Chain-of-Jailbreak Attack for Image Generation Models via Editing Step by Step

Open in new window