Rethinking the Invisible Protection against Unauthorized Image Usage in Stable DiffusionPublished in Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024), 2024PDF CodeDirect LinkShare on Twitter Facebook LinkedIn Previous Next