Search

Your search keyword '"Jia, Xiaojun"' showing total 199 results

Search Constraints

Start Over You searched for: Author "Jia, Xiaojun" Remove constraint Author: "Jia, Xiaojun" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
199 results on '"Jia, Xiaojun"'

Search Results

1. TA-Cleaner: A Fine-grained Text Alignment Backdoor Defense Strategy for Multimodal Contrastive Learning

2. RT-Attack: Jailbreaking Text-to-Image Models via Random Token

3. Perception-guided Jailbreak against Text-to-Image Models

4. Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning

5. Texture Re-scalable Universal Adversarial Perturbation

6. Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

7. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

8. Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

9. Identity Inference from CLIP Models using Only Textual Data

10. Semi-device-independent quantum random number generator with a broadband squeezed state of light

11. Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models Via Diffusion Models

12. High-speed quantum radio-frequency-over-light communication

13. Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory

14. Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

15. Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

16. Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

17. Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors

18. Does Few-shot Learning Suffer from Backdoor Attacks?

19. JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

20. SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation

21. OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization

22. TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation

23. A Survey on Transferability of Adversarial Examples across Deep Neural Networks

24. Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks

25. Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging

26. Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training

28. Improving Fast Adversarial Training with Prior-Guided Knowledge

29. Research on the Influence of Financial Development on Industrial Structure Upgrading

30. Context-Aware Robust Fine-Tuning

31. A Large-scale Multiple-objective Method for Black-box Attack against Object Detection

32. MOVE: Effective and Harmless Ownership Verification via Embedded External Features

33. Prior-Guided Adversarial Initialization for Fast Adversarial Training

34. Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal

35. High-performance cavity-enhanced quantum memory with warm atomic cell

36. LAS-AT: Adversarial Training with Learnable Attack Strategy

37. Defending against Model Stealing via Verifying Embedded External Features

41. Establishment of Evaluation System to Ensure the Safety of Environmental Industry in China Under the New Development Pattern

42. The Impact of Digitalization on Teleworking Communication and Trust in the Post Epidemic Era

43. Exploring Graphic Design and its Interactivity in the Context of Cognitive Psychology

44. Perceiving and Communicating the Value of Artistic Aesthetics Based on Multiple Intelligences Theory

Catalog

Books, media, physical & digital resources