{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T23:11:56Z","timestamp":1765667516403,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","funder":[{"name":"Shenzhen Key Laboratory of next generation interactive media innovative technology","award":["ZDSYS20210623092001004"],"award-info":[{"award-number":["ZDSYS20210623092001004"]}]},{"name":"National Key Laboratory of Human-Machine Hybrid Augmented Intelligence, Xi?an Jiaotong University","award":["HMHAI202410"],"award-info":[{"award-number":["HMHAI202410"]}]},{"name":"National Science and Technology Council, Taiwan","award":["114-2221-E-006-114-MY3"],"award-info":[{"award-number":["114-2221-E-006-114-MY3"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3754992","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:38:54Z","timestamp":1761377934000},"page":"11328-11336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ICE: Intercede Concept Erasure in Text-to-Image Diffusion Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7716-7437","authenticated-orcid":false,"given":"Yizhou","family":"Lin","sequence":"first","affiliation":[{"name":"Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1627-6584","authenticated-orcid":false,"given":"Nisha","family":"Huang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Shenzhen, China and Pengcheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5728-0058","authenticated-orcid":false,"given":"Kaer","family":"Huang","sequence":"additional","affiliation":[{"name":"Lenovo Research, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3060-8252","authenticated-orcid":false,"given":"Henglin","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7709-0602","authenticated-orcid":false,"given":"Yiqiang","family":"Yan","sequence":"additional","affiliation":[{"name":"Lenovo Research, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7411-4751","authenticated-orcid":false,"given":"Jie","family":"Guo","sequence":"additional","affiliation":[{"name":"Pengcheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6699-2944","authenticated-orcid":false,"given":"Tong-Yee","family":"Lee","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0403-1923","authenticated-orcid":false,"given":"Xiu","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AUTOMATIC1111. [n. d.]. Negative prompt. https:\/\/github.com\/AUTOMATIC1111\/stable-diffusion-webui\/wiki\/Negative-prompt."},{"key":"e_1_3_2_1_2_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Carlini Nicolas","year":"2023","unstructured":"Nicolas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramer, Borja Balle, Daphne Ippolito, and Eric Wallace. 2023. Extracting training data from diffusion models. In 32nd USENIX Security Symposium (USENIX Security 23). 5253--5270."},{"key":"e_1_3_2_1_3_1","volume-title":"TRCE: Towards Reliable Malicious Concept Erasure in Text-to-Image Diffusion Models. arXiv preprint arXiv:2503.07389","author":"Chen Ruidong","year":"2025","unstructured":"Ruidong Chen, Honglin Guo, Lanjun Wang, Chenyu Zhang, Weizhi Nie, and An-An Liu. 2025. TRCE: Towards Reliable Malicious Concept Erasure in Text-to-Image Diffusion Models. arXiv preprint arXiv:2503.07389 (2025)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3715073.3715079"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00779"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00230"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00503"},{"key":"e_1_3_2_1_8_1","volume-title":"The paradox of artificial creativity: Challenges and opportunities of generative AI artistry. Creativity Research Journal","author":"Garcia Manuel B","year":"2024","unstructured":"Manuel B Garcia. 2024. The paradox of artificial creativity: Challenges and opportunities of generative AI artistry. Creativity Research Journal (2024), 1--14."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73668-1_5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-024-09694-w"},{"key":"e_1_3_2_1_11_1","volume-title":"Selective amnesia: A continual learning approach to forgetting in deep generative models. Advances in Neural Information Processing Systems 36","author":"Heng Alvin","year":"2023","unstructured":"Alvin Heng and Harold Soh. 2023. Selective amnesia: A continual learning approach to forgetting in deep generative models. Advances in Neural Information Processing Systems 36 (2023)."