Search

Your search keyword '"Jia, Xiaojun"' showing total 499 results

Search Constraints

Start Over You searched for: Author "Jia, Xiaojun" Remove constraint Author: "Jia, Xiaojun"
499 results on '"Jia, Xiaojun"'

Search Results

1. PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models

2. Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings

3. What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

4. Buster: Implanting Semantic Backdoor into Text Encoder to Mitigate NSFW Content Generation

5. PBI-Attack: Prior-Guided Bimodal Interactive Black-Box Jailbreak Attack for Toxicity Maximization

6. Optimizing Multispectral Object Detection: A Bag of Tricks and Comprehensive Benchmarks

7. Global Challenge for Safe and Secure LLMs Track 1

8. MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue

9. Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack

10. CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning

11. HTS-Attack: Heuristic Token Search for Jailbreaking Text-to-Image Models

12. Perception-guided Jailbreak against Text-to-Image Models

13. Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning

14. Texture Re-scalable Universal Adversarial Perturbation

15. Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

16. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

17. Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

18. Identity Inference from CLIP Models using Only Textual Data

19. Boosting Transferability in Vision-Language Attacks via Diversification Along the Intersection Region of Adversarial Trajectory

20. Semi-device-independent quantum random number generator with a broadband squeezed state of light

21. Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models Via Diffusion Models

22. High-speed quantum radio-frequency-over-light communication

23. Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory

24. Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

25. Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

26. Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

27. On the Multi-modal Vulnerability of Diffusion Models

28. Does Few-shot Learning Suffer from Backdoor Attacks?

29. JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

30. SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation

31. OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization

32. TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation

33. A Survey on Transferability of Adversarial Examples across Deep Neural Networks

34. Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks

35. Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging

37. Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training

38. Improving Fast Adversarial Training with Prior-Guided Knowledge

39. Context-Aware Robust Fine-Tuning

40. A Large-scale Multiple-objective Method for Black-box Attack against Object Detection

41. MOVE: Effective and Harmless Ownership Verification via Embedded External Features

42. Research on the Influence of Financial Development on Industrial Structure Upgrading

43. Prior-Guided Adversarial Initialization for Fast Adversarial Training

44. Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal

45. High-performance cavity-enhanced quantum memory with warm atomic cell

47. LAS-AT: Adversarial Training with Learnable Attack Strategy

48. Defending against Model Stealing via Verifying Embedded External Features

49. Boosting Fast Adversarial Training with Learnable Adversarial Initialization

50. An Effective and Robust Detector for Logo Detection

Catalog

Books, media, physical & digital resources