{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T23:37:53Z","timestamp":1775173073580,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2023YFB2904000, 2023YFB2904001"],"award-info":[{"award-number":["2023YFB2904000, 2023YFB2904001"]}]},{"name":"Zhejiang Provincial Natural Science Foundation of China under Grant","award":["LD24F020014"],"award-info":[{"award-number":["LD24F020014"]}]},{"name":"Joint Funds of the National Natural Science Foundation of China","award":["U20A20178"],"award-info":[{"award-number":["U20A20178"]}]},{"name":"Hangzhou Leading Innovation and Entrepreneurship Team","award":["TD2020003"],"award-info":[{"award-number":["TD2020003"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172359,62072395,62122066"],"award-info":[{"award-number":["62172359,62072395,62122066"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690346","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1166-1180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0921-8869","authenticated-orcid":false,"given":"Zhongjie","family":"Ba","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1933-9775","authenticated-orcid":false,"given":"Jieming","family":"Zhong","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1508-637X","authenticated-orcid":false,"given":"Jiachen","family":"Lei","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4453-2274","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7265-0497","authenticated-orcid":false,"given":"Qinglong","family":"Wang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-6969","authenticated-orcid":false,"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Matthias Bastian. 2023. Midjourney now has an easy mode and a new AI moderation system. https:\/\/techgameworld.com\/midjourney-bans-a-user-who-generates-images-of-politicians-cheating-on-their-wives\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Extracting training data from diffusion models. arXiv preprint arXiv:2301.13188","author":"Carlini Nicholas","year":"2023","unstructured":"Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramer, Borja Balle, Daphne Ippolito, and Eric Wallace. 2023. Extracting training data from diffusion models. arXiv preprint arXiv:2301.13188 (2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"Hila Chefer Oran Lang Mor Geva Volodymyr Polosukhin Assaf Shocher Michal Irani Inbar Mosseri and Lior Wolf. 2023. The Hidden Language of Diffusion Models. arxiv: 2306.00966 [cs.CV]"},{"key":"e_1_3_2_1_4_1","volume-title":"Dimakis","author":"Daras Giannis","year":"2022","unstructured":"Giannis Daras and Alexandros G. Dimakis. 2022. Discovering the Hidden Vocabulary of DALLE-2. arxiv: 2206.00169 [cs.LG]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2021.3087709"},{"key":"e_1_3_2_1_6_1","volume-title":"Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Model. arXiv preprint arXiv:2312.07130","author":"Deng Yimo","year":"2023","unstructured":"Yimo Deng and Huangxun Chen. 2023. Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Model. arXiv preprint arXiv:2312.07130 (2023)."},{"key":"e_1_3_2_1_7_1","unstructured":"DreamStudio. 2023. Terms of Service. https:\/\/dreamstudio.ai\/terms-of-service. Accessed: 2023-01--24."},{"key":"e_1_3_2_1_8_1","volume-title":"Unstable Diffusion: Ethical challenges and some ways forward. https:\/\/montrealethics.ai\/unstable-diffusion-ethical-challenges-and-some-ways-forward\/.","author":"Gupta Abhishek","year":"2022","unstructured":"Abhishek Gupta. 2022. Unstable Diffusion: Ethical challenges and some ways forward. https:\/\/montrealethics.ai\/unstable-diffusion-ethical-challenges-and-some-ways-forward\/."},{"key":"e_1_3_2_1_9_1","unstructured":"LAION-AI. 2022. CLIP-based-NSFW-Detector. https:\/\/github.com\/LAION-AI\/CLIP-based-NSFW-Detector."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01972"},{"key":"e_1_3_2_1_11_1","volume-title":"Adversarial prompting for black box foundation models. arXiv preprint arXiv:2302.04237","author":"Maus Natalie","year":"2023","unstructured":"Natalie Maus, Patrick Chao, Eric Wong, and Jacob Gardner. 2023. Adversarial prompting for black box foundation models. arXiv preprint arXiv:2302.04237 (2023)."},{"key":"e_1_3_2_1_12_1","unstructured":"Midjourney. 