Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models | IEEE Conference Publication | IEEE Xplore