咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 19 篇 计算机科学与技术...
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 哲学
    • 3 篇 哲学
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 2 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 2 篇 艺术学
    • 2 篇 艺术学理论
  • 1 篇 历史学
    • 1 篇 考古学

主题

  • 24 篇 text-to-image mo...
  • 5 篇 generative ai
  • 3 篇 large language m...
  • 2 篇 ai safety
  • 2 篇 unsafe images
  • 2 篇 ai harms
  • 2 篇 human-centered a...
  • 2 篇 artificial intel...
  • 1 篇 qualitative rese...
  • 1 篇 generative desig...
  • 1 篇 disability repre...
  • 1 篇 prompt engineeri...
  • 1 篇 jailbreaking
  • 1 篇 human-ai alignme...
  • 1 篇 creative ai
  • 1 篇 ai risks
  • 1 篇 industrial desig...
  • 1 篇 generative pre-t...
  • 1 篇 failure modes
  • 1 篇 vqa

机构

  • 4 篇 cispa helmholtz ...
  • 2 篇 google res ny us...
  • 1 篇 google res ca 94...
  • 1 篇 zhejiang univ de...
  • 1 篇 google res seatt...
  • 1 篇 univ washington ...
  • 1 篇 beijing univ pos...
  • 1 篇 shanghai ai lab ...
  • 1 篇 univ sydney sydn...
  • 1 篇 finland futures ...
  • 1 篇 google res ca us...
  • 1 篇 google inc engla...
  • 1 篇 irt systemx f-91...
  • 1 篇 google res bould...
  • 1 篇 univ north carol...
  • 1 篇 delft univ techn...
  • 1 篇 univ exeter dept...
  • 1 篇 western sydney u...
  • 1 篇 univ stirling d2...
  • 1 篇 imperial coll lo...

作者

  • 4 篇 zhang yang
  • 3 篇 backes michael
  • 2 篇 qadri rida
  • 2 篇 sha zeyang
  • 2 篇 bennett cynthia ...
  • 1 篇 xu chenxin
  • 1 篇 lupetti maria. l...
  • 1 篇 li kedan
  • 1 篇 chang minsuk
  • 1 篇 rouf rakeen
  • 1 篇 cao yinzhi
  • 1 篇 tan yicong
  • 1 篇 sun lingyun
  • 1 篇 calleo yuri
  • 1 篇 hoggenmueller ma...
  • 1 篇 denton emily
  • 1 篇 govind manish ku...
  • 1 篇 jawed faraz
  • 1 篇 liu xinyue
  • 1 篇 bavalatti trupti

