization"],"prefix":"10.1016","volume":"682","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0152-3185","authenticated-orcid":false,"given":"Xingzhi","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7206-4332","authenticated-orcid":false,"given":"Lihua","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuhui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133393_bib0005","series-title":"2025 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","first-page":"6053","article-title":"An image is worth multiple words: multi-attribute inversion for constrained text-to-image synthesis","author":"Agarwal","year":"2025"},{"key":"10.1016\/j.neucom.2026.133393_bib0010","series-title":"2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)","first-page":"67","article-title":"Vggface2: a dataset for recognising faces across pose and age","author":"Cao","year":"2018"},{"key":"10.1016\/j.neucom.2026.133393_bib0015","author":"Chae"},{"key":"10.1016\/j.neucom.2026.133393_bib0020","author":"Chen"},{"key":"10.1016\/j.neucom.2026.133393_bib0025","doi-asserted-by":"crossref","first-page":"10850","DOI":"10.1109\/TPAMI.2023.3261988","article-title":"Diffusion models in vision: a survey","volume":"45","author":"Croitoru","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.neucom.2026.133393_bib0030","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"5203","article-title":"Retinaface: single-shot multi-level face localisation in the wild","author":"Deng","year":"2020"},{"key":"10.1016\/j.neucom.2026.133393_bib0035","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"4690","article-title":"Arcface: additive angular margin loss for deep face recognition","author":"Deng","year":"2019"},{"key":"10.1016\/j.neucom.2026.133393_bib0040","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"22466","article-title":"The stable signature: rooting watermarks in latent diffusion models","author":"Fernandez","year":"2023"},{"key":"10.1016\/j.neucom.2026.133393_bib0045","author":"Fernandez"},{"key":"10.1016\/j.neucom.2026.133393_bib0050","author":"Gal"},{"key":"10.1016\/j.neucom.2026.133393_bib0055","first-page":"1","article-title":"Dtia: disruptive text-image alignment for countering text-to-image diffusion model personalization","author":"Gao","year":"2024","journal-title":"Data Sci. Eng."},{"key":"10.1016\/j.neucom.2026.133393_bib0060","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3536426","article-title":"Deepfake video detection via predictive representation learning","volume":"18","author":"Ge","year":"2022","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"10.1016\/j.neucom.2026.133393_bib0065","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun. ACM"},{"key":"10.1016\/j.neucom.2026.133393_bib0070","first-page":"36777","article-title":"Pulid: pure and lightning id customization via contrastive alignment","volume":"37","author":"Guo","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133393_bib0075","author":"Hao"},{"key":"10.1016\/j.neucom.2026.133393_bib0080","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133393_bib0085","first-page":"3","article-title":"Lora: low-rank adaptation of large language models","volume":"1","author":"Hu","year":"2022","journal-title":"ICLR"},{"key":"10.1016\/j.neucom.2026.133393_bib0090","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"1619","article-title":"Initiative defense against facial manipulation","author":"Huang","year":"2021"},{"key":"10.1016\/j.neucom.2026.133393_bib0095","doi-asserted-by":"crossref","first-page":"7303","DOI":"10.1038\/s41598-023-34341-2","article-title":"Denoising diffusion probabilistic models for 3d medical image generation","volume":"13","author":"Khader","year":"2023","journal-title":"Sci. Rep."},{"key":"10.1016\/j.neucom.2026.133393_bib0100","author":"Kingma"},{"key":"10.1016\/j.neucom.2026.133393_bib0105","series-title":"Proceedings of the 28th International Conference on Intelligent User Interfaces","first-page":"919","article-title":"Large-scale text-to-image generation models for visual artists\u2019 creative works","author":"Ko","year":"2023"},{"key":"10.1016\/j.neucom.2026.133393_bib0110","series-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","first-page":"7213","article-title":"Unganable: defending against gan-based face manipulation","author":"Li","year":"2023"},{"key":"10.1016\/j.neucom.2026.133393_bib0115","author":"Liang"},{"key":"10.1016\/j.neucom.2026.133393_bib0120","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"12257","article-title":"Countering personalized text-to-image generation with influence watermarks","author":"Liu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133393_bib0125","series-title":"Proceedings of the 32nd ACM International Conference on Multimedia","first-page":"3587","article-title":"Disrupting diffusion: token-level attention erasure attack against diffusion-based customization","author":"Liu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133393_bib0130","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"3730","article-title":"Deep learning face attributes in the wild","author":"Liu","year":"2015"},{"key":"10.1016\/j.neucom.2026.133393_bib0135","author":"Madry"},{"key":"10.1016\/j.neucom.2026.133393_bib0140","author":"Mi"},{"key":"10.1016\/j.neucom.2026.133393_bib0145","series-title":"Proceedings of the 25th International Academic Mindtrek Conference","first-page":"192","article-title":"The creativity of text-to-image generation","author":"Oppenlaender","year":"2022"},{"key":"10.1016\/j.neucom.2026.133393_bib0150","first-page":"39869","article-title":"Attndreambooth: towards text-aligned personalized text-to-image generation","volume":"37","author":"Pang","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133393_bib0155","unstructured":"P. von Platen, S. Patil, A. Lozhkov, P. Cuenca, N. Lambert, K. Rasul, M. Davaadorj, D. Nair, S. Paul, W. Berman, Y. Xu, S. Liu, T. Wolf, Diffusers: state-of-the-art diffusion models, 2022, https:\/\/github.com\/huggingface\/diffusers. 2022-06."