Diffusion models can be contaminated with backdoors, study finds


New research shows that threat actors can easily implant backdoors in diffusion models used in DALL-E 2 and open-source text-to-image models. Read More