Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI

Open in new window