├── IQA.py ├── README.md ├── Word2Vec └── .gitkeep ├── classification.py ├── examples ├── framework.png ├── ptp_utils.py └── seq_aligner.py ├── get_object_attention_mask.py ├── mini_100.txt ├── modified_clip.py ├── modified_stable_diffusion_pipeline.py ├── object_config.json ├── optim_utils.py ├── perceptrontagger_model └── averaged_perceptron_tagger.pickle ├── pos_tagger.py ├── referenced_images ├── objects │ ├── cock │ │ ├── 0.png │ │ ├── 1.png │ │ ├── 2.png │ │ ├── 3.png │ │ ├── 4.png │ │ ├── 5.png │ │ ├── 6.png │ │ ├── 7.png │ │ ├── 8.png │ │ └── 9.png │ ├── forbidden_words.txt │ ├── mushroom │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── panda │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── peony │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── pizza │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── target_object.txt │ ├── toucan │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── tractor │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── vampire │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ ├── warplane │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg │ └── zombie │ │ ├── 0.jpg │ │ ├── 1.jpg │ │ ├── 2.jpg │ │ ├── 3.jpg │ │ ├── 4.jpg │ │ ├── 5.jpg │ │ ├── 6.jpg │ │ ├── 7.jpg │ │ ├── 8.jpg │ │ └── 9.jpg └── style │ ├── animation │ ├── Amongst_the_ruins,_a_leopard_is_roaring.jpg │ ├── An_Indian_elephant_adorned_with_a_golden_saddle_paraded_through_the_forest.jpg │ ├── The_English_setter_gracefully_pointed_towards_hidden_game_in_the_tall_grass.jpg │ ├── The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg │ ├── The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg │ ├── The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg │ ├── a_photo_of_consomme.jpg │ ├── a_photo_of_garbage_truck.jpg │ ├── a_photo_of_hotdog.jpg │ ├── a_photo_of_laptop.jpg │ ├── a_photo_of_military_uniform.jpg │ ├── a_photo_of_submarine.jpg │ ├── a_photo_of_tractor.jpg │ ├── a_photo_of_violin.jpg │ └── a_ram_grazed_peacefully_under_the_stars.jpg │ ├── forbidden_words.txt │ ├── oil painting │ ├── Amongst_the_ruins,_a_leopard_is_roaring.jpg │ ├── An_Indian_elephant_adorned_with_a_golden_saddle_paraded_through_the_forest.jpg │ ├── The_English_setter_gracefully_pointed_towards_hidden_game_in_the_tall_grass.jpg │ ├── The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg │ ├── The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg │ ├── The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg │ ├── a_photo_of_consomme.jpg │ ├── a_photo_of_garbage_truck.jpg │ ├── a_photo_of_hotdog.jpg │ ├── a_photo_of_laptop.jpg │ ├── a_photo_of_military_uniform.jpg │ ├── a_photo_of_submarine.jpg │ ├── a_photo_of_tractor.jpg │ ├── a_photo_of_violin.jpg │ └── a_ram_grazed_peacefully_under_the_stars.jpg │ ├── sketch │ ├── Amongst_the_ruins,_a_leopard_is_roaring.jpg │ ├── An_Indian_elephant_paraded_through_the_forest.jpg │ ├── The_English_setter_gracefully_ran_in_the_tall_grass.jpg │ ├── The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg │ ├── The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg │ ├── The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg │ ├── a_photo_of_consomme.jpg │ ├── a_photo_of_garbage_truck.jpg │ ├── a_photo_of_hotdog.jpg │ ├── a_photo_of_laptop.jpg │ ├── a_photo_of_military_uniform.jpg │ ├── a_photo_of_submarine.jpg │ ├── a_photo_of_tractor.jpg │ ├── a_photo_of_violin.jpg │ └── a_ram_grazed_peacefully_under_the_stars.jpg │ ├── target_style.txt │ └── watercolor │ ├── Amongst_the_ruins,_a_leopard_is_roaring.jpg │ ├── An_Indian_elephant_paraded_through_the_forest.jpg │ ├── The_English_setter_gracefully_ran_in_the_tall_grass.jpg │ ├── The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg │ ├── The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg │ ├── The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg │ ├── a_photo_of_consomme.jpg │ ├── a_photo_of_garbage_truck.jpg │ ├── a_photo_of_hotdog.jpg │ ├── a_photo_of_laptop.jpg │ ├── a_photo_of_military_uniform.jpg │ ├── a_photo_of_submarine.jpg │ ├── a_photo_of_tractor.jpg │ ├── a_photo_of_violin.jpg │ └── a_ram_grazed_peacefully_under_the_stars.jpg ├── requirements.txt ├── run.py ├── simple_prompt.txt ├── style_config.json ├── synonym.py ├── test_object_multi.py └── test_style_multi.py /IQA.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/IQA.py -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/README.md -------------------------------------------------------------------------------- /Word2Vec/.gitkeep: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /classification.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/classification.py -------------------------------------------------------------------------------- /examples/framework.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/examples/framework.png -------------------------------------------------------------------------------- /examples/ptp_utils.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/examples/ptp_utils.py -------------------------------------------------------------------------------- /examples/seq_aligner.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/examples/seq_aligner.py -------------------------------------------------------------------------------- /get_object_attention_mask.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/get_object_attention_mask.py -------------------------------------------------------------------------------- /mini_100.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/mini_100.txt -------------------------------------------------------------------------------- /modified_clip.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/modified_clip.py -------------------------------------------------------------------------------- /modified_stable_diffusion_pipeline.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/modified_stable_diffusion_pipeline.py -------------------------------------------------------------------------------- /object_config.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/object_config.json -------------------------------------------------------------------------------- /optim_utils.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/optim_utils.py -------------------------------------------------------------------------------- /perceptrontagger_model/averaged_perceptron_tagger.pickle: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/perceptrontagger_model/averaged_perceptron_tagger.pickle -------------------------------------------------------------------------------- /pos_tagger.