{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:28:38Z","timestamp":1761895718540,"version":"build-2065373602"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/icme59968.2025.11209989","type":"proceedings-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:57:42Z","timestamp":1761847062000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Culture-based Adversarial Attack on Text-to-Image Models"],"prefix":"10.1109","author":[{"given":"Fuyi","family":"Yang","sequence":"first","affiliation":[{"name":"Tianjin University,School of New Media and Communication,Tianjin,China"}]},{"given":"Chenyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tianjin University,School of New Media and Communication,Tianjin,China"}]},{"given":"Lanjun","family":"Wang","sequence":"additional","affiliation":[{"name":"Tianjin University,School of New Media and Communication,Tianjin,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102701"},{"article-title":"ai-image-generator-midjourney-blocks-porn-by-banning-words-about-the-human-reproductive-system\/","year":"2023","author":"Heikkil\u00e4","key":"ref2"},{"article-title":"Nsfw text classifier","year":"2022","author":"Li","key":"ref3"},{"year":"2023","key":"ref4","article-title":"Clip-based-nsfw-detector"},{"year":"2023","key":"ref5","article-title":"Dall\u2022e 3 system card"},{"article-title":"Prompting4debugging: Red-teaming text-to-image diffusion models by finding problematic prompts","volume-title":"ICML","author":"Chin","key":"ref6"},{"article-title":"Ring-a-bell! how reliable are concept removal methods for diffusion models?","volume-title":"ICLR","author":"Tsai","key":"ref7"},{"article-title":"Guardt2i: Defending text-to-image models from adversarial prompts","year":"2024","author":"Yang","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00123"},{"article-title":"Revealing vulnerabilities in stable diffusion via targeted attacks","year":"2024","author":"Zhang","key":"ref10"},{"article-title":"Groot: Adversarial testing for generative text-to-image models with tree-based semantic transformation","year":"2024","author":"Liu","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i25.34821"},{"article-title":"Jailbreaking text-to-image models with llm-based agents","year":"2024","author":"Dong","key":"ref13"},{"issue":"1","key":"ref14","first-page":"1","article-title":"A brief study of words used in denotation and connotation","volume":"1","author":"Rao","year":"2017","journal-title":"Journal for Research Scholars and Professionals of English Language Teaching"},{"key":"ref15","volume-title":"Elements of semiology","volume":"4","author":"Barthes","year":"1968"},{"article-title":"Barthes: Semiotics","year":"2024","author":"Barthes","key":"ref16"},{"article-title":"Finetuned language models are zero-shot learners","year":"2021","author":"Wei","key":"ref17"},{"key":"ref18","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"ICML","author":"Radford"},{"year":"2024","key":"ref19","article-title":"Stable-diffusion-v1-4"},{"year":"2024","key":"ref20","article-title":"Stable-diffusion-v1-4"},{"year":"2024","key":"ref21","article-title":"Flux.1-dev"},{"year":"2023","key":"ref22","article-title":"Dall\u2022e 3"},{"year":"2023","key":"ref23","article-title":"Midjourney"},{"year":"2024","key":"ref24","article-title":"Llama-3-8b-lexi-uncensored"},{"article-title":"Openclip","year":"2024","author":"Ilharco","key":"ref25"},{"year":"2024","key":"ref26","article-title":"Internvl2-8b"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00739"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73668-1_20"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02157"}],"event":{"name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2025,6,30]]},"location":"Nantes, France","end":{"date-parts":[[2025,7,4]]}},"container-title":["2025 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11208895\/11208897\/11209989.pdf?arnumber=11209989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T05:57:16Z","timestamp":1761890236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11209989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icme59968.2025.11209989","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}