Search

Your search keyword '"Jia, Xiaojun"' showing total 77 results

Search Constraints

Start Over You searched for: Author "Jia, Xiaojun" Remove constraint Author: "Jia, Xiaojun" Database arXiv Remove constraint Database: arXiv
77 results on '"Jia, Xiaojun"'

Search Results

1. DAMA: Data- and Model-aware Alignment of Multi-modal LLMs

2. PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models

3. Crabs: Consuming Resource via Auto-generation for LLM-DoS Attack under Black-box Settings

4. What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

5. Buster: Implanting Semantic Backdoor into Text Encoder to Mitigate NSFW Content Generation

6. PBI-Attack: Prior-Guided Bimodal Interactive Black-Box Jailbreak Attack for Toxicity Maximization

7. Optimizing Multispectral Object Detection: A Bag of Tricks and Comprehensive Benchmarks

8. Global Challenge for Safe and Secure LLMs Track 1

9. MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue

10. Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack

11. CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning

12. HTS-Attack: Heuristic Token Search for Jailbreaking Text-to-Image Models

13. Perception-guided Jailbreak against Text-to-Image Models

14. Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning

15. Texture Re-scalable Universal Adversarial Perturbation

16. Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

17. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

18. Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

19. Identity Inference from CLIP Models using Only Textual Data

20. Semi-device-independent quantum random number generator with a broadband squeezed state of light

21. Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models Via Diffusion Models

22. High-speed quantum radio-frequency-over-light communication

23. Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory

24. Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

25. Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

26. Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

27. On the Multi-modal Vulnerability of Diffusion Models

28. Does Few-shot Learning Suffer from Backdoor Attacks?

29. JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

30. SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation

31. OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization

32. TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation

33. A Survey on Transferability of Adversarial Examples across Deep Neural Networks

34. Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks

35. Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging

36. Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training

37. Improving Fast Adversarial Training with Prior-Guided Knowledge

38. Context-Aware Robust Fine-Tuning

39. A Large-scale Multiple-objective Method for Black-box Attack against Object Detection

40. MOVE: Effective and Harmless Ownership Verification via Embedded External Features

41. Prior-Guided Adversarial Initialization for Fast Adversarial Training

42. Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal

43. High-performance cavity-enhanced quantum memory with warm atomic cell

44. LAS-AT: Adversarial Training with Learnable Attack Strategy

45. Defending against Model Stealing via Verifying Embedded External Features

46. Boosting Fast Adversarial Training with Learnable Adversarial Initialization

47. An Effective and Robust Detector for Logo Detection

48. Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples

49. Quantum interferometer combining squeezing and parametric amplification

50. Quantum enhanced optical phase estimation with a squeezed thermal state

Catalog

Books, media, physical & digital resources