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/pos_tagger.py -------------------------------------------------------------------------------- /referenced_images/objects/cock/0.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/0.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/1.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/2.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/3.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/4.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/4.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/5.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/6.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/6.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/7.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/7.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/8.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/8.png -------------------------------------------------------------------------------- /referenced_images/objects/cock/9.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/cock/9.png -------------------------------------------------------------------------------- /referenced_images/objects/forbidden_words.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/forbidden_words.txt -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/mushroom/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/mushroom/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/panda/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/panda/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/peony/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/peony/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/pizza/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/pizza/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/target_object.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/target_object.txt -------------------------------------------------------------------------------- /referenced_images/objects/toucan/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/toucan/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/toucan/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/tractor/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/tractor/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/vampire/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/vampire/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/warplane/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/warplane/9.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/0.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/1.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/2.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/3.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/4.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/4.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/5.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/6.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/6.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/7.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/7.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/8.jpg -------------------------------------------------------------------------------- /referenced_images/objects/zombie/9.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/objects/zombie/9.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/Amongst_the_ruins,_a_leopard_is_roaring.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/Amongst_the_ruins,_a_leopard_is_roaring.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/An_Indian_elephant_adorned_with_a_golden_saddle_paraded_through_the_forest.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/An_Indian_elephant_adorned_with_a_golden_saddle_paraded_through_the_forest.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/The_English_setter_gracefully_pointed_towards_hidden_game_in_the_tall_grass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/The_English_setter_gracefully_pointed_towards_hidden_game_in_the_tall_grass.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_consomme.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_consomme.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_garbage_truck.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_garbage_truck.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_hotdog.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_hotdog.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_laptop.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_laptop.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_military_uniform.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_military_uniform.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_submarine.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_submarine.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_tractor.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_tractor.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_photo_of_violin.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_photo_of_violin.jpg -------------------------------------------------------------------------------- /referenced_images/style/animation/a_ram_grazed_peacefully_under_the_stars.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/animation/a_ram_grazed_peacefully_under_the_stars.jpg -------------------------------------------------------------------------------- /referenced_images/style/forbidden_words.txt: -------------------------------------------------------------------------------- 1 | animation 2 | oil painting 3 | sketch 4 | watercolor -------------------------------------------------------------------------------- /referenced_images/style/oil painting/Amongst_the_ruins,_a_leopard_is_roaring.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/Amongst_the_ruins,_a_leopard_is_roaring.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/An_Indian_elephant_adorned_with_a_golden_saddle_paraded_through_the_forest.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/An_Indian_elephant_adorned_with_a_golden_saddle_paraded_through_the_forest.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/The_English_setter_gracefully_pointed_towards_hidden_game_in_the_tall_grass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/The_English_setter_gracefully_pointed_towards_hidden_game_in_the_tall_grass.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_consomme.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_consomme.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_garbage_truck.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_garbage_truck.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_hotdog.