Skip to content
Mobrief

Tuning Just Enough: Lightweight Backdoor Attacks on Multi-Encoder Diffusion Models

As text-to-image diffusion models become increasingly deployed in real-world applications, concerns about backdoor attacks have gained significant attention.

arXiv cs.LG · · Paper: ~15 min
Research

Academic or research source. Check the methodology, sample size, and whether it's been replicated.

  • May affect how AI can be used.
  • As text-to-image diffusion models become increasingly deployed in real-world applications, concerns about backdoor attacks have gained significant attention.
  • Prior work on text-based backdoor attacks has largely focused on diffusion models conditioned on a single lightweight text encoder.

Context

As text-to-image diffusion models become increasingly deployed in real-world applications, concerns about backdoor attacks have gained significant attention. Prior work on text-based backdoor attacks has largely focused on diffusion models conditioned on a single lightweight text encoder. However, more recent diffusion models that incorporate multiple large-scale text encoders remain underexplored in this context. Given the substantially increased number of trainable parameters introduced by multiple text encoders, an important question is whether backdoor attacks can remain both efficient and effective in such settings. In this work, we study Stable Diffusion 3, which uses three distinct text encoders and has not yet been systematically analyzed for text-encoder-based backdoor vulnerabilities. To understand the role of text encoders in backdoor attacks, we define four categories of attack targets and identify the minimal sets of encoders required to achieve effective performance for each attack objective. Based on this, we further propose Multi-Encoder Lightweight aTtacks (MELT), which trains only low-rank adapters while keeping the pretrained text encoder weight frozen. We…

For builders

Prior work on text-based backdoor attacks has largely focused on diffusion models conditioned on a single lightweight text encoder.

Prior work on text-based backdoor attacks has largely focused on diffusion models conditioned on a single lightweight text encoder.

Paper PDF
Read Original
Open
O open S save B back M mode