Xudong Jiang

h-index: 2 14 citations 12 papers (total)

Papers in Database (6)

attack arXiv Nov 10, 2025 · Nov 2025

From Pretrain to Pain: Adversarial Vulnerability of Video Foundation Models Without Task Knowledge

Hui Lu, Yi Yu, Song Xia et al. · Nanyang Technological University · VinUniversity

Adversarial video attack exploiting open-source VFM embeddings to fool fine-tuned downstream models and MLLMs without task knowledge

Input Manipulation Attack Prompt Injection visionmultimodal
6 citations PDF Code
attack arXiv Feb 3, 2026 · 8w ago

Time Is All It Takes: Spike-Retiming Attacks on Event-Driven Spiking Neural Networks

Yi Yu, Qixin Zhang, Shuhan Ye et al. · Nanyang Technological University · Chinese University of Hong Kong +2 more

Gradient-based timing-only adversarial attack on event-driven SNNs retimes spikes to cause misclassification while preserving spike counts

Input Manipulation Attack vision
2 citations PDF Code
attack arXiv Nov 26, 2025 · Nov 2025

When Robots Obey the Patch: Universal Transferable Patch Attacks on Vision-Language-Action Models

Hui Lu, Yi Yu, Yiming Yang et al. · Nanyang Technological University · DSO National Laboratories

Universal transferable adversarial patch attacks on VLA robot models combining feature-space, attention hijacking, and semantic misalignment objectives

Input Manipulation Attack Prompt Injection visionmultimodalreinforcement-learning
1 citations PDF
attack arXiv Jan 30, 2026 · 9w ago

Make Anything Match Your Target: Universal Adversarial Perturbations against Closed-Source MLLMs via Multi-Crop Routed Meta Optimization

Hui Lu, Yi Yu, Yiming Yang et al. · Nanyang Technological University · DSO National Laboratories

Universal adversarial image perturbations that transfer across arbitrary inputs and closed-source VLMs to steer outputs toward attacker-chosen targets

Input Manipulation Attack Prompt Injection visionnlpmultimodal
1 citations PDF
defense arXiv Jan 22, 2026 · 10w ago

Feature-Space Adversarial Robustness Certification for Multimodal Large Language Models

Song Xia, Meiwen Ding, Chenqi Kong et al. · Nanyang Technological University · Pengcheng Laboratory

Certified feature-space robustness framework defends multimodal LLMs against ℓ2-bounded adversarial perturbations via Gaussian smoothing

Input Manipulation Attack visionnlpmultimodal
PDF
defense arXiv Feb 7, 2026 · 8w ago

UTOPIA: Unlearnable Tabular Data via Decoupled Shortcut Embedding

Jiaming He, Fuming Luo, Hongwei Li et al. · University of Electronic Science and Technology of China · Independent Researcher +2 more

Protects private tabular data from unauthorized training by injecting decoupled shortcut perturbations that drive models to near-random performance

Data Poisoning Attack tabular
PDF