{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:02Z","timestamp":1766449802470,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["16KISAO29K"],"award-info":[{"award-number":["16KISAO29K"]}]},{"DOI":"10.13039\/501100006374","name":"European Health and Digital Executive Agency","doi-asserted-by":"publisher","award":["101057917"],"award-info":[{"award-number":["101057917"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690288","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4837-4851","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3000-9423","authenticated-orcid":false,"given":"Yixin","family":"Wu","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-2976","authenticated-orcid":false,"given":"Yun","family":"Shen","sequence":"additional","affiliation":[{"name":"Netapp, Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7130-9211","authenticated-orcid":false,"given":"Michael","family":"Backes","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3612-7348","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/midjourney.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/www.adobe.com\/sensei\/generative-ai\/firefly.html."},{"key":"e_1_3_2_1_3_1","unstructured":"https:\/\/artificialintelligenceact.eu\/."},{"key":"e_1_3_2_1_4_1","unstructured":"https:\/\/www.gov.uk\/government\/organisations\/ai-safety-institute."},{"key":"e_1_3_2_1_5_1","unstructured":"https:\/\/www.4chan.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/lexica.art\/."},{"key":"e_1_3_2_1_7_1","unstructured":"https:\/\/huggingface.co\/CompVis\/stable-diffusion-safety-checker."},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/unctad.org\/press-material\/facts-and-figures-7."},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/github.com\/borisdayma\/dalle-mini."},{"key":"e_1_3_2_1_10_1","unstructured":"https:\/\/openai.com\/dall-e-3."},{"key":"e_1_3_2_1_11_1","volume-title":"The Silicon Ceiling: Auditing GPTs Race and Gender Biases in Hiring. CoRR abs\/2405.04412","author":"Armstrong Lena","year":"2024","unstructured":"Lena Armstrong, Abbey Liu, Stephen MacNeil, and Dana\u00eb Metaxa. The Silicon Ceiling: Auditing GPTs Race and Gender Biases in Hiring. CoRR abs\/2405.04412, 2024."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594095"},{"key":"e_1_3_2_1_13_1","volume-title":"Vinay Uday Prabhu, and Emmanuel Kahembwe. Multimodal Datasets: Misogyny, Pornography, and Malignant Stereotypes. CoRR abs\/2110.01963","author":"Birhane Abeba","year":"2021","unstructured":"Abeba Birhane, Vinay Uday Prabhu, and Emmanuel Kahembwe. Multimodal Datasets: Misogyny, Pornography, and Malignant Stereotypes. CoRR abs\/2110.01963, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"Workshop on Challenges in Deploying Generative AI (GenAI). ICML","author":"Brack Manuel","year":"2023","unstructured":"Manuel Brack, Felix Friedrich, Patrick Schramowski, and Kristian Kersting. Mitigating Inappropriateness in Image Generation: Can there be Value in Reflecting the Worlds Ugliness? In Workshop on Challenges in Deploying Generative AI (GenAI). ICML, 2023."},{"key":"e_1_3_2_1_15_1","volume-title":"Microsoft COCO Captions: Data Collection and Evaluation Server. CoRR abs\/1504.00325","author":"Chen Xinlei","year":"2015","unstructured":"Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam, Saurabh Gupta, Piotr Doll\u00e1r, and C. Lawrence Zitnick. Microsoft COCO Captions: Data Collection and Evaluation Server. CoRR abs\/1504.00325, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/qje\/qjz042"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X20937240"},{"key":"e_1_3_2_1_18_1","volume-title":"Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts. CoRR abs\/2309.06135","author":"Chin Zhi-Yi","year":"2023","unstructured":"Zhi-Yi Chin, Chieh-Ming Jiang, Ching-Chun Huang, Pin-Yu Chen, and Wei-Chen Chiu. Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts. CoRR abs\/2309.06135, 2023."},{"key":"e_1_3_2_1_19_1","first-page":"3043","volume-title":"Mohit Bansal. Dall-eval: Probing the Reasoning Skills and Social Biases of Text-to-Image Generation Models. In IEEE International Conference on Computer Vision (ICCV)","author":"Cho Jaemin","year":"2023","unstructured":"Jaemin Cho, Abhay Zala, and Mohit Bansal. Dall-eval: Probing the Reasoning Skills and Social Biases of Text-to-Image Generation Models. In IEEE International Conference on Computer Vision (ICCV), pages 3043--3054. IEEE, 2023."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095167"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674030176"},{"key":"e_1_3_2_1_22_1","first-page":"4171","volume-title":"Conference of the North American","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT), pages 4171--4186. ACL, 2019."},{"key":"e_1_3_2_1_23_1","first-page":"8780","volume-title":"Dhariwal and Alexander Quinn Nichol. Diffusion Models Beat GANs on Image Synthesis. In Annual Conference on Neural Information Processing Systems (NeurIPS)","author":"Prafulla","year":"2021","unstructured":"Prafulla Dhariwal and Alexander Quinn Nichol. Diffusion Models Beat GANs on Image Synthesis. In Annual Conference on Neural Information Processing Systems (NeurIPS), pages 8780--8794. NeurIPS, 2021."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Learning Representations (ICLR)","author":"Dosovitskiy Alexey","year":"2021","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. In International Conference on Learning Representations (ICLR), 2021."},{"key":"e_1_3_2_1_25_1","volume-title":"A Friendly Face: Do Text-to-Image Systems Rely on Stereotypes when the Input is Under-Specified? CoRR abs\/2302.07159","author":"Fraser Kathleen C.","year":"2023","unstructured":"Kathleen C. Fraser, Svetlana Kiritchenko, and Isar Nejadgholi. A Friendly Face: Do Text-to-Image Systems Rely on Stereotypes when the Input is Under-Specified? CoRR abs\/2302.07159, 2023."},{"key":"e_1_3_2_1_26_1","volume-title":"Fair Diffusion: Instructing Text-to-Image Generation Models on Fairness. CoRR abs\/2302.10893","author":"Friedrich Felix","year":"2023","unstructured":"Felix Friedrich, Patrick Schramowski, Manuel Brack, Lukas Struppek, Dominik Hintersdorf, Sasha Luccioni, and Kristian Kersting. Fair Diffusion: Instructing Text-to-Image Generation Models on Fairness. CoRR abs\/2302.10893, 2023."},{"key":"e_1_3_2_1_27_1","volume-title":"An Image is Worth One Word: Personalizing Text-to-Image Generation using Textual Inversion. CoRR abs\/2208.01618","author":"Gal Rinon","year":"2022","unstructured":"Rinon Gal, Yuval Alaluf, Yuval Atzmon, Or Patashnik, Amit H. Bermano, Gal Chechik, and Daniel Cohen-Or. An Image is Worth One Word: Personalizing Text-to-Image Generation using Textual Inversion. CoRR abs\/2208.01618, 2022."},{"key":"e_1_3_2_1_28_1","first-page":"6957","volume-title":"Yuta Nakashima. Uncurated Image-Text Datasets: Shedding Light on Demographic Bias. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Garcia Noa","year":"2023","unstructured":"Noa Garcia, Yusuke Hirota, Yankun Wu, and Yuta Nakashima. Uncurated Image-Text Datasets: Shedding Light on Demographic Bias. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 6957--6966. IEEE, 2023."},{"key":"e_1_3_2_1_29_1","volume-title":"Stereotypes in Stable Diffusion. CoRR abs\/2310.19981","author":"Ghosh Sourojit","year":"2023","unstructured":"Sourojit Ghosh and Aylin Caliskan. Person == Light-skinned, Western Man, and Sexualization of Women of Color: Stereotypes in Stable Diffusion. CoRR abs\/2310.19981, 2023."