{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:06:21Z","timestamp":1775837181827,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3639957","type":"journal-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:41:05Z","timestamp":1764787265000},"page":"12918-12933","source":"Crossref","is-referenced-by-count":4,"title":["A Gray-Box Attack Against Latent Diffusion Model-Based Image Editing by Posterior Collapse"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6025-3021","authenticated-orcid":false,"given":"Zhongliang","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science, University of St Andrews, St Andrews, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1835-500X","authenticated-orcid":false,"given":"Chun","family":"Tong Lei","sequence":"additional","affiliation":[{"name":"Department of Data Science, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3624-371X","authenticated-orcid":false,"given":"Lei","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of St Andrews, St Andrews, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5174-5182","authenticated-orcid":false,"given":"Shuai","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2881-1422","authenticated-orcid":false,"given":"Yifei","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham, Nottingham, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1897-4148","authenticated-orcid":false,"given":"Jingyu","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Data Science and Artificial Intelligence, Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0985-4478","authenticated-orcid":false,"given":"Zeyu","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2926-9762","authenticated-orcid":false,"given":"Cunjian","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Data Science and Artificial Intelligence, Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9314-194X","authenticated-orcid":false,"given":"Ognjen","family":"Arandjelovi\u0107","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of St Andrews, St Andrews, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3748-4160","authenticated-orcid":false,"given":"Chun","family":"Pong Lau","sequence":"additional","affiliation":[{"name":"Department of Data Science, City University of Hong Kong, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref2","first-page":"56424","article-title":"Autoregressive image generation without vector quantization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"Li"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3380248"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2025.112780"},{"key":"ref5","first-page":"20763","article-title":"Adversarial example does good: Preventing painting imitation from diffusion models via adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liang"},{"key":"ref6","first-page":"29894","article-title":"Raising the cost of malicious AI-powered image editing","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Salman"},{"key":"ref7","article-title":"Mist: Towards improved adversarial examples for diffusion models","author":"Liang","year":"2023","journal-title":"arXiv:2305.12683"},{"key":"ref8","article-title":"Toward effective protection against diffusion-based mimicry through score distillation","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Xue"},{"key":"ref9","first-page":"8811","article-title":"Alleviating adversarial attacks on variational autoencoders with MCMC","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kuzina"},{"key":"ref10","article-title":"Preventing posterior collapse with delta-VAEs","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Razavi"},{"key":"ref11","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref12","first-page":"21696","article-title":"Variational diffusion models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kingma"},{"key":"ref13","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. NIPS","volume":"34","author":"Dhariwal"},{"key":"ref14","article-title":"Denoising diffusion implicit models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Song"},{"key":"ref15","article-title":"VideoGPT: Video generation using VQ-VAE and transformers","author":"Yan","year":"2021","journal-title":"arXiv:2104.10157"},{"key":"ref16","article-title":"Generating diverse high-fidelity images with VQ-VAE-2","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Razavi"},{"key":"ref17","article-title":"Vector-quantized image modeling with improved VQGAN","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Yu"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"ref19","article-title":"Intriguing properties of neural networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Szegedy"},{"key":"ref20","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3390609"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3286772"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3402167"},{"key":"ref25","first-page":"3487","article-title":"Dual manifold adversarial robustness: Defense against lp and non-lp adversarial attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lin"},{"key":"ref26","article-title":"Instruct2Attack: Language-guided semantic adversarial attacks","author":"Liu","year":"2023","journal-title":"arXiv:2311.15551"},{"key":"ref27","first-page":"901","article-title":"A white-box false positive adversarial attack method on contrastive loss based offline handwritten signature verification models","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Guo"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2025.3563537"},{"key":"ref29","article-title":"A survey of recent backdoor attacks and defenses in large language models","author":"Zhao","year":"2025","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref30","article-title":"Adversarial images for variational autoencoders","author":"Tabacof","year":"2016","journal-title":"arXiv:1612.00155"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.47749\/t\/unicamp.2019.1092797"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00014"},{"key":"ref33","first-page":"2187","article-title":"Glaze: Protecting artists from style mimicry by text-to-image models","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Shan"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref36","first-page":"658","article-title":"Generating images with perceptual similarity metrics based on deep networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Dosovitskiy"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref38","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Lin"},{"key":"ref39","first-page":"12888","article-title":"BLIP: Bootstrapping language-image pre-training for unified vision-language understanding and generation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref40","first-page":"25278","article-title":"LAION-5B: An open large-scale dataset for training next generation image-text models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Schuhmann"},{"key":"ref41","first-page":"6626","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Heusel"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA240643"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2025.112105"},{"key":"ref45","volume-title":"Adversecleaner","author":"Zhang","year":"2023"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11275855.pdf?arnumber=11275855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:03:41Z","timestamp":1770671021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11275855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3639957","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}