Picture for Xiaojun Jia

Xiaojun Jia

Texture Re-scalable Universal Adversarial Perturbation

Add code
Jun 10, 2024
Viaarxiv icon

Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

Add code
May 31, 2024
Figure 1 for Improved Techniques for Optimization-Based Jailbreaking on Large Language Models
Figure 2 for Improved Techniques for Optimization-Based Jailbreaking on Large Language Models
Figure 3 for Improved Techniques for Optimization-Based Jailbreaking on Large Language Models
Figure 4 for Improved Techniques for Optimization-Based Jailbreaking on Large Language Models
Viaarxiv icon

Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

Add code
May 28, 2024
Figure 1 for Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake
Figure 2 for Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake
Figure 3 for Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake
Figure 4 for Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake
Viaarxiv icon

Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

Add code
May 23, 2024
Viaarxiv icon

Identity Inference from CLIP Models using Only Textual Data

Add code
May 23, 2024
Viaarxiv icon

Efficiently Adversarial Examples Generation for Visual-Language Models under Targeted Transfer Scenarios using Diffusion Models

Add code
Apr 18, 2024
Viaarxiv icon

Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory

Add code
Mar 19, 2024
Figure 1 for Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory
Figure 2 for Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory
Figure 3 for Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory
Figure 4 for Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajectory
Viaarxiv icon

Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

Add code
Mar 08, 2024
Figure 1 for Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds
Figure 2 for Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds
Figure 3 for Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds
Figure 4 for Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds
Viaarxiv icon

Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

Add code
Feb 18, 2024
Figure 1 for Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection
Figure 2 for Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection
Figure 3 for Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection
Figure 4 for Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection
Viaarxiv icon

Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

Add code
Feb 05, 2024
Viaarxiv icon