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_31_1","volume-title":"Journal of Machine Learning Research","author":"Hamm Jihun","year":"2017","unstructured":"Jihun Hamm. Minimax Filter: Learning to Preserve Privacy from Inference Attacks. Journal of Machine Learning Research, 2017."},{"key":"e_1_3_2_1_32_1","volume-title":"Feminist Studies","author":"Haraway Donna","year":"1988","unstructured":"Donna Haraway. Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective. Feminist Studies, 1988."},{"key":"e_1_3_2_1_33_1","first-page":"770","volume-title":"Jian Sun. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 770--778. IEEE, 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/349"},{"key":"e_1_3_2_1_35_1","volume-title":"Pieter Abbeel. Denoising Diffusion Probabilistic Models. In Annual Conference on Neural Information Processing Systems (NeurIPS). NeurIPS","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising Diffusion Probabilistic Models. In Annual Conference on Neural Information Processing Systems (NeurIPS). NeurIPS, 2020."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00159"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449113"},{"key":"e_1_3_2_1_38_1","volume-title":"MiVOLO: Multi-input Transformer for Age and Gender Estimation. CoRR abs\/2307.04616","author":"Kuprashevich Maksim","year":"2023","unstructured":"Maksim Kuprashevich and Irina Tolstykh. MiVOLO: Multi-input Transformer for Age and Gender Estimation. CoRR abs\/2307.04616, 2023."},{"key":"e_1_3_2_1_39_1","volume-title":"Stable Bias: Analyzing Societal Representations in Diffusion Models. CoRR abs\/2303.11408","author":"Luccioni Alexandra Sasha","year":"2023","unstructured":"Alexandra Sasha Luccioni, Christopher Akiki, Margaret Mitchell, and Yacine Jernite. Stable Bias: Analyzing Societal Representations in Diffusion Models. CoRR abs\/2303.11408, 2023."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/pam.20492"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"e_1_3_2_1_43_1","volume-title":"Stefano Ermon. SDEdit: Guided Image Synthesis and Editing with Stochastic Differential Equations. In International Conference on Learning Representations (ICLR)","author":"Meng Chenlin","year":"2022","unstructured":"Chenlin Meng, Yutong He, Yang Song, Jiaming Song, Jiajun Wu, Jun-Yan Zhu, and Stefano Ermon. SDEdit: Guided Image Synthesis and Editing with Stochastic Differential Equations. In International Conference on Learning Representations (ICLR), 2022."},{"key":"e_1_3_2_1_44_1","volume-title":"Landay. An Image of Society: Gender and Racial Representation and Impact in Image Search Results for Occupations. In ACM Conference on Computer Supported Cooperative Work (CSCW). ACM","author":"Metaxa Dana\u00eb","year":"2021","unstructured":"Dana\u00eb Metaxa, Michelle A. Gan, Su Goh, Jeff T. Hancock, and James A. Landay. An Image of Society: Gender and Racial Representation and Impact in Image Search Results for Occupations. In ACM Conference on Computer Supported Cooperative Work (CSCW). ACM, 2021."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"e_1_3_2_1_46_1","volume-title":"Deep Learning for Deepfakes Creation and Detection: A Survey. Computer Vision and Image Understanding","author":"Nguyen Thanh","year":"2022","unstructured":"Thanh Nguyen, Quoc Viet Hung Nguyen, Dung Tien Nguyen, Duc Thanh Nguyen, Thien Huynh-The, Saeid Nahavandi, Thanh Tam Nguyen, Quoc-Viet Pham, and Cuong M. Nguyen. Deep Learning for Deepfakes Creation and Detection: A Survey. Computer Vision and Image Understanding, 2022."},{"key":"e_1_3_2_1_47_1","volume-title":"Editing Implicit Assumptions in Text-to-Image Diffusion Models. CoRR abs\/2303.08084","author":"Orgad Hadas","year":"2023","unstructured":"Hadas Orgad, Bahjat Kawar, and Yonatan Belinkov. Editing Implicit Assumptions in Text-to-Image Diffusion Models. CoRR abs\/2303.08084, 2023."