Search

Your search keyword '"Jia, Xiaojun"' showing total 34 results

Search Constraints

Start Over You searched for: Author "Jia, Xiaojun" Remove constraint Author: "Jia, Xiaojun" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
34 results on '"Jia, Xiaojun"'

Search Results

1. Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory

2. Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

3. Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

4. Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

5. Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors

6. Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

7. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

8. Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

9. Identity Inference from CLIP Models using Only Textual Data

10. Efficiently Adversarial Examples Generation for Visual-Language Models under Targeted Transfer Scenarios using Diffusion Models

11. Improving Fast Adversarial Training with Prior-Guided Knowledge

12. Internet Financial Credit Risk Assessment with Sliding Window and Attention Mechanism LSTM Model

13. Does Few-shot Learning Suffer from Backdoor Attacks?

14. A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection

15. OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization

16. SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation

17. TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation

18. A Survey on Transferability of Adversarial Examples across Deep Neural Networks

19. Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks

20. Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging

21. Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training

22. Context-Aware Robust Fine-Tuning

23. A Large-scale Multiple-objective Method for Black-box Attack against Object Detection

24. MOVE: Effective and Harmless Ownership Verification via Embedded External Features

25. Prior-Guided Adversarial Initialization for Fast Adversarial Training

26. Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal

27. LAS-AT: Adversarial Training with Learnable Attack Strategy

28. Defending against Model Stealing via Verifying Embedded External Features

29. Boosting Fast Adversarial Training with Learnable Adversarial Initialization

30. An Effective and Robust Detector for Logo Detection

31. Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples

32. Identifying and Resisting Adversarial Videos Using Temporal Consistency

33. ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples

34. An index of financial safety of China

Catalog

Books, media, physical & digital resources