语言

  • 23 篇 英文
  • 1 篇 其他
检索条件"主题词=Text-To-Image Models"
24 条 记 录,以下是1-10 订阅
排序:
Challenges in Generating Accurate text in images: A Benchmark for text-to-image models on Specialized Content
收藏 引用
APPLIED SCIENCES-BASEL 2025年 第5期15卷 2274-2274页
作者: Bosheah, Zenab Bilicki, Vilmos Univ Szeged Inst Informat Dept Software Engn H-6720 Szeged Hungary
Rapid advances in text-to-image (T2I) generative models have significantly enhanced visual content creation. However, evaluating these models remains challenging, particularly when assessing their ability to handle co... 详细信息
来源: 评论
Ethical-Lens: Curbing malicious usages of open-source text-to-image models
收藏 引用
PATTERNS 2025年 第3期6卷 101187页
作者: Cai, Yuzhu Yin, Sheng Wei, Yuxi Xu, Chenxin Mao, Weibo Juefei-Xu, Felix Chen, Siheng Wang, Yanfeng Shanghai Jiao Tong Univ Sch Artificial Intelligence Shanghai 200241 Peoples R China Beihang Univ Sch Comp Sci & Engn Beijing 100191 Peoples R China NYU New York NY 10012 USA Shanghai AI Lab Shanghai 201210 Peoples R China
The burgeoning landscape of text-to-image models, exemplified by innovations such as Midjourney and DALLE 3, has revolutionized content creation across diverse sectors. However, these advances bring forth critical eth... 详细信息
来源: 评论
EvilPromptFuzzer: generating inappropriate content based on text-to-image models
收藏 引用
CYBERSECURITY 2024年 第1期7卷 70页
作者: He, Juntao Dai, Haoran Sui, Runqi Yuan, Xuejing Liu, Dun Feng, Hao Liu, Xinyue Yang, Wenchuan Cui, Baojiang Li, Kedan Beijing Univ Posts & Telecommun Sch Cyberspace Secur 10 Xitucheng Rd Beijing 100876 Peoples R China Revery AI Inc 60 Hazelwood Dr 126 Champaign IL 61820 USA
text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content security thr... 详细信息
来源: 评论
SurrogatePrompt: Bypassing the Safety Filter of text-to-image models via Substitution  24
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Imag...
收藏 引用
31st Conference on Computer and Communications Security
作者: Ba, Zhongjie Zhong, Jieming Lei, Jiachen Cheng, Peng Wang, Qinglong Qin, Zhan Wang, Zhibo Ren, Kui Zhejiang Univ State Key Lab Blockchain & Data Secur Hangzhou Peoples R China
Advanced text-to-image models such as DALL center dot E 2, Midjourney, and Stable Diffusion can generate highly realistic images, raising significant concerns regarding the potential proliferation of unsafe content. T... 详细信息
来源: 评论
Efficient Exploration of image Classifier Failures with Bayesian Optimization and text-to-image models
Efficient Exploration of Image Classifier Failures with Baye...
收藏 引用
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Le Coz, Adrien Ouertatani, Houssem Herbin, Stephane Adjed, Faouzi IRT SystemX F-91120 Palaiseau France Univ Paris Saclay DTIS ONERA F-91123 Palaiseau France INRIA Lille France
image classifiers should be used with caution in the real world. Performance evaluated on a validation set may not reflect performance in the real world. In particular, classifiers may perform well for conditions that... 详细信息
来源: 评论
AI's Regimes of Representation: A Community-centered Study of text-to-image models in South Asia  23
AI's Regimes of Representation: A Community-centered Study o...
收藏 引用
6th ACM Conference on Fairness, Accountability, and Transparency (FAccT)
作者: Qadri, Rida Shelby, Renee Bennett, Cynthia L. Denton, Emily Google Res San Francisco CA 94103 USA Google Res New York NY USA
This paper presents a community-centered study of cultural limitations of text-to-image (T2I) models in the South Asian context. We theorize these failures using scholarship on dominant media regimes of representation... 详细信息
来源: 评论
Typology of Risks of Generative text-to-image models  23
Typology of Risks of Generative Text-to-Image Models
收藏 引用
AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society (AIES)
作者: Bird, Charlotte Ungless, Eddie L. Kasirzadeh, Atoosa Univ Edinburgh Sch Informat Edinburgh Midlothian Scotland Univ Edinburgh Alan Turing Inst Edinburgh Midlothian Scotland
This paper investigates the direct risks and harms associated with modern text-to-image generative models, such as DALL-E and Mid-journey, through a comprehensive literature review. While these models offer unpreceden... 详细信息
来源: 评论
Unsafe Diffusion: On the Generation of Unsafe images and Hateful Memes From text-to-image models  23
Unsafe Diffusion: On the Generation of Unsafe Images and Hat...
收藏 引用
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Qu, Yiting Shen, Xinyue He, Xinlei Backes, Michael Zannettou, Savvas Zhang, Yang CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Delft Univ Technol Delft Netherlands
State-of-the-art text-to-image models like Stable Diffusion and DALLE center dot 2 are revolutionizing how people generate visual content. At the same time, society has serious concerns about how adversaries can explo... 详细信息
来源: 评论
Designing with words: exploring the integration of text-to-image models in industrial design
收藏 引用
DIGITAL CREATIVITY 2024年 第4期35卷 378-391页
作者: Barros, Mario Ai, Qi Aalborg Univ Rendsburggade 14 DK-9000 Aalborg Denmark
This study investigates the effectiveness of text-to-image (T2I) models in assisting industrial designers with the visualization of product concepts. Using action research and a reflection-in-action, this research con... 详细信息
来源: 评论
SneakyPrompt: Jailbreaking text-to-image Generative models  45
SneakyPrompt: Jailbreaking Text-to-image Generative Models
收藏 引用
45th IEEE Symposium on Security and Privacy (SP)
作者: Yang, Yuchen Hui, Bo Yuan, Haolin Gong, Neil Cao, Yinzhi Johns Hopkins Univ Baltimore MD 21218 USA Duke Univ Durham NC USA
text-to-image generative models such as Stable Diffusion and DALL center dot E raise many ethical concerns due to the generation of harmful images such as Not-Safe-for-Work (NSFW) ones. To address these ethical concer... 详细信息
来源: 评论