},{"key":"e_1_3_2_1_48_1","volume-title":"SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. CoRR abs\/2307.01952","author":"Podell Dustin","year":"2023","unstructured":"Dustin Podell, Zion English, Kyle Lacey, Andreas Blattmann, Tim Dockhorn, Jonas M\u00fcller, Joe Penna, and Robin Rombach. SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. CoRR abs\/2307.01952, 2023."},{"key":"e_1_3_2_1_49_1","volume-title":"Yang Zhang. Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. In ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM","author":"Qu Yiting","year":"2023","unstructured":"Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, and Yang Zhang. Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. In ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, 2023."},{"key":"e_1_3_2_1_50_1","first-page":"8748","volume-title":"Ilya Sutskever. Learning Transferable Visual Models From Natural Language Supervision. In International Conference on Machine Learning (ICML)","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, Gretchen Krueger, and Ilya Sutskever. Learning Transferable Visual Models From Natural Language Supervision. In International Conference on Machine Learning (ICML), pages 8748--8763. PMLR, 2021."},{"key":"e_1_3_2_1_51_1","volume-title":"Hierarchical Text-Conditional Image Generation with CLIP Latents. CoRR abs\/2204.06125","author":"Ramesh Aditya","year":"2022","unstructured":"Aditya Ramesh, Prafulla Dhariwal, Alex Nichol, Casey Chu, and Mark Chen. Hierarchical Text-Conditional Image Generation with CLIP Latents. CoRR abs\/2204.06125, 2022."},{"key":"e_1_3_2_1_52_1","first-page":"8821","volume-title":"Ilya Sutskever. Zero-Shot Text-to-Image Generation. In International Conference on Machine Learning (ICML)","author":"Ramesh Aditya","year":"2021","unstructured":"Aditya Ramesh, Mikhail Pavlov, Gabriel Goh, Scott Gray, Chelsea Voss, Alec Radford, Mark Chen, and Ilya Sutskever. Zero-Shot Text-to-Image Generation. In International Conference on Machine Learning (ICML), pages 8821--8831. JMLR, 2021."},{"key":"e_1_3_2_1_53_1","volume-title":"Red-Teaming the Stable Diffusion Safety Filter. CoRR abs\/2210.04610","author":"Rando Javier","year":"2022","unstructured":"Javier Rando, Daniel Paleka, David Lindner, Lennart Heim, and Florian Tram\u00e8r. Red-Teaming the Stable Diffusion Safety Filter. CoRR abs\/2210.04610, 2022."},{"key":"e_1_3_2_1_54_1","volume-title":"Lower Bounds on the Size of Bounded Depth Circuits over a Complete Basis with Logical Addition. Mathematical notes of the Academy of Sciences of the USSR","author":"Razborov A. A.","year":"1987","unstructured":"A. A. Razborov. Lower Bounds on the Size of Bounded Depth Circuits over a Complete Basis with Logical Addition. Mathematical notes of the Academy of Sciences of the USSR, 1987."},{"key":"e_1_3_2_1_55_1","first-page":"10684","volume-title":"Bj\u00f6rn Ommer. High-Resolution Image Synthesis with Latent Diffusion Models. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Rombach Robin","year":"2022","unstructured":"Robin Rombach, Andreas Blattmann, Dominik Lorenz, Patrick Esser, and Bj\u00f6rn Ommer. High-Resolution Image Synthesis with Latent Diffusion Models. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 10684--10695. IEEE, 2022."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.78"},{"key":"e_1_3_2_1_57_1","volume-title":"Kfir Aberman. DreamBooth: Fine Tuning Text-to-Image Diffusion Models for Subject-Driven Generation. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE","author":"Ruiz Nataniel","year":"2023","unstructured":"Nataniel Ruiz, Yuanzhen Li, Varun Jampani, Yael Pritch, Michael Rubinstein, and Kfir Aberman. DreamBooth: Fine Tuning Text-to-Image Diffusion Models for Subject-Driven Generation. