Search Results for author: Jordan Vice

Found 3 papers, 1 papers with code

Severity Controlled Text-to-Image Generative Model Bias Manipulation

no code implementations3 Apr 2024 Jordan Vice, Naveed Akhtar, Richard Hartley, Ajmal Mian

Charting the susceptibility of T2I models to such manipulation, we first expose the new possibility of a dynamic and computationally efficient exploitation of model bias by targeting the embedded language models.

Backdoor Attack Prompt Engineering

Quantifying Bias in Text-to-Image Generative Models

no code implementations20 Dec 2023 Jordan Vice, Naveed Akhtar, Richard Hartley, Ajmal Mian

Bias in text-to-image (T2I) models can propagate unfair social representations and may be used to aggressively market ideas or push controversial agendas.

Hallucination Marketing

BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models

1 code implementation31 Jul 2023 Jordan Vice, Naveed Akhtar, Richard Hartley, Ajmal Mian

Based on the penetration level, BAGM takes the form of a suite of attacks that are referred to as surface, shallow and deep attacks in this article.

Backdoor Attack Language Modelling +2

Cannot find the paper you are looking for? You can Submit a new open access paper.