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_hotdog.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_laptop.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_laptop.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_military_uniform.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_military_uniform.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_submarine.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_submarine.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_tractor.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_tractor.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_photo_of_violin.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_photo_of_violin.jpg -------------------------------------------------------------------------------- /referenced_images/style/oil painting/a_ram_grazed_peacefully_under_the_stars.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/oil painting/a_ram_grazed_peacefully_under_the_stars.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/Amongst_the_ruins,_a_leopard_is_roaring.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/Amongst_the_ruins,_a_leopard_is_roaring.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/An_Indian_elephant_paraded_through_the_forest.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/An_Indian_elephant_paraded_through_the_forest.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/The_English_setter_gracefully_ran_in_the_tall_grass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/The_English_setter_gracefully_ran_in_the_tall_grass.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_consomme.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_consomme.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_garbage_truck.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_garbage_truck.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_hotdog.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_hotdog.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_laptop.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_laptop.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_military_uniform.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_military_uniform.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_submarine.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_submarine.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_tractor.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_tractor.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_photo_of_violin.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_photo_of_violin.jpg -------------------------------------------------------------------------------- /referenced_images/style/sketch/a_ram_grazed_peacefully_under_the_stars.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/sketch/a_ram_grazed_peacefully_under_the_stars.jpg -------------------------------------------------------------------------------- /referenced_images/style/target_style.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/target_style.txt -------------------------------------------------------------------------------- /referenced_images/style/watercolor/Amongst_the_ruins,_a_leopard_is_roaring.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/Amongst_the_ruins,_a_leopard_is_roaring.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/An_Indian_elephant_paraded_through_the_forest.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/An_Indian_elephant_paraded_through_the_forest.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/The_English_setter_gracefully_ran_in_the_tall_grass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/The_English_setter_gracefully_ran_in_the_tall_grass.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/The_king_snake_slithered_stealthily_through_the_fallen_leaves.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/The_leopard_stealthily_prowled_through_the_moonlit_castle_courtyard.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/The_ram_playfully_butted_heads_with_its_fellow_herd_members.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_consomme.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_consomme.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_garbage_truck.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_garbage_truck.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_hotdog.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_hotdog.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_laptop.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_laptop.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_military_uniform.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_military_uniform.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_submarine.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_submarine.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_tractor.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_tractor.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_photo_of_violin.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_photo_of_violin.jpg -------------------------------------------------------------------------------- /referenced_images/style/watercolor/a_ram_grazed_peacefully_under_the_stars.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/referenced_images/style/watercolor/a_ram_grazed_peacefully_under_the_stars.jpg -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/requirements.txt -------------------------------------------------------------------------------- /run.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/run.py -------------------------------------------------------------------------------- /simple_prompt.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/simple_prompt.txt -------------------------------------------------------------------------------- /style_config.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/style_config.json -------------------------------------------------------------------------------- /synonym.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/synonym.py -------------------------------------------------------------------------------- /test_object_multi.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/test_object_multi.py -------------------------------------------------------------------------------- /test_style_multi.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/datar001/Revealing-Vulnerabilities-in-Stable-Diffusion-via-Targeted-Attacks/HEAD/test_style_multi.py --------------------------------------------------------------------------------