Ju Jia

Orcid: 0000-0001-6894-1331

According to our database1, Ju Jia authored at least 26 papers between 2019 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2026
CTEA: Camouflaged topological element attack via causal influence discovery.
Expert Syst. Appl., 2026

2025
CSIPose: Unveiling Human Poses Using Commodity WiFi Devices Through the Wall.
IEEE Trans. Mob. Comput., October, 2025

HT-Auth: Secure VR Headset Authentication via Subtle Head Tremors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2025

Backdooring Self-Supervised Contrastive Learning by Noisy Alignment.
CoRR, August, 2025

PhysPatch: A Physically Realizable and Transferable Adversarial Patch Attack for Multimodal Large Language Models-based Autonomous Driving Systems.
CoRR, August, 2025

A Lightweight Image Forgery Prevention Scheme for IoT Using GAN-Based Steganography.
IEEE Trans. Ind. Informatics, January, 2025

Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling.
IEEE Trans. Inf. Forensics Secur., 2025

SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation.
IEEE Trans. Dependable Secur. Comput., 2025

PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025

Prompt as a Double-Edged Sword: A Dynamic Equilibrium Gradient-Assigned Attack against Graph Prompt Learning.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.2, 2025

SelfPrompt: Autonomously Evaluating LLM Robustness via Domain-Constrained Knowledge Guidelines and Refined Adversarial Prompts.
Proceedings of the 31st International Conference on Computational Linguistics, 2025

2024
HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024

Efficient and Privacy-Preserving Feature Importance-Based Vertical Federated Learning.
IEEE Trans. Mob. Comput., June, 2024

A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024

KGPA: Robustness Evaluation for Large Language Models via Cross-Domain Knowledge Graphs.
CoRR, 2024

Reliable Model Watermarking: Defending against Theft without Compromising on Evasion.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023

2022
Multiperspective Progressive Structure Adaptation for JPEG Steganography Detection Across Domains.
IEEE Trans. Neural Networks Learn. Syst., 2022

An Effective Imbalanced JPEG Steganalysis Scheme Based on Adaptive Cost-Sensitive Feature Learning.
IEEE Trans. Knowl. Data Eng., 2022

Partial Knowledge Transfer in Visual Recognition Systems via Joint Loss-Aware Consistency Learning.
IEEE Trans. Ind. Informatics, 2022

JPEG steganalysis based on denoising network and attention module.
Int. J. Intell. Syst., 2022

2020
Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis.
Pattern Recognit., 2020

Learning selection channels for image steganalysis in spatial domain.
Neurocomputing, 2020

2019
An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution.
IEEE Access, 2019


  Loading...