Xiaojun Jia

Orcid: 0000-0002-2018-9344

According to our database1, Xiaojun Jia authored at least 99 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PhysPatch: A Physically Realizable and Transferable Adversarial Patch Attack for Multimodal Large Language Models-based Autonomous Driving Systems.
CoRR, August, 2025

The Emotional Baby Is Truly Deadly: Does your Multimodal Large Reasoning Model Have Emotional Flattery towards Humans?
CoRR, August, 2025

GeoShield: Safeguarding Geolocation Privacy from Vision-Language Models via Adversarial Perturbations.
CoRR, August, 2025

3D Gaussian Splatting Driven Multi-View Robust Physical Adversarial Camouflage Generation.
CoRR, July, 2025

MOVE: Effective and Harmless Ownership Verification via Embedded External Features.
IEEE Trans. Pattern Anal. Mach. Intell., June, 2025

AsFT: Anchoring Safety During LLM Fine-Tuning Within Narrow Safety Basin.
CoRR, June, 2025

Robust Anti-Backdoor Instruction Tuning in LVLMs.
CoRR, June, 2025

SurgVLM: A Large Vision-Language Model and Systematic Evaluation Benchmark for Surgical Intelligence.
CoRR, June, 2025

AdInject: Real-World Black-Box Attacks on Web Agents via Advertising Delivery.
CoRR, May, 2025

Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment.
CoRR, May, 2025

The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework.
CoRR, May, 2025

AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models.
CoRR, May, 2025

AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models.
CoRR, May, 2025

One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems.
CoRR, May, 2025

No Query, No Access.
CoRR, May, 2025

Cannot See the Forest for the Trees: Invoking Heuristics and Biases to Elicit Irrational Choices of LLMs.
CoRR, May, 2025

ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models.
CoRR, April, 2025

Inception: Jailbreak the Memory Mechanism of Text-to-Image Generation Systems.
CoRR, April, 2025

A Vision for Auto Research with LLM Agents.
CoRR, April, 2025

A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment.
CoRR, April, 2025

Advances and Challenges in Foundation Agents: From Brain-Inspired Intelligence to Evolutionary, Collaborative, and Safe Systems.
CoRR, April, 2025

Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models.
CoRR, March, 2025

Accelerate 3D Object Detection Models via Zero-Shot Attention Key Pruning.
CoRR, March, 2025

AgentSafe: Safeguarding Large Language Model-based Multi-agent Systems via Hierarchical Data Management.
CoRR, March, 2025

PersGuard: Preventing Malicious Personalization via Backdoor Attacks on Pre-trained Text-to-Image Diffusion Models.
CoRR, February, 2025

DAMA: Data- and Model-aware Alignment of Multi-modal LLMs.
CoRR, February, 2025

PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models.
CoRR, January, 2025

NSB-H<sup>2</sup>GAN: "Negative Sample"-Boosted Hierarchical Heterogeneous Graph Attention Network for Interpretable Classification of Whole-Slide Images.
IEEE Trans. Image Process., 2025

Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution.
IEEE Trans. Inf. Forensics Secur., 2025

Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models.
IEEE Trans. Inf. Forensics Secur., 2025

Dual-track collaboration: Joint processing of heterogeneous positive and negative graph convolutional network for whole-slide image analysis.
Comput. Methods Programs Biomed., 2025

PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025

Improved Techniques for Optimization-Based Jailbreaking on Large Language Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Crabs: Consuming Resource via Auto-generation for LLM-DoS Attack under Black-box Settings.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

Efficient Universal Goal Hijacking with Semantics-guided Prompt Organization.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

Perception-Guided Jailbreak Against Text-to-Image Models.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Improving Fast Adversarial Training With Prior-Guided Knowledge.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2024

Context-Aware Robust Fine-Tuning.
Int. J. Comput. Vis., May, 2024

A Survey on Transferability of Adversarial Examples Across Deep Neural Networks.
Trans. Mach. Learn. Res., 2024

Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks.
IEEE Trans. Inf. Forensics Secur., 2024

Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
IEEE Trans. Inf. Forensics Secur., 2024