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2023."},{"key":"e_1_3_2_1_58_1","first-page":"1","volume-title":"ACM Conference on Computer Supported Cooperative Work (CSCW)","author":"Scheuerman Morgan Klaus","year":"2020","unstructured":"Morgan Klaus Scheuerman, Kandrea Wade, Caitlin Lustig, and Jed R. Brubaker. How Weve Taught Algorithms to See Identity: Constructing Race and Gender in Image Databases for Facial Analysis. In ACM Conference on Computer Supported Cooperative Work (CSCW), pages 058:1--058:35. ACM, 2020."},{"key":"e_1_3_2_1_59_1","volume-title":"Safe Latent Diffusion: Mitigating Inappropriate Degeneration in Diffusion Models. CoRR abs\/2211.05105","author":"Schramowski Patrick","year":"2022","unstructured":"Patrick Schramowski, Manuel Brack, Bj\u00f6rn Deiseroth, and Kristian Kersting. Safe Latent Diffusion: Mitigating Inappropriate Degeneration in Diffusion Models. CoRR abs\/2211.05105, 2022."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533192"},{"key":"e_1_3_2_1_61_1","volume-title":"LAION-5B: An open large-scale dataset for training next generation image-text models. CoRR abs\/2210.08402","author":"Schuhmann Christoph","year":"2022","unstructured":"Christoph Schuhmann, Romain Beaumont, Richard Vencu, Cade Gordon, Ross Wightman, Mehdi Cherti, Theo Coombes, Aarush Katta, Clayton Mullis, Mitchell Wortsman, Patrick Schramowski, Srivatsa Kundurthy, Katherine Crowson, Ludwig Schmidt, Robert Kaczmarczyk, and Jenia Jitsev. LAION-5B: An open large-scale dataset for training next generation image-text models. CoRR abs\/2210.08402, 2022."},{"key":"e_1_3_2_1_62_1","volume-title":"Towards a standard for identifying and managing bias in artificial intelligence. US Department of Commerce","author":"Schwartz Reva","year":"2022","unstructured":"Reva Schwartz, Apostol Vassilev, Kristen K. Greene, Lori Perine, Andrew Burt, and Patrick Hall. Towards a standard for identifying and managing bias in artificial intelligence. US Department of Commerce, National Institute of Standards and Technology (NIST), 2022."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2307\/3439966"},{"key":"e_1_3_2_1_64_1","first-page":"1","volume-title":"Ilkin Serengil and Alper Ozpinar. HyperExtended LightFace: A Facial Attribute Analysis Framework. In International Conference on Engineering and Emerging Technologies (ICEET)","author":"Sefik","year":"2021","unstructured":"Sefik Ilkin Serengil and Alper Ozpinar. HyperExtended LightFace: A Facial Attribute Analysis Framework. In International Conference on Engineering and Emerging Technologies (ICEET), pages 1--4. IEEE, 2021."},{"key":"e_1_3_2_1_65_1","volume-title":"The Bias Amplification Paradox in Text-to-Image Generation. CoRR abs\/2308.00755","author":"Seshadri Preethi","year":"2023","unstructured":"Preethi Seshadri, Sameer Singh, and Yanai Elazar. The Bias Amplification Paradox in Text-to-Image Generation. CoRR abs\/2308.00755, 2023."},{"key":"e_1_3_2_1_66_1","volume-title":"DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models. CoRR abs\/2210.06998","author":"Sha Zeyang","year":"2022","unstructured":"Zeyang Sha, Zheng Li, Ning Yu, and Yang Zhang. DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models. CoRR abs\/2210.06998, 2022."},{"key":"e_1_3_2_1_67_1","volume-title":"International Conference on Learning Representations (ICLR)","author":"Song Yang","year":"2021","unstructured":"Yang Song, Jascha Sohl-Dickstein, Diederik P. Kingma, Abhishek Kumar, Stefano Ermon, and Ben Poole. Score-Based Generative Modeling through Stochastic Differential Equations. In International Conference on Learning Representations (ICLR), 2021."