Search

Your search keyword '"Jia, Xiaojun"' showing total 213 results

Search Constraints

Start Over You searched for: Author "Jia, Xiaojun" Remove constraint Author: "Jia, Xiaojun" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
213 results on '"Jia, Xiaojun"'

Search Results

1. PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models

2. Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings

3. What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

4. Buster: Implanting Semantic Backdoor into Text Encoder to Mitigate NSFW Content Generation

5. PBI-Attack: Prior-Guided Bimodal Interactive Black-Box Jailbreak Attack for Toxicity Maximization

6. Optimizing Multispectral Object Detection: A Bag of Tricks and Comprehensive Benchmarks

7. Global Challenge for Safe and Secure LLMs Track 1

8. MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue

9. Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack

10. CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning

11. HTS-Attack: Heuristic Token Search for Jailbreaking Text-to-Image Models

12. Perception-guided Jailbreak against Text-to-Image Models

13. Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning

14. Texture Re-scalable Universal Adversarial Perturbation

15. Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

16. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

17. Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

18. Identity Inference from CLIP Models using Only Textual Data

19. Boosting Transferability in Vision-Language Attacks via Diversification Along the Intersection Region of Adversarial Trajectory

20. Semi-device-independent quantum random number generator with a broadband squeezed state of light

21. Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models Via Diffusion Models

22. High-speed quantum radio-frequency-over-light communication

23. Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory

24. Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

25. Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

26. Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

27. On the Multi-modal Vulnerability of Diffusion Models

28. Does Few-shot Learning Suffer from Backdoor Attacks?

29. JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

30. SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation

31. OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization

32. TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation

33. A Survey on Transferability of Adversarial Examples across Deep Neural Networks

34. Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks

35. Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging

37. Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training

38. Improving Fast Adversarial Training with Prior-Guided Knowledge

39. Context-Aware Robust Fine-Tuning

40. A Large-scale Multiple-objective Method for Black-box Attack against Object Detection

41. MOVE: Effective and Harmless Ownership Verification via Embedded External Features

42. Research on the Influence of Financial Development on Industrial Structure Upgrading

44. Prior-Guided Adversarial Initialization for Fast Adversarial Training

45. Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal

46. High-performance cavity-enhanced quantum memory with warm atomic cell

48. LAS-AT: Adversarial Training with Learnable Attack Strategy

Catalog

Books, media, physical & digital resources