Xiaojun Jia

Orcid: 0000-0002-2018-9344

According to our database1, Xiaojun Jia authored at least 42 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory.
CoRR, 2024

Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds.
CoRR, 2024

Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection.
CoRR, 2024

Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective.
CoRR, 2024

Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors.
CoRR, 2024

Does Few-Shot Learning Suffer from Backdoor Attacks?
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Interpretable Inference and Classification of Tissue Types in Histological Colorectal Cancer Slides Based on Ensembles Adaptive Boosting Prototype Tree.
IEEE J. Biomed. Health Informatics, December, 2023

A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection.
CoRR, 2023

SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation.
CoRR, 2023

OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization.
CoRR, 2023

TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation.
CoRR, 2023

A Survey on Transferability of Adversarial Examples across Deep Neural Networks.
CoRR, 2023

Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks.
CoRR, 2023

Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
CoRR, 2023

Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training.
CoRR, 2023

Improving Fast Adversarial Training with Prior-Guided Knowledge.
CoRR, 2023

Hi-SIGIR: Hierachical Semantic-Guided Image-to-image Retrieval via Scene Graph.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Inequality phenomenon in l<sub>∞</sub>-adversarial training, and its unrealized threats.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Boosting Fast Adversarial Training With Learnable Adversarial Initialization.
IEEE Trans. Image Process., 2022

Context-Aware Robust Fine-Tuning.
CoRR, 2022

MOVE: Effective and Harmless Ownership Verification via Embedded External Features.
CoRR, 2022

Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal.
Proceedings of the Computer Vision - ECCV 2022, 2022

A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022

Prior-Guided Adversarial Initialization for Fast Adversarial Training.
Proceedings of the Computer Vision - ECCV 2022, 2022

LAS-AT: Adversarial Training with Learnable Attack Strategy.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Defending against Model Stealing via Verifying Embedded External Features.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
A novel dual-biological-community swarm intelligence algorithm with a commensal evolution strategy for multimodal problems.
J. Supercomput., 2021

Multi-source data fusion for economic data analysis.
Neural Comput. Appl., 2021

Applying BERT to analyze investor sentiment in stock market.
Neural Comput. Appl., 2021

One-Shot M-Array Pattern Based on Coded Structured Light for Three-Dimensional Object Reconstruction.
J. Control. Sci. Eng., 2021

An Effective and Robust Detector for Logo Detection.
CoRR, 2021

2020
Quantum network based on non-classical light.
Sci. China Inf. Sci., 2020

Financial Big Data Analysis and Early Warning Platform: A Case Study.
IEEE Access, 2020

Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
Identifying and Resisting Adversarial Videos Using Temporal Consistency.
CoRR, 2019

Study of shrimp recognition methods using smart networks.
Comput. Electron. Agric., 2019

ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2015
Quantum limits for cascaded nondegenerate optical parametric oscillators.
Quantum Inf. Process., 2015

2009
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
J. Comput., 2009

2005
An Encoded Mini-grid Structured Light Pattern for Dynamic Scenes.
Proceedings of the Advances in Intelligent Computing, 2005


  Loading...