2023. Midjourney. https:\/\/www.midjourney.com."},{"key":"e_1_3_2_1_13_1","unstructured":"Midjourney. 2024. Community Guidelines of Midjourney. https:\/\/docs.midjourney.com\/docs\/community-guidelines"},{"key":"e_1_3_2_1_14_1","volume-title":"Adversarial attacks on image generation with made-up words. arXiv preprint arXiv:2208.04135","author":"Milli\u00e8re Rapha\u00ebl","year":"2022","unstructured":"Rapha\u00ebl Milli\u00e8re. 2022. Adversarial attacks on image generation with made-up words. arXiv preprint arXiv:2208.04135 (2022)."},{"key":"e_1_3_2_1_15_1","unstructured":"OpenAI. 2023. Usage Policies. https:\/\/openai.com\/policies\/usage-policies\/. Accessed: 2023-01--24."},{"key":"e_1_3_2_1_16_1","unstructured":"Ayush Parti. 2023. Midjourney vs. Stable Diffusion vs. DALL-E: What's best in 2023? https:\/\/www.producthunt.com\/stories\/midjourney-vs-stable-diffusion-vs-dall-e."},{"key":"e_1_3_2_1_17_1","volume-title":"Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. arxiv: 2305.13873 [cs.CV]","author":"Qu Yiting","year":"2023","unstructured":"Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, and Yang Zhang. 2023. Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. arxiv: 2305.13873 [cs.CV]"},{"key":"e_1_3_2_1_18_1","unstructured":"Aditya Ramesh Prafulla Dhariwal Alex Nichol Casey Chu and Mark Chen. 2022. Hierarchical Text-Conditional Image Generation with CLIP Latents. arxiv: 2204.06125 [cs.CV]"},{"key":"e_1_3_2_1_19_1","volume-title":"Red-teaming the stable diffusion safety filter. arXiv preprint arXiv:2210.04610","author":"Rando Javier","year":"2022","unstructured":"Javier Rando, Daniel Paleka, David Lindner, Lennard Heim, and Florian Tram\u00e8r. 2022. Red-teaming the stable diffusion safety filter. arXiv preprint arXiv:2210.04610 (2022)."},{"key":"e_1_3_2_1_20_1","unstructured":"Thorn Research. 2024. Child Sexual Abuse Material (CSAM). https:\/\/www.thorn.org\/research\/child-sexual-abuse-material-csam\/ Accessed: 2024-08--21."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_22_1","unstructured":"Walker Ronnie. 2023. Midjourney bans a user who generates images of politicians cheating on their wives. https:\/\/techgameworld.com\/midjourney-bans-a-user-who-generates-images-of-politicians-cheating-on-their-wives\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02157"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Patrick Schramowski Christopher Tauchmann and Kristian Kersting. 2022. Can Machines Help Us Answering Question 16 in Datasheets and In Turn Reflecting on Inappropriate Content?arxiv: 2202.06675 [cs.AI]","DOI":"10.1145\/3531146.3533192"},{"key":"e_1_3_2_1_25_1","unstructured":"stability.ai. 2024. Dreamstudio. https:\/\/beta.dreamstudio.ai\/generate."},{"key":"e_1_3_2_1_26_1","volume-title":"A Reproducible Extraction of Training Images from Diffusion Models. arXiv preprint arXiv:2305.08694","author":"Webster Ryan","year":"2023","unstructured":"Ryan Webster. 2023. A Reproducible Extraction of Training Images from Diffusion Models. arXiv preprint arXiv:2305.08694 (2023)."},{"key":"e_1_3_2_1_27_1","volume-title":"Midjourney Statistics: Users, Polls, & Growth [Aug 2023]. https:\/\/approachableai.com\/midjourney-statistics\/.","author":"Wilson Andrew","year":"2023","unstructured":"Andrew Wilson. 2023. Midjourney Statistics: Users, Polls, & Growth [Aug 2023]. https:\/\/approachableai.com\/midjourney-statistics\/."},{"key":"e_1_3_2_1_28_1","unstructured":"XCloud. 2019. Image Censorship. https:\/\/github.com\/lucasxlu\/XCloud\/tree\/master\/research\/imgcensor."},{"key":"e_1_3_2_1_29_1","volume-title":"SneakyPrompt: Evaluating Robustness of Text-to-image Generative Models' Safety Filters. arXiv preprint arXiv:2305.12082","author":"Yang Yuchen","year":"2023","unstructured":"Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, and Yinzhi Cao. 2023. SneakyPrompt: Evaluating Robustness of Text-to-image Generative Models' Safety Filters. arXiv preprint arXiv:2305.12082 (2023)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:08:54Z","timestamp":1755842934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":29,"alternative-id":["10.1145\/3658644.3690346","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690346","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}