Texture Re-Scalable Universal Adversarial Perturbation.
IEEE Trans. Inf. Forensics Secur., 2024

Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings.
CoRR, 2024

What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context.
CoRR, 2024

Heuristic-Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models.
CoRR, 2024

PBI-Attack: Prior-Guided Bimodal Interactive Black-Box Jailbreak Attack for Toxicity Maximization.
CoRR, 2024

Optimizing Multispectral Object Detection: A Bag of Tricks and Comprehensive Benchmarks.
CoRR, 2024

Global Challenge for Safe and Secure LLMs Track 1.
CoRR, 2024

MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue.
CoRR, 2024

Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack.
CoRR, 2024

CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning.
CoRR, 2024

RT-Attack: Jailbreaking Text-to-Image Models via Random Token.
CoRR, 2024

Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024

Identity Inference from CLIP Models using Only Textual Data.
CoRR, 2024

Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs.
CoRR, 2024

Efficiently Adversarial Examples Generation for Visual-Language Models under Targeted Transfer Scenarios using Diffusion Models.
CoRR, 2024

Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective.
CoRR, 2024

Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors.
CoRR, 2024

HSG-MGAF Net: Heterogeneous subgraph-guided multiscale graph attention fusion network for interpretable prediction of whole-slide image.
Comput. Methods Programs Biomed., 2024

Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

EAT-Face: Emotion-Controllable Audio-Driven Talking Face Generation via Diffusion Model.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

Boosting Transferability in Vision-Language Attacks via Diversification Along the Intersection Region of Adversarial Trajectory.
Proceedings of the Computer Vision - ECCV 2024, 2024

Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Does Few-Shot Learning Suffer from Backdoor Attacks?
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Interpretable Inference and Classification of Tissue Types in Histological Colorectal Cancer Slides Based on Ensembles Adaptive Boosting Prototype Tree.
IEEE J. Biomed. Health Informatics, December, 2023

A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection.
CoRR, 2023

SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation.
CoRR, 2023

OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization.
CoRR, 2023

TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation.
CoRR, 2023

Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
CoRR, 2023

Hi-SIGIR: Hierachical Semantic-Guided Image-to-image Retrieval via Scene Graph.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Inequality phenomenon in l<sub>∞</sub>-adversarial training, and its unrealized threats.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Boosting Fast Adversarial Training With Learnable Adversarial Initialization.
IEEE Trans. Image Process., 2022

Context-Aware Robust Fine-Tuning.
CoRR, 2022

MOVE: Effective and Harmless Ownership Verification via Embedded External Features.
CoRR, 2022

Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal.
Proceedings of the Computer Vision - ECCV 2022, 2022

A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022

Prior-Guided Adversarial Initialization for Fast Adversarial Training.
Proceedings of the Computer Vision - ECCV 2022, 2022

LAS-AT: Adversarial Training with Learnable Attack Strategy.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Defending against Model Stealing via Verifying Embedded External Features.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
A novel dual-biological-community swarm intelligence algorithm with a commensal evolution strategy for multimodal problems.
J. Supercomput., 2021

Multi-source data fusion for economic data analysis.
Neural Comput. Appl., 2021

Applying BERT to analyze investor sentiment in stock market.
Neural Comput. Appl., 2021

One-Shot M-Array Pattern Based on Coded Structured Light for Three-Dimensional Object Reconstruction.
J. Control. Sci. Eng., 2021

An Effective and Robust Detector for Logo Detection.
CoRR, 2021

2020
Quantum network based on non-classical light.
Sci. China Inf. Sci., 2020

Financial Big Data Analysis and Early Warning Platform: A Case Study.
IEEE Access, 2020

Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
Identifying and Resisting Adversarial Videos Using Temporal Consistency.
CoRR, 2019

Study of shrimp recognition methods using smart networks.
Comput. Electron. Agric., 2019

ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2015
Quantum limits for cascaded nondegenerate optical parametric oscillators.
Quantum Inf. Process., 2015

2009
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
J. Comput., 2009

2005
An Encoded Mini-grid Structured Light Pattern for Dynamic Scenes.
Proceedings of the Advances in Intelligent Computing, 2005


  Loading...