},{"key":"e_1_3_2_1_12_1","volume-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in Neural Information Processing Systems 30","author":"Heusel Martin","year":"2017","unstructured":"Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, and Sepp Hochreiter. 2017. Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in Neural Information Processing Systems 30 (2017)."},{"key":"e_1_3_2_1_13_1","volume-title":"CreativeSynth: Cross- Art-Attention for Artistic Image Synthesis With Multimodal Diffusion","author":"Huang Nisha","year":"2025","unstructured":"Nisha Huang, Weiming Dong, Yuxin Zhang, Fan Tang, Ronghui Li, Chongyang Ma, Xiu Li, Tong-Yee Lee, and Changsheng Xu. 2025. CreativeSynth: Cross- Art-Attention for Artistic Image Synthesis With Multimodal Diffusion. IEEE Transactions on Visualization and Computer Graphics (2025)."},{"key":"e_1_3_2_1_14_1","volume-title":"Artcrafter: Text-image aligning style transfer via embedding reframing. arXiv preprint arXiv:2501.02064","author":"Huang Nisha","year":"2025","unstructured":"Nisha Huang, Kaer Huang, Yifan Pu, Jiangshan Wang, Jie Guo, Yiqiang Yan, Xiu Li, and Tong-Yee Lee. 2025. Artcrafter: Text-image aligning style transfer via embedding reframing. arXiv preprint arXiv:2501.02064 (2025)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548282"},{"key":"e_1_3_2_1_16_1","volume-title":"Diffstyler: Controllable dual diffusion for text-driven image stylization","author":"Huang Nisha","year":"2024","unstructured":"Nisha Huang, Yuxin Zhang, Fan Tang, Chongyang Ma, Haibin Huang, Weiming Dong, and Changsheng Xu. 2024. Diffstyler: Controllable dual diffusion for text-driven image stylization. IEEE Transactions on Neural Networks and Learning Systems (2024)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604681"},{"key":"e_1_3_2_1_18_1","volume-title":"Towards safe self-distillation of internet-scale text-to-image diffusion models. arXiv preprint arXiv:2307.05977","author":"Kim Sanghyun","year":"2023","unstructured":"Sanghyun Kim, Seohyeon Jung, Balhae Kim, Moonseok Choi, Jinwoo Shin, and Juho Lee. 2023. Towards safe self-distillation of internet-scale text-to-image diffusion models. arXiv preprint arXiv:2307.05977 (2023)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19809-0_13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02074"},{"key":"e_1_3_2_1_21_1","volume-title":"Improving Synthetic Image Detection Towards Generalization: An Image Transformation Perspective. arXiv preprint arXiv:2408.06741","author":"Li Ouxiang","year":"2024","unstructured":"Ouxiang Li, Jiayin Cai, Yanbin Hao, Xiaolong Jiang, Yao Hu, and Fuli Feng. 2024. Improving Synthetic Image Detection Towards Generalization: An Image Transformation Perspective. arXiv preprint arXiv:2408.06741 (2024)."},{"key":"e_1_3_2_1_22_1","volume-title":"Model Inversion Attacks Through Target-Specific Conditional Diffusion Models. arXiv preprint arXiv:2407.11424","author":"Li Ouxiang","year":"2024","unstructured":"Ouxiang Li, Yanbin Hao, Zhicai Wang, Bin Zhu, Shuo Wang, Zaixi Zhang, and Fuli Feng. 2024. Model Inversion Attacks Through Target-Specific Conditional Diffusion Models. arXiv preprint arXiv:2407.11424 (2024)."},{"key":"e_1_3_2_1_23_1","volume-title":"SPEED: Scalable, Precise, and Efficient Concept Erasure for Diffusion Models. arXiv preprint arXiv:2503.07392","author":"Li Ouxiang","year":"2025","unstructured":"Ouxiang Li, Yuan Wang, Xinting Hu, Houcheng Jiang, Tao Liang, Yanbin Hao, Guojun Ma, and Fuli Feng. 2025. SPEED: Scalable, Precise, and Efficient Concept Erasure for Diffusion Models. arXiv preprint arXiv:2503.07392 (2025)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00615"},{"key":"e_1_3_2_1_25_1","volume-title":"Stable bias: Evaluating societal representations in diffusion models. Advances in Neural Information Processing Systems 36","author":"Luccioni Sasha","year":"2023","unstructured":"Sasha Luccioni, Christopher Akiki, Margaret Mitchell, and Yacine Jernite. 2023. Stable bias: Evaluating societal representations in diffusion models. Advances in Neural Information Processing Systems 36 (2023)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00722"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611867"},{"key":"e_1_3_2_1_28_1","volume-title":"GLIDE: Towards Photorealistic Image Generation and Editing with Text-Guided Diffusion Models. In International Conference on Machine Learning. PMLR, 16784--16804","author":"Nichol Alexander Quinn","year":"2022","unstructured":"Alexander Quinn Nichol, Prafulla Dhariwal, Aditya Ramesh, Pranav Shyam, Pamela Mishkin, Bob Mcgrew, Ilya Sutskever, and Mark Chen. 2022. GLIDE: Towards Photorealistic Image Generation and Editing with Text-Guided Diffusion Models. In International Conference on Machine Learning. PMLR, 16784--16804."