Xiaojun Jia
Orcid: 0000-0002-2018-9344
According to our database1,
Xiaojun Jia
authored at least 99 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
PhysPatch: A Physically Realizable and Transferable Adversarial Patch Attack for Multimodal Large Language Models-based Autonomous Driving Systems.
CoRR, August, 2025
The Emotional Baby Is Truly Deadly: Does your Multimodal Large Reasoning Model Have Emotional Flattery towards Humans?
CoRR, August, 2025
GeoShield: Safeguarding Geolocation Privacy from Vision-Language Models via Adversarial Perturbations.
CoRR, August, 2025
3D Gaussian Splatting Driven Multi-View Robust Physical Adversarial Camouflage Generation.
CoRR, July, 2025
IEEE Trans. Pattern Anal. Mach. Intell., June, 2025
CoRR, June, 2025
SurgVLM: A Large Vision-Language Model and Systematic Evaluation Benchmark for Surgical Intelligence.
CoRR, June, 2025
CoRR, May, 2025
CoRR, May, 2025
The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework.
CoRR, May, 2025
AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models.
CoRR, May, 2025
CoRR, May, 2025
One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems.
CoRR, May, 2025
Cannot See the Forest for the Trees: Invoking Heuristics and Biases to Elicit Irrational Choices of LLMs.
CoRR, May, 2025
ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models.
CoRR, April, 2025
CoRR, April, 2025
A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment.
CoRR, April, 2025
Advances and Challenges in Foundation Agents: From Brain-Inspired Intelligence to Evolutionary, Collaborative, and Safe Systems.
CoRR, April, 2025
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models.
CoRR, March, 2025
CoRR, March, 2025
AgentSafe: Safeguarding Large Language Model-based Multi-agent Systems via Hierarchical Data Management.
CoRR, March, 2025
PersGuard: Preventing Malicious Personalization via Backdoor Attacks on Pre-trained Text-to-Image Diffusion Models.
CoRR, February, 2025
CoRR, January, 2025
NSB-H<sup>2</sup>GAN: "Negative Sample"-Boosted Hierarchical Heterogeneous Graph Attention Network for Interpretable Classification of Whole-Slide Images.
IEEE Trans. Image Process., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models.
IEEE Trans. Inf. Forensics Secur., 2025
Dual-track collaboration: Joint processing of heterogeneous positive and negative graph convolutional network for whole-slide image analysis.
Comput. Methods Programs Biomed., 2025
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Crabs: Consuming Resource via Auto-generation for LLM-DoS Attack under Black-box Settings.
Proceedings of the Findings of the Association for Computational Linguistics, 2025
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
IEEE Trans. Pattern Anal. Mach. Intell., September, 2024
Trans. Mach. Learn. Res., 2024
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks.
IEEE Trans. Inf. Forensics Secur., 2024
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings.
CoRR, 2024
What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context.
CoRR, 2024
Heuristic-Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models.
CoRR, 2024
PBI-Attack: Prior-Guided Bimodal Interactive Black-Box Jailbreak Attack for Toxicity Maximization.
CoRR, 2024
Optimizing Multispectral Object Detection: A Bag of Tricks and Comprehensive Benchmarks.
CoRR, 2024
Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack.
CoRR, 2024
CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning.
CoRR, 2024
Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024
CoRR, 2024
Efficiently Adversarial Examples Generation for Visual-Language Models under Targeted Transfer Scenarios using Diffusion Models.
CoRR, 2024
Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective.
CoRR, 2024
Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors.
CoRR, 2024
HSG-MGAF Net: Heterogeneous subgraph-guided multiscale graph attention fusion network for interpretable prediction of whole-slide image.
Comput. Methods Programs Biomed., 2024
Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
EAT-Face: Emotion-Controllable Audio-Driven Talking Face Generation via Diffusion Model.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024
Boosting Transferability in Vision-Language Attacks via Diversification Along the Intersection Region of Adversarial Trajectory.
Proceedings of the Computer Vision - ECCV 2024, 2024
Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Interpretable Inference and Classification of Tissue Types in Histological Colorectal Cancer Slides Based on Ensembles Adaptive Boosting Prototype Tree.
IEEE J. Biomed. Health Informatics, December, 2023
SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation.
CoRR, 2023
OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization.
CoRR, 2023
TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation.
CoRR, 2023
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
CoRR, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023
Inequality phenomenon in l<sub>∞</sub>-adversarial training, and its unrealized threats.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Image Process., 2022
CoRR, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
A novel dual-biological-community swarm intelligence algorithm with a commensal evolution strategy for multimodal problems.
J. Supercomput., 2021
Neural Comput. Appl., 2021
One-Shot M-Array Pattern Based on Coded Structured Light for Three-Dimensional Object Reconstruction.
J. Control. Sci. Eng., 2021
2020
IEEE Access, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
2019
Comput. Electron. Agric., 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
2015
Quantum Inf. Process., 2015
2009
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
J. Comput., 2009
2005
Proceedings of the Advances in Intelligent Computing, 2005