Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability

Open in new window