},{"key":"e_1_3_2_1_68_1","volume-title":"Stereotype Threat and the Intellectual Test Performance of African Americans. Journal of Personality and Social Psychology","author":"Claude","year":"1995","unstructured":"Claude M. Steele and Joshua Aronson. Stereotype Threat and the Intellectual Test Performance of African Americans. Journal of Personality and Social Psychology, 1995."},{"key":"e_1_3_2_1_69_1","first-page":"893","volume-title":"Duen Horng. DIFFUSIONDB: A Large-scale Prompt Gallery Dataset for Text-to-Image Generative Models. In Annual Meeting of the Association for Computational Linguistics (ACL)","author":"Wang Zijie J.","year":"2023","unstructured":"Zijie J. Wang, Evan Montoya, David Munechika, Haoyang Yang, Benjamin Hoover, and Duen Horng. DIFFUSIONDB: A Large-scale Prompt Gallery Dataset for Text-to-Image Generative Models. In Annual Meeting of the Association for Computational Linguistics (ACL), pages 893--911. ACL, 2023."},{"key":"e_1_3_2_1_70_1","volume-title":"On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts. CoRR abs\/2310.16613","author":"Wu Yixin","year":"2023","unstructured":"Yixin Wu, Ning Yu, Michael Backes, Yun Shen, and Yang Zhang. On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts. CoRR abs\/2310.16613, 2023."},{"key":"e_1_3_2_1_71_1","volume-title":"Neil Zhenqiang Gong, and Yinzhi Cao. SneakyPrompt: Evaluating Robustness of Text-to-image Generative Models? Safety Filters. CoRR abs\/2305.12082","author":"Yang Yuchen","year":"2023","unstructured":"Yuchen Yang, Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, and Yinzhi Cao. SneakyPrompt: Evaluating Robustness of Text-to-image Generative Models? Safety Filters. CoRR abs\/2305.12082, 2023."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622432"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00166"},{"key":"e_1_3_2_1_74_1","first-page":"14448","volume-title":"Mario Fritz. Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data. In IEEE International Conference on Computer Vision (ICCV)","author":"Yu Ning","year":"2021","unstructured":"Ning Yu, Vladislav Skripniuk, Sahar Abdelnabi, and Mario Fritz. Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data. In IEEE International Conference on Computer Vision (ICCV), pages 14448--14457. IEEE, 2021."},{"key":"e_1_3_2_1_75_1","first-page":"3969","volume-title":"Torre. ITI-GEN: Inclusive Text-to-Image Generation. In IEEE International Conference on Computer Vision (ICCV)","author":"Zhang Cheng","year":"2023","unstructured":"Cheng Zhang, Xuanbai Chen, Siqi Chai, Chen Henry Wu, Dmitry Lagun, Thabo Beeler, and Fernando De la Torre. ITI-GEN: Inclusive Text-to-Image Generation. In IEEE International Conference on Computer Vision (ICCV), pages 3969--3980. IEEE, 2023."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"e_1_3_2_1_77_1","volume-title":"Multimedia Tools and Applications","author":"Zhang Tao","year":"2022","unstructured":"Tao Zhang. Deepfake Generation and Detection, A Survey. Multimedia Tools and Applications, 2022."},{"key":"e_1_3_2_1_78_1","volume-title":"To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Unsafe Images ... For Now. CoRR abs\/2310.11868","author":"Zhang Yimeng","year":"2023","unstructured":"Yimeng Zhang, Jinghan Jia, Xin Chen, Aochuan Chen, Yihua Zhang, Jiancheng Liu, Ke Ding, and Sijia Liu. To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Unsafe Images ... For Now. CoRR abs\/2310.11868, 2023."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:18:04Z","timestamp":1755843484000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":78,"alternative-id":["10.1145\/3658644.3690288","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690288","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}