|国家预印本平台
首页|Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion Models

Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion Models

Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion Models

来源:Arxiv_logoArxiv
英文摘要

In recent years, Diffusion Models (DMs) have demonstrated significant advances in the field of image generation. However, according to current research, DMs are vulnerable to backdoor attacks, which allow attackers to control the model's output by inputting data containing covert triggers, such as a specific visual patch or phrase. Existing defense strategies are well equipped to thwart such attacks through backdoor detection and trigger inversion because previous attack methods are constrained by limited input spaces and low-dimensional triggers. For example, visual triggers are easily observed by defenders, text-based or attention-based triggers are more susceptible to neural network detection. To explore more possibilities of backdoor attack in DMs, we propose Gungnir, a novel method that enables attackers to activate the backdoor in DMs through style triggers within input images. Our approach proposes using stylistic features as triggers for the first time and implements backdoor attacks successfully in image-to-image tasks by introducing Reconstructing-Adversarial Noise (RAN) and Short-Term Timesteps-Retention (STTR). Our technique generates trigger-embedded images that are perceptually indistinguishable from clean images, thus bypassing both manual inspection and automated detection neural networks. Experiments demonstrate that Gungnir can easily bypass existing defense methods. Among existing DM defense frameworks, our approach achieves a 0 backdoor detection rate (BDR). Our codes are available at https://github.com/paoche11/Gungnir.

Yu Pan、Jiahao Chen、Bingrong Dai、Lin Wang、Yi Du、Jiao Liu

计算技术、计算机技术

Yu Pan,Jiahao Chen,Bingrong Dai,Lin Wang,Yi Du,Jiao Liu.Gungnir: Exploiting Stylistic Features in Images for Backdoor Attacks on Diffusion Models[EB/OL].(2025-07-23)[2025-08-15].https://arxiv.org/abs/2502.20650.点此复制

评论