|国家预印本平台
首页|Token-Level Constraint Boundary Search for Jailbreaking Text-to-Image Models

Token-Level Constraint Boundary Search for Jailbreaking Text-to-Image Models

Token-Level Constraint Boundary Search for Jailbreaking Text-to-Image Models

来源:Arxiv_logoArxiv
英文摘要

Recent advancements in Text-to-Image (T2I) generation have significantly enhanced the realism and creativity of generated images. However, such powerful generative capabilities pose risks related to the production of inappropriate or harmful content. Existing defense mechanisms, including prompt checkers and post-hoc image checkers, are vulnerable to sophisticated adversarial attacks. In this work, we propose TCBS-Attack, a novel query-based black-box jailbreak attack that searches for tokens located near the decision boundaries defined by text and image checkers. By iteratively optimizing tokens near these boundaries, TCBS-Attack generates semantically coherent adversarial prompts capable of bypassing multiple defensive layers in T2I models. Extensive experiments demonstrate that our method consistently outperforms state-of-the-art jailbreak attacks across various T2I models, including securely trained open-source models and commercial online services like DALL-E 3. TCBS-Attack achieves an ASR-4 of 45\% and an ASR-1 of 21\% on jailbreaking full-chain T2I models, significantly surpassing baseline methods.

Jiangtao Liu、Zhaoxin Wang、Handing Wang、Cong Tian、Yaochu Jin

计算技术、计算机技术

Jiangtao Liu,Zhaoxin Wang,Handing Wang,Cong Tian,Yaochu Jin.Token-Level Constraint Boundary Search for Jailbreaking Text-to-Image Models[EB/OL].(2025-04-15)[2025-04-26].https://arxiv.org/abs/2504.11106.点此复制

评论