},{"key":"10.1016\/j.neucom.2026.133393_bib0160","author":"Ramesh"},{"key":"10.1016\/j.neucom.2026.133393_bib0165","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"10684","article-title":"High-resolution image synthesis with latent diffusion models","author":"Rombach","year":"2022"},{"key":"10.1016\/j.neucom.2026.133393_bib0170","series-title":"Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5\u20139, 2015, Proceedings, Part III 18","first-page":"234","article-title":"U-net: convolutional networks for biomedical image segmentation","author":"Ronneberger","year":"2015"},{"key":"10.1016\/j.neucom.2026.133393_bib0175","series-title":"Computer Vision\u2013ECCV 2020 Workshops: Glasgow, UK, August 23\u201328, 2020, Proceedings, Part IV 16","first-page":"236","article-title":"Disrupting deepfakes: adversarial attacks against conditional image translation networks and facial manipulation systems","author":"Ruiz","year":"2020"},{"key":"10.1016\/j.neucom.2026.133393_bib0180","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"22500","article-title":"Dreambooth: fine tuning text-to-image diffusion models for subject-driven generation","author":"Ruiz","year":"2023"},{"key":"10.1016\/j.neucom.2026.133393_bib0185","first-page":"36479","article-title":"Photorealistic text-to-image diffusion models with deep language understanding","volume":"35","author":"Saharia","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133393_bib0190","author":"Salman"},{"key":"10.1016\/j.neucom.2026.133393_bib0195","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8543","article-title":"Instantbooth: personalized text-to-image generation without test-time finetuning","author":"Shi","year":"2024"},{"key":"10.1016\/j.neucom.2026.133393_bib0200","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"5651","article-title":"Ser-fiq: unsupervised estimation of face image quality based on stochastic embedding robustness","author":"Terhorst","year":"2020"},{"key":"10.1016\/j.neucom.2026.133393_bib0205","first-page":"10021","article-title":"Lion: latent point diffusion models for 3d shape generation","volume":"35","author":"Vahdat","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133393_bib0210","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"2116","article-title":"Anti-Dreambooth: protecting users from personalized text-to-image synthesis","author":"Van Le","year":"2023"},{"key":"10.1016\/j.neucom.2026.133393_bib0215","first-page":"136576","article-title":"Prompt-agnostic adversarial perturbation for customized diffusion models","volume":"37","author":"Wan","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133393_bib0220","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"12047","article-title":"Simac: a simple anti-customization method for protecting face privacy against text-to-image synthesis of diffusion models","author":"Wang","year":"2024"},{"key":"10.1016\/j.neucom.2026.133393_bib0225","first-page":"1","article-title":"Security and privacy on generative data in AIGC: a survey","volume":"57","author":"Wang","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2026.133393_bib0230","author":"Wu"},{"key":"10.1016\/j.neucom.2026.133393_bib0235","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"905","article-title":"Myopia: protecting face privacy from malicious personalized text-to-image synthesis via unlearnable examples","author":"Wu","year":"2025"},{"key":"10.1016\/j.neucom.2026.133393_bib0240","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3614425","article-title":"A survey on video diffusion models","volume":"57","author":"Xing","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2026.133393_bib0245","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"24534","article-title":"Perturbing attention gives you more bang for the buck: subtle imaging perturbations that efficiently fool customized diffusion models","author":"Xu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133393_bib0250","series-title":"Proceedings of the Computer Vision and Pattern Recognition Conference","first-page":"13414","article-title":"Harnessing global-local collaborative adversarial perturbation for anti-customization","author":"Xu","year":"2025"},{"key":"10.1016\/j.neucom.2026.133393_bib0255","series-title":"2021 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Defending against gan-based deepfake attacks via transformation-aware adversarial faces","author":"Yang","year":"2021"},{"key":"10.1016\/j.neucom.2026.133393_bib0260","series-title":"2024 IEEE International Joint Conference on Biometrics (IJCB)","first-page":"1","article-title":"Ddap: dual-domain anti-personalization against text-to-image diffusion models","author":"Yang","year":"2024"},{"key":"10.1016\/j.neucom.2026.133393_bib0265","author":"Ye"},{"key":"10.1016\/j.neucom.2026.133393_bib0270","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"586","article-title":"The unreasonable effectiveness of deep features as a perceptual metric","author":"Zhang","year":"2018"},{"key":"10.1016\/j.neucom.2026.133393_bib0275","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1007\/s11633-025-1563-3","article-title":"A survey on personalized content synthesis with diffusion models","volume":"22","author":"Zhang","year":"2025","journal-title":"Mach. Intell. Res."},{"key":"10.1016\/j.neucom.2026.133393_bib0280","author":"Zheng"},{"key":"10.1016\/j.neucom.2026.133393_bib0285","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"10582","article-title":"Anti-diffusion: preventing abuse of modifications of diffusion-based models","author":"Zheng","year":"2025"},{"key":"10.1016\/j.neucom.2026.133393_bib0290","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"657","article-title":"Hidden: hiding data with deep networks","author":"Zhu","year":"2018"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007903?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007903?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:52:32Z","timestamp":1775065952000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226007903"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":58,"alternative-id":["S0925231226007903"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133393","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Force everything to one: Targeted output redirection against diffusion-based customization","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133393","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133393"}}