Xiaojun Jia

Orcid: 0000-0002-2018-9344

According to our database1, Xiaojun Jia authored at least 56 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improving Fast Adversarial Training With Prior-Guided Knowledge.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2024

Context-Aware Robust Fine-Tuning.
Int. J. Comput. Vis., May, 2024

A Survey on Transferability of Adversarial Examples Across Deep Neural Networks.
Trans. Mach. Learn. Res., 2024

Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks.
IEEE Trans. Inf. Forensics Secur., 2024

Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
IEEE Trans. Inf. Forensics Secur., 2024

Texture Re-Scalable Universal Adversarial Perturbation.
IEEE Trans. Inf. Forensics Secur., 2024

RT-Attack: Jailbreaking Text-to-Image Models via Random Token.
CoRR, 2024

Perception-guided Jailbreak against Text-to-Image Models.
CoRR, 2024

Improved Techniques for Optimization-Based Jailbreaking on Large Language Models.
CoRR, 2024

Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024

Identity Inference from CLIP Models using Only Textual Data.
CoRR, 2024

Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs.
CoRR, 2024

Efficiently Adversarial Examples Generation for Visual-Language Models under Targeted Transfer Scenarios using Diffusion Models.
CoRR, 2024

Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective.
CoRR, 2024

Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors.
CoRR, 2024

HSG-MGAF Net: Heterogeneous subgraph-guided multiscale graph attention fusion network for interpretable prediction of whole-slide image.
Comput. Methods Programs Biomed., 2024

Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

EAT-Face: Emotion-Controllable Audio-Driven Talking Face Generation via Diffusion Model.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

Boosting Transferability in Vision-Language Attacks via Diversification Along the Intersection Region of Adversarial Trajectory.
Proceedings of the Computer Vision - ECCV 2024, 2024

Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Does Few-Shot Learning Suffer from Backdoor Attacks?
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Interpretable Inference and Classification of Tissue Types in Histological Colorectal Cancer Slides Based on Ensembles Adaptive Boosting Prototype Tree.
IEEE J. Biomed. Health Informatics, December, 2023

A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection.
CoRR, 2023

SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation.
CoRR, 2023

OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization.
CoRR, 2023

TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation.
CoRR, 2023

Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
CoRR, 2023

Hi-SIGIR: Hierachical Semantic-Guided Image-to-image Retrieval via Scene Graph.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Inequality phenomenon in l<sub>∞</sub>-adversarial training, and its unrealized threats.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Boosting Fast Adversarial Training With Learnable Adversarial Initialization.
IEEE Trans. Image Process., 2022

Context-Aware Robust Fine-Tuning.
CoRR, 2022

MOVE: Effective and Harmless Ownership Verification via Embedded External Features.
CoRR, 2022

Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal.
Proceedings of the Computer Vision - ECCV 2022, 2022

A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022

Prior-Guided Adversarial Initialization for Fast Adversarial Training.
Proceedings of the Computer Vision - ECCV 2022, 2022

LAS-AT: Adversarial Training with Learnable Attack Strategy.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Defending against Model Stealing via Verifying Embedded External Features.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
A novel dual-biological-community swarm intelligence algorithm with a commensal evolution strategy for multimodal problems.
J. Supercomput., 2021

Multi-source data fusion for economic data analysis.
Neural Comput. Appl., 2021

Applying BERT to analyze investor sentiment in stock market.
Neural Comput. Appl., 2021

One-Shot M-Array Pattern Based on Coded Structured Light for Three-Dimensional Object Reconstruction.
J. Control. Sci. Eng., 2021

An Effective and Robust Detector for Logo Detection.
CoRR, 2021

2020
Quantum network based on non-classical light.
Sci. China Inf. Sci., 2020

Financial Big Data Analysis and Early Warning Platform: A Case Study.
IEEE Access, 2020

Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
Identifying and Resisting Adversarial Videos Using Temporal Consistency.
CoRR, 2019

Study of shrimp recognition methods using smart networks.
Comput. Electron. Agric., 2019

ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2015
Quantum limits for cascaded nondegenerate optical parametric oscillators.
Quantum Inf. Process., 2015

2009
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
J. Comput., 2009

2005
An Encoded Mini-grid Structured Light Pattern for Dynamic Scenes.
Proceedings of the Advances in Intelligent Computing, 2005


  Loading...