default search action
Xiaojun Jia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j19]Meiyan Liang, Xing Jiang, Jie Cao, Shupeng Zhang, Haishun Liu, Bo Li, Lin Wang, Cunlin Zhang, Xiaojun Jia:
HSG-MGAF Net: Heterogeneous subgraph-guided multiscale graph attention fusion network for interpretable prediction of whole-slide image. Comput. Methods Programs Biomed. 247: 108099 (2024) - [j18]Xiaofeng Mao, Yufeng Chen, Xiaojun Jia, Rong Zhang, Hui Xue, Zhao Li:
Context-Aware Robust Fine-Tuning. Int. J. Comput. Vis. 132(5): 1685-1700 (2024) - [j17]Xiaojun Jia, Yong Zhang, Xingxing Wei, Baoyuan Wu, Ke Ma, Jue Wang, Xiaochun Cao:
Improving Fast Adversarial Training With Prior-Guided Knowledge. IEEE Trans. Pattern Anal. Mach. Intell. 46(9): 6367-6383 (2024) - [j16]Xiaojun Jia, Jianshu Li, Jindong Gu, Yang Bai, Xiaochun Cao:
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks. IEEE Trans. Inf. Forensics Secur. 19: 4547-4559 (2024) - [j15]Yuan Xun, Xiaojun Jia, Jindong Gu, Xinwei Liu, Qing Guo, Xiaochun Cao:
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks. IEEE Trans. Inf. Forensics Secur. 19: 4560-4571 (2024) - [j14]Xiaojun Jia, Yuefeng Chen, Xiaofeng Mao, Ranjie Duan, Jindong Gu, Rong Zhang, Hui Xue, Yang Liu, Xiaochun Cao:
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging. IEEE Trans. Inf. Forensics Secur. 19: 8125-8139 (2024) - [j13]Yihao Huang, Qing Guo, Felix Juefei-Xu, Ming Hu, Xiaojun Jia, Xiaochun Cao, Geguang Pu, Yang Liu:
Texture Re-Scalable Universal Adversarial Perturbation. IEEE Trans. Inf. Forensics Secur. 19: 8291-8305 (2024) - [j12]Jindong Gu, Xiaojun Jia, Pau de Jorge, Wenqian Yu, Xinwei Liu, Avery Ma, Yuan Xun, Anjun Hu, Ashkan Khakzar, Zhijiang Li, Xiaochun Cao, Philip Torr:
A Survey on Transferability of Adversarial Examples Across Deep Neural Networks. Trans. Mach. Learn. Res. 2024 (2024) - 2023
- [j11]Meiyan Liang, Ru Wang, Jianan Liang, Lin Wang, Bo Li, Xiaojun Jia, Yu Zhang, Qinghui Chen, Tianyi Zhang, Cunlin Zhang:
Interpretable Inference and Classification of Tissue Types in Histological Colorectal Cancer Slides Based on Ensembles Adaptive Boosting Prototype Tree. IEEE J. Biomed. Health Informatics 27(12): 6006-6017 (2023) - 2022
- [j10]Xiaojun Jia, Yong Zhang, Baoyuan Wu, Jue Wang, Xiaochun Cao:
Boosting Fast Adversarial Training With Learnable Adversarial Initialization. IEEE Trans. Image Process. 31: 4417-4430 (2022) - 2021
- [j9]Xiaojun Jia, Zihao Liu:
One-Shot M-Array Pattern Based on Coded Structured Light for Three-Dimensional Object Reconstruction. J. Control. Sci. Eng. 2021: 6676704:1-6676704:16 (2021) - [j8]Menggang Li, Wenrui Li, Fang Wang, Xiaojun Jia, Guangwei Rui:
Applying BERT to analyze investor sentiment in stock market. Neural Comput. Appl. 33(10): 4663-4676 (2021) - [j7]Menggang Li, Fang Wang, Xiaojun Jia, Wenrui Li, Ting Li, Guangwei Rui:
Multi-source data fusion for economic data analysis. Neural Comput. Appl. 33(10): 4729-4739 (2021) - [j6]Hui Ren, Xiaochen Shen, Xiaojun Jia:
A novel dual-biological-community swarm intelligence algorithm with a commensal evolution strategy for multimodal problems. J. Supercomput. 77(10): 10850-10895 (2021) - 2020
- [j5]Yi Liang, Daiyong Quan, Fang Wang, Xiaojun Jia, Menggang Li, Ting Li:
Financial Big Data Analysis and Early Warning Platform: A Case Study. IEEE Access 8: 36515-36526 (2020) - [j4]Xiaolong Su, Meihong Wang, Zhihui Yan, Xiaojun Jia, Changde Xie, Kunchi Peng:
Quantum network based on non-classical light. Sci. China Inf. Sci. 63(8): 1-12 (2020) - 2019
- [j3]Zihao Liu, Xiaojun Jia, Xinsheng Xu:
Study of shrimp recognition methods using smart networks. Comput. Electron. Agric. 165 (2019) - 2015
- [j2]Wangyun Liu, Xiaojun Jia:
Quantum limits for cascaded nondegenerate optical parametric oscillators. Quantum Inf. Process. 14(8): 2945-2957 (2015) - 2009
- [j1]Xiaojun Jia, Guangxue Yue, Fang Mei:
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting. J. Comput. 4(1): 53-60 (2009)
Conference and Workshop Papers
- 2024
- [c19]Xinwei Liu, Xiaojun Jia, Jindong Gu, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Does Few-Shot Learning Suffer from Backdoor Attacks? AAAI 2024: 19893-19901 - [c18]Tianrui Lou, Xiaojun Jia, Jindong Gu, Li Liu, Siyuan Liang, Bangyan He, Xiaochun Cao:
Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds. CVPR 2024: 24326-24335 - [c17]Sensen Gao, Xiaojun Jia, Xuhong Ren, Ivor W. Tsang, Qing Guo:
Boosting Transferability in Vision-Language Attacks via Diversification Along the Intersection Region of Adversarial Trajectory. ECCV (57) 2024: 442-460 - [c16]Haodi Wang, Xiaojun Jia, Xiaochun Cao:
EAT-Face: Emotion-Controllable Audio-Driven Talking Face Generation via Diffusion Model. FG 2024: 1-10 - [c15]Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao:
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. ICLR 2024 - [c14]Xinwei Liu, Xiaojun Jia, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning. ACM Multimedia 2024: 8024-8033 - 2023
- [c13]Bangyan He, Jian Liu, Yiming Li, Siyuan Liang, Jingzhi Li, Xiaojun Jia, Xiaochun Cao:
Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization. AAAI 2023: 764-772 - [c12]Jianbo Chen, Xinwei Liu, Siyuan Liang, Xiaojun Jia, Yuan Xun:
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection. CVPR Workshops 2023: 2322-2329 - [c11]Ranjie Duan, Yuefeng Chen, Yao Zhu, Xiaojun Jia, Rong Zhang, Hui Xue:
Inequality phenomenon in l∞-adversarial training, and its unrealized threats. ICLR 2023 - [c10]Gege Qi, Yuefeng Chen, Xiaofeng Mao, Xiaojun Jia, Ranjie Duan, Rong Zhang, Hui Xue:
Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training. INTERSPEECH 2023: 561-565 - [c9]Yulu Wang, Pengwen Dai, Xiaojun Jia, Zhitao Zeng, Rui Li, Xiaochun Cao:
Hi-SIGIR: Hierachical Semantic-Guided Image-to-image Retrieval via Scene Graph. ACM Multimedia 2023: 6400-6409 - 2022
- [c8]Yiming Li, Linghui Zhu, Xiaojun Jia, Yong Jiang, Shu-Tao Xia, Xiaochun Cao:
Defending against Model Stealing via Verifying Embedded External Features. AAAI 2022: 1464-1472 - [c7]Xiaojun Jia, Yong Zhang, Baoyuan Wu, Ke Ma, Jue Wang, Xiaochun Cao:
LAS-AT: Adversarial Training with Learnable Attack Strategy. CVPR 2022: 13388-13398 - [c6]Xinwei Liu, Jian Liu, Yang Bai, Jindong Gu, Tao Chen, Xiaojun Jia, Xiaochun Cao:
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal. ECCV (14) 2022: 1-17 - [c5]Xiaojun Jia, Yong Zhang, Xingxing Wei, Baoyuan Wu, Ke Ma, Jue Wang, Xiaochun Cao:
Prior-Guided Adversarial Initialization for Fast Adversarial Training. ECCV (4) 2022: 567-584 - [c4]Siyuan Liang, Longkang Li, Yanbo Fan, Xiaojun Jia, Jingzhi Li, Baoyuan Wu, Xiaochun Cao:
A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection. ECCV (4) 2022: 619-636 - 2020
- [c3]Xiaojun Jia, Xingxing Wei, Xiaochun Cao, Xiaoguang Han:
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples. ACM Multimedia 2020: 1579-1587 - 2019
- [c2]Xiaojun Jia, Xingxing Wei, Xiaochun Cao, Hassan Foroosh:
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples. CVPR 2019: 6084-6092 - 2005
- [c1]Qingcang Yu, Xiaojun Jia, Jian Tao, Yun Zhao:
An Encoded Mini-grid Structured Light Pattern for Dynamic Scenes. ICIC (1) 2005: 126-135
Informal and Other Publications
- 2024
- [i36]Xinwei Liu, Xiaojun Jia, Jindong Gu, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Does Few-shot Learning Suffer from Backdoor Attacks? CoRR abs/2401.01377 (2024) - [i35]Dingcheng Yang, Yang Bai, Xiaojun Jia, Yang Liu, Xiaochun Cao, Wenjian Yu:
Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors. CoRR abs/2402.01369 (2024) - [i34]Yihao Huang, Kaiyuan Yu, Qing Guo, Felix Juefei-Xu, Xiaojun Jia, Tianlin Li, Geguang Pu, Yang Liu:
Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective. CoRR abs/2402.02738 (2024) - [i33]Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao:
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. CoRR abs/2402.11473 (2024) - [i32]Tianrui Lou, Xiaojun Jia, Jindong Gu, Li Liu, Siyuan Liang, Bangyan He, Xiaochun Cao:
Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds. CoRR abs/2403.05247 (2024) - [i31]Sensen Gao, Xiaojun Jia, Xuhong Ren, Ivor W. Tsang, Qing Guo:
Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory. CoRR abs/2403.12445 (2024) - [i30]Qi Guo, Shanmin Pang, Xiaojun Jia, Qing Guo:
Efficiently Adversarial Examples Generation for Visual-Language Models under Targeted Transfer Scenarios using Diffusion Models. CoRR abs/2404.10335 (2024) - [i29]Yihao Huang, Chong Wang, Xiaojun Jia, Qing Guo, Felix Juefei-Xu, Jian Zhang, Geguang Pu, Yang Liu:
Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs. CoRR abs/2405.14189 (2024) - [i28]Songze Li, Ruoxi Cheng, Xiaojun Jia:
Identity Inference from CLIP Models using Only Textual Data. CoRR abs/2405.14517 (2024) - [i27]Di Yang, Yihao Huang, Qing Guo, Felix Juefei-Xu, Xiaojun Jia, Run Wang, Geguang Pu, Yang Liu:
Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake. CoRR abs/2405.18071 (2024) - [i26]Xiaojun Jia, Tianyu Pang, Chao Du, Yihao Huang, Jindong Gu, Yang Liu, Xiaochun Cao, Min Lin:
Improved Techniques for Optimization-Based Jailbreaking on Large Language Models. CoRR abs/2405.21018 (2024) - [i25]Yihao Huang, Qing Guo, Felix Juefei-Xu, Ming Hu, Xiaojun Jia, Xiaochun Cao, Geguang Pu, Yang Liu:
Texture Re-scalable Universal Adversarial Perturbation. CoRR abs/2406.06089 (2024) - [i24]Xinwei Liu, Xiaojun Jia, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning. CoRR abs/2407.16307 (2024) - [i23]Yihao Huang, Le Liang, Tianlin Li, Xiaojun Jia, Run Wang, Weikai Miao, Geguang Pu, Yang Liu:
Perception-guided Jailbreak against Text-to-Image Models. CoRR abs/2408.10848 (2024) - [i22]Sensen Gao, Xiaojun Jia, Yihao Huang, Ranjie Duan, Jindong Gu, Yang Liu, Qing Guo:
RT-Attack: Jailbreaking Text-to-Image Models via Random Token. CoRR abs/2408.13896 (2024) - 2023
- [i21]Xiaojun Jia, Yong Zhang, Xingxing Wei, Baoyuan Wu, Ke Ma, Jue Wang, Xiaochun Cao:
Improving Fast Adversarial Training with Prior-Guided Knowledge. CoRR abs/2304.00202 (2023) - [i20]Gege Qi, Yuefeng Chen, Xiaofeng Mao, Xiaojun Jia, Ranjie Duan, Rong Zhang, Hui Xue:
Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training. CoRR abs/2307.12498 (2023) - [i19]Xiaojun Jia, Yuefeng Chen, Xiaofeng Mao, Ranjie Duan, Jindong Gu, Rong Zhang, Hui Xue, Xiaochun Cao:
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging. CoRR abs/2308.11443 (2023) - [i18]Xiaojun Jia, Jianshu Li, Jindong Gu, Yang Bai, Xiaochun Cao:
Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks. CoRR abs/2310.15444 (2023) - [i17]Jindong Gu, Xiaojun Jia, Pau de Jorge, Wenqian Yu, Xinwei Liu, Avery Ma, Yuan Xun, Anjun Hu, Ashkan Khakzar, Zhijiang Li, Xiaochun Cao, Philip H. S. Torr:
A Survey on Transferability of Adversarial Examples across Deep Neural Networks. CoRR abs/2310.17626 (2023) - [i16]Xiaojun Jia, Jindong Gu, Yihao Huang, Simeng Qin, Qing Guo, Yang Liu, Xiaochun Cao:
TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation. CoRR abs/2312.02207 (2023) - [i15]Dongchen Han, Xiaojun Jia, Yang Bai, Jindong Gu, Yang Liu, Xiaochun Cao:
OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization. CoRR abs/2312.04403 (2023) - [i14]Bangyan He, Xiaojun Jia, Siyuan Liang, Tianrui Lou, Yang Liu, Xiaochun Cao:
SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation. CoRR abs/2312.04913 (2023) - [i13]Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Xiaofei Xie, Yang Liu, Chao Shen:
A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection. CoRR abs/2312.10766 (2023) - 2022
- [i12]Xiaojun Jia, Yong Zhang, Baoyuan Wu, Ke Ma, Jue Wang, Xiaochun Cao:
LAS-AT: Adversarial Training with Learnable Attack Strategy. CoRR abs/2203.06616 (2022) - [i11]Xinwei Liu, Jian Liu, Yang Bai, Jindong Gu, Tao Chen, Xiaojun Jia, Xiaochun Cao:
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal. CoRR abs/2207.08178 (2022) - [i10]Xiaojun Jia, Yong Zhang, Xingxing Wei, Baoyuan Wu, Ke Ma, Jue Wang, Xiaochun Cao:
Prior-Guided Adversarial Initialization for Fast Adversarial Training. CoRR abs/2207.08859 (2022) - [i9]Yiming Li, Linghui Zhu, Xiaojun Jia, Yang Bai, Yong Jiang, Shu-Tao Xia, Xiaochun Cao:
MOVE: Effective and Harmless Ownership Verification via Embedded External Features. CoRR abs/2208.02820 (2022) - [i8]Siyuan Liang, Longkang Li, Yanbo Fan, Xiaojun Jia, Jingzhi Li, Baoyuan Wu, Xiaochun Cao:
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection. CoRR abs/2209.07790 (2022) - [i7]Xiaofeng Mao, Yuefeng Chen, Xiaojun Jia, Rong Zhang, Hui Xue, Zhao Li:
Context-Aware Robust Fine-Tuning. CoRR abs/2211.16175 (2022) - 2021
- [i6]Xiaojun Jia, Huanqian Yan, Yonglin Wu, Xingxing Wei, Xiaochun Cao, Yong Zhang:
An Effective and Robust Detector for Logo Detection. CoRR abs/2108.00422 (2021) - [i5]Xiaojun Jia, Yong Zhang, Baoyuan Wu, Jue Wang, Xiaochun Cao:
Boosting Fast Adversarial Training with Learnable Adversarial Initialization. CoRR abs/2110.05007 (2021) - [i4]Yiming Li, Linghui Zhu, Xiaojun Jia, Yong Jiang, Shu-Tao Xia, Xiaochun Cao:
Defending against Model Stealing via Verifying Embedded External Features. CoRR abs/2112.03476 (2021) - 2020
- [i3]Xiaojun Jia, Xingxing Wei, Xiaochun Cao, Xiaoguang Han:
Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples. CoRR abs/2008.01919 (2020) - 2019
- [i2]Xiaojun Jia, Xingxing Wei, Xiaochun Cao:
Identifying and Resisting Adversarial Videos Using Temporal Consistency. CoRR abs/1909.04837 (2019) - 2018
- [i1]Xiaojun Jia, Xingxing Wei, Xiaochun Cao, Hassan Foroosh:
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples. CoRR abs/1811.12673 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint