Picture for Junxi Chen

Junxi Chen

Mind the Trojan Horse: Image Prompt Adapter Enabling Scalable and Deceptive Jailbreaking

Add code
Apr 08, 2025
Viaarxiv icon

Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability

Add code
Jan 13, 2024
Viaarxiv icon

Releasing Inequality Phenomena in $L_{\infty}$-Adversarial Training via Input Gradient Distillation

Add code
May 17, 2023
Viaarxiv icon

Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications

Add code
Mar 24, 2023
Figure 1 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 2 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 3 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 4 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Viaarxiv icon