关注
Xiaojun Jia
Xiaojun Jia
在 ntu.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Comdefend: An efficient image compression model to defend adversarial examples
X Jia, X Wei, X Cao, H Foroosh
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
2682019
LAS-AT: adversarial training with learnable attack strategy
X Jia, Y Zhang, B Wu, K Ma, J Wang, X Cao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1062022
Adv-watermark: A novel watermark perturbation for adversarial examples
X Jia, X Wei, X Cao, X Han
Proceedings of the 28th ACM international conference on multimedia, 1579-1587, 2020
672020
Boosting fast adversarial training with learnable adversarial initialization
X Jia, Y Zhang, B Wu, J Wang, X Cao
IEEE Transactions on Image Processing 31, 4417-4430, 2022
472022
Defending against model stealing via verifying embedded external features
Y Li, L Zhu, X Jia, Y Jiang, ST Xia, X Cao
AAAI 2022, 2022
47*2022
Prior-Guided Adversarial Initialization for Fast Adversarial Training
X Jia, Y Zhang, X Wei, B Wu, K Ma, J Wang, X Cao
ECCV 2022, 2022
302022
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
S Liang, L Li, Y Fan, X Jia, J Li, B Wu, X Cao
ECCV 2022, 2022
202022
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
X Liu, J Liu, Y Bai, J Gu, T Chen, X Jia, X Cao
ECCV 2022, 2022
192022
Generating transferable 3d adversarial point cloud via random perturbation factorization
B He, J Liu, Y Li, S Liang, J Li, X Jia, X Cao
Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 764-772, 2023
162023
Identifying and resisting adversarial videos using temporal consistency
X Jia, X Wei, X Cao
arXiv preprint arXiv:1909.04837, 2019
162019
A survey on transferability of adversarial examples across deep neural networks
J Gu, X Jia, P de Jorge, W Yu, X Liu, A Ma, Y Xun, A Hu, A Khakzar, Z Li, ...
arXiv preprint arXiv:2310.17626, 2023
92023
A mutation-based method for multi-modal jailbreaking attack detection
X Zhang, C Zhang, T Li, Y Huang, X Jia, X Xie, Y Liu, C Shen
arXiv preprint arXiv:2312.10766, 2023
72023
Context-aware robust fine-tuning
X Mao, Y Chen, X Jia, R Zhang, H Xue, Z Li
International Journal of Computer Vision, 1-16, 2023
72023
Improving fast adversarial training with prior-guided knowledge
X Jia, Y Zhang, X Wei, B Wu, K Ma, J Wang, X Cao Sr
arXiv preprint arXiv:2304.00202, 2023
72023
Move: Effective and harmless ownership verification via embedded external features
Y Li, L Zhu, X Jia, Y Bai, Y Jiang, ST Xia, X Cao
arXiv preprint arXiv:2208.02820, 2022
62022
Comdefend: An efficient image compression model to defend adversarial examples. In 2019 IEEE
X Jia, X Wei, X Cao, H Foroosh
CVF Conference on Computer Vision and Pattern Recognition (CVPR), 6077-6085, 2018
62018
An effective and robust detector for logo detection
X Jia, H Yan, Y Wu, X Wei, X Cao, Y Zhang
arXiv preprint arXiv:2108.00422, 2021
52021
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging
X Jia, Y Chen, X Mao, R Duan, J Gu, R Zhang, H Xue, X Cao
arXiv preprint arXiv:2308.11443, 2023
32023
Poisoned forgery face: Towards backdoor attacks on face forgery detection
J Liang, S Liang, A Liu, X Jia, J Kuang, X Cao
arXiv preprint arXiv:2402.11473, 2024
22024
Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective
Y Huang, K Yu, Q Guo, F Juefei-Xu, X Jia, T Li, G Pu, Y Liu
arXiv preprint arXiv:2402.02738, 2024
22024
系统目前无法执行此操作,请稍后再试。
文章 1–20