},{"key":"e_1_3_2_1_29_1","unstructured":"OpenAI. 2023. Dall\u00b7e 3 system card. (2023)."},{"key":"e_1_3_2_1_30_1","unstructured":"Ryan O'Connor. 2022. Stable Diffusion 1 vs 2 - What you need to know. (2022)."},{"key":"e_1_3_2_1_31_1","volume-title":"SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. In The Twelfth International Conference on Learning Representations.","author":"Podell Dustin","year":"2023","unstructured":"Dustin Podell, Zion English, Kyle Lacey, Andreas Blattmann, Tim Dockhorn, Jonas M\u00fcller, Joe Penna, and Robin Rombach. 2023. SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. In The Twelfth International Conference on Learning Representations."},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Machine Learning. PMLR, 8748--8763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al. 2021. Learning transferable visual models from natural language supervision. In International Conference on Machine Learning. PMLR, 8748--8763."},{"key":"e_1_3_2_1_33_1","volume-title":"Red-Teaming the Stable Diffusion Safety Filter. In NeurIPS Workshop on Machine Learning Safety. ETH Zurich.","author":"Rando Javier","year":"2022","unstructured":"Javier Rando, Daniel Paleka, David Lindner, Lennart Heim, and Florian Tram\u00e8r. 2022. Red-Teaming the Stable Diffusion Safety Filter. In NeurIPS Workshop on Machine Learning Safety. ETH Zurich."},{"key":"e_1_3_2_1_34_1","unstructured":"Robin Rombach. 2022. Stable diffusion 2.0 release. (2022)."},{"key":"e_1_3_2_1_35_1","unstructured":"Robin Rombach. 2022. Stable diffusion v1--4 model card. (2022)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02157"},{"key":"e_1_3_2_1_38_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shan Shawn","year":"2023","unstructured":"Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, and Ben Y Zhao. 2023. Glaze: Protecting artists from style mimicry by {Text-to-Image} models. In 32nd USENIX Security Symposium (USENIX Security 23). 2187--2204."},{"volume-title":"Tutorial: How to Remove the Safety Filter in 5 seconds.","year":"2022","key":"e_1_3_2_1_39_1","unstructured":"SmithMano. 2022. Tutorial: How to Remove the Safety Filter in 5 seconds."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00025"},{"key":"e_1_3_2_1_41_1","volume-title":"Training Networks in Null Space of Feature Covariance With Self-Supervision for Incremental Learning","author":"Wang Shipeng","year":"2024","unstructured":"Shipeng Wang, Xiaorong Li, Jian Sun, and Zongben Xu. 2024. Training Networks in Null Space of Feature Covariance With Self-Supervision for Incremental Learning. IEEE Transactions on Pattern Analysis and Machine Intelligence (2024)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3703626","article-title":"Security and privacy on generative data in aigc: A survey","volume":"57","author":"Wang Tao","year":"2024","unstructured":"Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, and Jian Weng. 2024. Security and privacy on generative data in aigc: A survey. Comput. Surveys 57, 4 (2024), 1--34.","journal-title":"Comput. Surveys"},{"key":"e_1_3_2_1_43_1","volume-title":"Orthogonal Complement Matters. arXiv preprint arXiv:2412.06143","author":"Wang Yuan","year":"2024","unstructured":"Yuan Wang, Ouxiang Li, Tingting Mu, Yanbin Hao, Kuien Liu, Xiang Wang, and Xiangnan He. 2024. Precise, Fast, and Low-cost Concept Erasure in Value Space: Orthogonal Complement Matters. arXiv preprint arXiv:2412.06143 (2024)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3554729"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00182"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00355"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3754992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T04:14:44Z","timestamp":1765340084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3754992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":46,"alternative-id":["10.1145\/3746027.3754992","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3754992","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}