Picture for Xiaojun Jia

Xiaojun Jia

Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models

Add code
Mar 17, 2025
Viaarxiv icon

Accelerate 3D Object Detection Models via Zero-Shot Attention Key Pruning

Add code
Mar 11, 2025
Viaarxiv icon

AgentSafe: Safeguarding Large Language Model-based Multi-agent Systems via Hierarchical Data Management

Add code
Mar 06, 2025
Viaarxiv icon

Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution

Add code
Mar 06, 2025
Figure 1 for Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution
Figure 2 for Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution
Figure 3 for Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution
Figure 4 for Scale-Invariant Adversarial Attack against Arbitrary-scale Super-resolution
Viaarxiv icon

PersGuard: Preventing Malicious Personalization via Backdoor Attacks on Pre-trained Text-to-Image Diffusion Models

Add code
Feb 22, 2025
Viaarxiv icon

DAMO: Data- and Model-aware Alignment of Multi-modal LLMs

Add code
Feb 04, 2025
Viaarxiv icon

PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models

Add code
Jan 07, 2025
Viaarxiv icon

Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings

Add code
Dec 18, 2024
Figure 1 for Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings
Figure 2 for Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings
Figure 3 for Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings
Figure 4 for Crabs: Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings
Viaarxiv icon

What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context

Add code
Dec 17, 2024
Figure 1 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 2 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 3 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Figure 4 for What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context
Viaarxiv icon

BAMBA: A Bimodal Adversarial Multi-Round Black-Box Jailbreak Attacker for LVLMs

Add code
Dec 08, 2024
Figure 1 for BAMBA: A Bimodal Adversarial Multi-Round Black-Box Jailbreak Attacker for LVLMs
Figure 2 for BAMBA: A Bimodal Adversarial Multi-Round Black-Box Jailbreak Attacker for LVLMs
Figure 3 for BAMBA: A Bimodal Adversarial Multi-Round Black-Box Jailbreak Attacker for LVLMs
Figure 4 for BAMBA: A Bimodal Adversarial Multi-Round Black-Box Jailbreak Attacker for LVLMs
Viaarxiv icon