AI RESEARCH

Token-Level Constraint Boundary Search for Jailbreaking Text-to-Image Models

arXiv CS.CV

ArXi:2504.11106v2 Announce Type: replace Text-to-Image (T2I) generation has advanced rapidly in recent years, but they also raise safety concerns due to the potential production of harmful content. In the practical deployments, T2I services typically adopt full-chain defenses that combine a prompt checker, a securely trained generator, and a post-hoc image checker.