Alert button

Image Hijacking: Adversarial Images can Control Generative Models at Runtime

Add code
Bookmark button
Alert button
Sep 01, 2023
Luke Bailey, Euan Ong, Stuart Russell, Scott Emmons

Figure 1 for Image Hijacking: Adversarial Images can Control Generative Models at Runtime
Figure 2 for Image Hijacking: Adversarial Images can Control Generative Models at Runtime
Figure 3 for Image Hijacking: Adversarial Images can Control Generative Models at Runtime
Figure 4 for Image Hijacking: Adversarial Images can Control Generative Models at Runtime

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: