BadGraph: A Backdoor Attack Against Latent Diffusion Model for Text-Guided Graph Generation
Pith reviewed 2026-05-18 04:20 UTC · model grok-4.3
The pith
Poisoning under 10 percent of training data lets attackers force specific subgraphs from text-guided graph generators while normal performance stays intact.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
BadGraph works by embedding textual triggers inside poisoned training samples so that the latent diffusion process associates those triggers with predetermined subgraphs; at generation time the presence of a trigger reliably causes the output graph to contain the target subgraph while clean prompts produce unaltered results.
What carries the argument
Textual triggers inserted into a subset of training graphs that force the VAE and diffusion stages to bind those triggers to attacker-specified subgraphs in the latent space.
If this is right
- A poisoning rate below 10 percent already yields roughly 50 percent attack success rate on standard molecular benchmarks.
- Raising the poisoning rate to 24 percent produces more than 80 percent attack success while clean-sample performance remains nearly unchanged.
- The backdoor is established during VAE and diffusion training rather than in any preceding pretraining stage.
- The attack remains effective across PubChem, ChEBI-20, PCDes, and MoMu datasets.
Where Pith is reading between the lines
- Applications that rely on text-guided graph generation for molecular or drug design could be covertly steered toward unsafe or invalid structures.
- Detection methods might examine whether training data contains unusually consistent text-to-subgraph pairings that do not appear in clean validation sets.
- The same trigger-based poisoning approach could be tested on other conditional diffusion architectures that map text to structured outputs.
Load-bearing premise
The model will form a reliable link between chosen trigger phrases and specific subgraphs when those phrases appear in only a modest fraction of the training data, and this link will not degrade generation quality on normal text inputs.
What would settle it
Train the model with 10 percent poisoned data using the described triggers and then measure the fraction of generated graphs that contain the target subgraphs when the trigger text is supplied versus when it is omitted; if the rate with the trigger is not substantially higher, the attack does not achieve the claimed success.
Figures
read the original abstract
The rapid progress of graph generation has raised new security concerns, particularly regarding backdoor vulnerabilities. Though prior work has explored backdoor attacks against diffusion models for image or unconditional graph generation, those against conditional graph generation models, especially text-guided graph generation models, remain largely unexamined. This paper proposes BadGraph, a backdoor attack method against latent diffusion models for text-guided graph generation. BadGraph leverages textual triggers to poison training data, covertly implanting backdoors that induce attacker-specified subgraphs during inference when triggers appear, while preserving normal performance on clean inputs. Extensive experiments on four benchmark datasets (PubChem, ChEBI-20, PCDes, MoMu) demonstrate the effectiveness and stealth of the attack: a poisoning rate of less than 10% can achieve a 50% attack success rate, while 24% suffices for over an 80% success rate, with negligible performance degradation on benign samples. Ablation studies further reveal that the backdoor is implanted during VAE and diffusion training rather than pretraining. These findings reveal the security vulnerabilities in latent diffusion models for text-guided graph generation, highlight the serious risks in applications such as drug discovery, and underscore the need for robust defenses against the backdoor attack in such diffusion models.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes BadGraph, a backdoor attack on latent diffusion models for text-guided graph generation. Textual triggers are used to poison a small fraction of training data so that, at inference, the presence of the trigger causes the model to output attacker-specified subgraphs while clean inputs produce normal outputs. Experiments on PubChem, ChEBI-20, PCDes and MoMu report that poisoning rates below 10% achieve 50% attack success rate (ASR) and 24% poisoning yields >80% ASR, with negligible degradation on benign samples. Ablations indicate the backdoor is implanted during VAE and diffusion training stages rather than pretraining.
Significance. If the central effectiveness claims are confirmed with proper baselines, the work would be significant for highlighting practical security risks in conditional graph diffusion models used in molecular design and drug discovery. It provides an empirical demonstration across four datasets together with stage-specific ablations, extending prior backdoor studies on images and unconditional graphs to the text-conditioned setting. The concrete poisoning-rate vs. ASR numbers and the claim of stealthiness on clean performance constitute the main contribution.
major comments (2)
- [Experimental evaluation / main results] Experimental evaluation (main results and ASR tables): the reported ASR values (50% at <10% poisoning, >80% at 24%) are not yet shown to exceed the base rate at which the chosen target subgraphs appear in generations from an unpoisoned model under identical text prompts. In molecular datasets, many substructures occur naturally; without this baseline measurement the ASR figures could partly reflect pre-existing generation frequencies rather than trigger-induced behavior. This comparison is load-bearing for the central claim that the attack is effective and stealthy.
- [Method and experimental setup] § on trigger construction and attack success definition: the manuscript provides insufficient detail on how the textual trigger phrases are selected, how the attacker-specified subgraphs are defined and matched (exact isomorphism, subgraph isomorphism, or property-based), and whether statistical significance or error bars accompany the ASR numbers. These omissions affect reproducibility and the strength of the effectiveness claim.
minor comments (2)
- [Abstract and results] The abstract and results text should explicitly state the precise metrics (e.g., validity, uniqueness, or specific graph metrics) used to quantify 'negligible performance degradation on benign samples'.
- [Introduction] Add a short related-work paragraph contrasting BadGraph with existing backdoor attacks on diffusion models for images and unconditional graphs to better situate the contribution.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed review. The comments help clarify important aspects of our experimental evaluation and method description. We address each major comment below and will revise the manuscript accordingly.
read point-by-point responses
-
Referee: [Experimental evaluation / main results] Experimental evaluation (main results and ASR tables): the reported ASR values (50% at <10% poisoning, >80% at 24%) are not yet shown to exceed the base rate at which the chosen target subgraphs appear in generations from an unpoisoned model under identical text prompts. In molecular datasets, many substructures occur naturally; without this baseline measurement the ASR figures could partly reflect pre-existing generation frequencies rather than trigger-induced behavior. This comparison is load-bearing for the central claim that the attack is effective and stealthy.
Authors: We agree that comparing against the base rate from an unpoisoned model is essential and that the current presentation leaves this open. The referee's concern is valid given the natural frequency of substructures in molecular data. In the revised manuscript we will add experiments that generate graphs from the clean model using identical prompts and report the observed frequency of each target subgraph. These baseline rates will be presented alongside the ASR results (with error bars from multiple runs) to demonstrate that the attack-induced rates substantially exceed natural occurrence. revision: yes
-
Referee: [Method and experimental setup] § on trigger construction and attack success definition: the manuscript provides insufficient detail on how the textual trigger phrases are selected, how the attacker-specified subgraphs are defined and matched (exact isomorphism, subgraph isomorphism, or property-based), and whether statistical significance or error bars accompany the ASR numbers. These omissions affect reproducibility and the strength of the effectiveness claim.
Authors: We acknowledge the need for greater detail to support reproducibility. We will expand the trigger-construction subsection to describe the selection criteria and provide concrete examples of the phrases used. We will explicitly state that subgraph presence is verified via subgraph isomorphism. In addition, we will report ASR values with standard-deviation error bars across repeated runs and include statistical significance tests. These clarifications will appear in the method and experimental sections of the revised paper. revision: yes
Circularity Check
No significant circularity in empirical attack demonstration
full rationale
The paper is a direct empirical study proposing and evaluating a backdoor attack on latent diffusion models for text-guided graph generation. It reports measured attack success rates and performance metrics from experiments on benchmark datasets after poisoning training data at varying rates, along with ablation studies on training stages. No mathematical derivations, equations, first-principles results, or predictions are presented that could reduce to inputs by construction. There are no self-citations used as load-bearing justifications for uniqueness theorems or ansatzes, and no fitted parameters renamed as predictions. The central claims rest on observable experimental outcomes rather than any self-referential chain, making the work self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
free parameters (2)
- poisoning rate
- textual trigger phrases
axioms (1)
- domain assumption The latent diffusion model will learn to associate textual triggers with attacker-specified subgraphs when a sufficient fraction of training data is poisoned.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
BadGraph leverages textual triggers to poison training data, covertly implanting backdoors that induce attacker-specified subgraphs during inference when triggers appear
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
ablation studies further reveal that the backdoor is implanted during VAE and diffusion training rather than pretraining
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Graph convolutional policy network for goal-directed molecular graph generation,
J. You, B. Liu, Z. Ying, V. Pande, and J. Leskovec, “Graph convolutional policy network for goal-directed molecular graph generation,” Advances in neural information processing systems, vol. 31, 2018
work page 2018
-
[2]
Gman: A graph multi- attention network for traffic prediction,
C. Zheng, X. Fan, C. Wang, and J. Qi, “Gman: A graph multi- attention network for traffic prediction,” in Proceedings of the AAAI conference on artificial intelligence, vol. 34, no. 01, 2020, pp. 1234–1241
work page 2020
-
[3]
Network analysis in the social sciences,
S. P. Borgatti, A. Mehra, D. J. Brass, and G. Labianca, “Network analysis in the social sciences,” science, vol. 323, no. 5916, pp. 892–895, 2009
work page 2009
-
[4]
W. Liu, A. Yu, D. Zan, B. Shen, W. Zhang, H. Zhao, Z. Jin, and Q. Wang, “Graphcoder: Enhancing repository-level code completion via coarse-to-fine retrieval based on code context graph,” in Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024, pp. 570–581
work page 2024
-
[5]
Constrained graph variational autoencoders for molecule design,
Q. Liu, M. Allamanis, M. Brockschmidt, and A. Gaunt, “Constrained graph variational autoencoders for molecule design,” Advances in neural information processing systems, vol. 31, 2018
work page 2018
-
[6]
Real-time traffic speed estimation with graph convolutional generative autoencoder,
J. J. Q. Yu and J. Gu, “Real-time traffic speed estimation with graph convolutional generative autoencoder,” IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 10, pp. 3940–3951, 2019
work page 2019
-
[7]
Generative code modeling with graphs,
M. Brockschmidt, M. Allamanis, A. L. Gaunt, and O. Polozov, “Generative code modeling with graphs,” in International Conference on Learning Representations, 2019
work page 2019
-
[8]
Hierarchical Text-Conditional Image Generation with CLIP Latents
A. Ramesh, P. Dhariwal, A. Nichol, C. Chu, and M. Chen, “Hierarchical text-conditional image generation with clip latents,” arXiv preprint arXiv:2204.06125, vol. 1, no. 2, p. 3, 2022
work page internal anchor Pith review Pith/arXiv arXiv 2022
-
[9]
Photorealistic text-to-image diffusion models with deep language understanding,
C. Saharia, W. Chan, S. Saxena, L. Li, J. Whang, E. L. Denton, K. Ghasemipour, R. Gontijo Lopes, B. Karagol Ayan, T. Salimans et al., “Photorealistic text-to-image diffusion models with deep language understanding,” Advances in neural information processing systems, vol. 35, pp. 36479– 36494, 2022
work page 2022
-
[10]
J. Ho, T. Salimans, A. Gritsenko, W. Chan, M. Norouzi, and D. J. Fleet, “Video diffusion models,” Advances in neural information processing systems, vol. 35, pp. 8633–8646, 2022
work page 2022
-
[11]
J. Ho, W. Chan, C. Saharia, J. Whang, R. Gao, A. Gritsenko, D. P. Kingma, B. Poole, M. Norouzi, D. J. Fleet et al., “Imagen VOLUME 11, 2023 15 L. Y eet al.: BadGraph: A Backdoor Attack Against Latent Diffusion Model for Text-Guided Graph Generation video: High definition video generation with diffusion models,” arXiv preprint arXiv:2210.02303, 2022
work page internal anchor Pith review Pith/arXiv arXiv 2023
-
[12]
Diffwave: A versatile diffusion model for audio synthesis,
Z. Kong, W. Ping, J. Huang, K. Zhao, and B. Catanzaro, “Diffwave: A versatile diffusion model for audio synthesis,” in International Conference on Learning Representations, 2020
work page 2020
-
[13]
Audioldm: text-to-audio generation with latent diffusion models,
H.Liu,Z.Chen,Y.Yuan,X.Mei,X.Liu,D.Mandic,W.Wang, and M. D. Plumbley, “Audioldm: text-to-audio generation with latent diffusion models,” in Proceedings of the 40th International Conference on Machine Learning, 2023, pp. 21450–21474
work page 2023
-
[14]
Generative diffusion models on graphs: Methods and applications,
C. Liu, W. Fan, Y. Liu, J. Li, H. Li, H. Liu, J. Tang, and Q. Li, “Generative diffusion models on graphs: Methods and applications,” inIJCAI, 2023
work page 2023
-
[15]
Digress: Discrete denoising diffusion for graph generation,
C. Vignac, I. Krawczuk, A. Siraudin, B. Wang, V. Cevher, and P. Frossard, “Digress: Discrete denoising diffusion for graph generation,” in The Eleventh International Conference on Learning Representations, 2023
work page 2023
-
[16]
Gldm: hit molecule generation with constrained graph latent diffusion model,
C. Wang, H. H. Ong, S. Chiba, and J. C. Rajapakse, “Gldm: hit molecule generation with constrained graph latent diffusion model,” Briefings in Bioinformatics, vol. 25, no. 3, p. bbae142, 2024
work page 2024
-
[17]
Secondary structure-guided novel protein sequence generation with latent graph diffusion,
Y. Hu, Y. Tan, A. Han, L. Zheng, L. Hong, and B. Zhou, “Secondary structure-guided novel protein sequence generation with latent graph diffusion,” in 2024 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). IEEE, 2024, pp. 31–41
work page 2024
-
[18]
Y. You, R. Zhou, J. Park, H. Xu, C. Tian, Z. Wang, and Y. Shen, “Latent 3d graph diffusion,” in International Conference on Learning Representations (ICLR), 2024
work page 2024
-
[19]
Unifying generation and prediction on graphs with latent graph diffusion,
C. Zhou, X. Wang, and M. Zhang, “Unifying generation and prediction on graphs with latent graph diffusion,” Advances in Neural Information Processing Systems, vol. 37, pp. 61963– 61999, 2024
work page 2024
-
[20]
3m-diffusion: Latent multi-modal diffusion for language-guided molecular structure generation,
H. Zhu, T. Xiao, and V. G. Honavar, “3m-diffusion: Latent multi-modal diffusion for language-guided molecular structure generation,” in First Conference on Language Modeling, 2024
work page 2024
-
[21]
Hierarchical graph latent diffusion model for conditional molecule generation,
T. Bian, Y. Niu, H. Chang, D. Yan, J. Huang, Y. Rong, T. Xu, J. Li, and H. Cheng, “Hierarchical graph latent diffusion model for conditional molecule generation,” in Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024, pp. 130–140
work page 2024
-
[22]
How to backdoor diffusion models?
S.-Y. Chou, P.-Y. Chen, and T.-Y. Ho, “How to backdoor diffusion models?” in Proceedings of the IEEE/CVF Confer- ence on Computer Vision and Pattern Recognition, 2023, pp. 4015–4024
work page 2023
-
[23]
Trojdiff: Trojan attacks on diffusion models with diverse targets,
W. Chen, D. Song, and B. Li, “Trojdiff: Trojan attacks on diffusion models with diverse targets,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 4035–4044
work page 2023
-
[24]
Rickrolling the artist: Injecting backdoors into text encoders for text-to-image synthesis,
L. Struppek, D. Hintersdorf, and K. Kersting, “Rickrolling the artist: Injecting backdoors into text encoders for text-to-image synthesis,” in Proceedings of the IEEE/CVF international conference on computer vision, 2023, pp. 4584–4596
work page 2023
-
[25]
Backdoor attacks on discrete graph diffusion models,
J. Wang, S. Karim, Y. Hong, and B. Wang, “Backdoor attacks on discrete graph diffusion models,” arXiv preprint arXiv:2503.06340, 2025
-
[26]
N. De Cao and T. Kipf, “Molgan: An implicit generative model for small molecular graphs,” arXiv preprint arXiv:1805.11973, 2018
-
[27]
: a generative model for molecular opti- mization,
Ł. Maziarka, A. Pocha, J. Kaczmarczyk, K. Rataj, T. Danel, and M. Warchoł, “: a generative model for molecular opti- mization,” Journal of Cheminformatics, vol. 12, no. 1, p. 2, 2020
work page 2020
-
[28]
Graphvae: Towards generation of small graphs using variational autoencoders,
M. Simonovsky and N. Komodakis, “Graphvae: Towards generation of small graphs using variational autoencoders,” in International conference on artificial neural networks. Springer, 2018, pp. 412–422
work page 2018
-
[29]
GraphNVP: An Invertible Flow Model for Generating Molecular Graphs
K. Madhawa, K. Ishiguro, K. Nakago, and M. Abe, “Graphnvp: An invertible flow model for generating molecular graphs,” arXiv preprint arXiv:1905.11600, 2019
work page internal anchor Pith review Pith/arXiv arXiv 1905
-
[30]
Moflow: an invertible flow model for generating molecular graphs,
C. Zang and F. Wang, “Moflow: an invertible flow model for generating molecular graphs,” in Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, 2020, pp. 617–626
work page 2020
-
[31]
Graphrnn: Generating realistic graphs with deep auto- regressive models,
J. You, R. Ying, X. Ren, W. Hamilton, and J. Leskovec, “Graphrnn: Generating realistic graphs with deep auto- regressive models,” in International conference on machine learning. PMLR, 2018, pp. 5708–5717
work page 2018
-
[32]
Junctiontreevariational autoencoder for molecular graph generation,
W.Jin,R.Barzilay,andT.Jaakkola,“Junctiontreevariational autoencoder for molecular graph generation,” in International conference on machine learning. PMLR, 2018, pp. 2323–2332
work page 2018
-
[33]
Hierarchical generation of molecular graphs using structural motifs,
——, “Hierarchical generation of molecular graphs using structural motifs,” in International conference on machine learning. PMLR, 2020, pp. 4839–4848
work page 2020
-
[34]
Graphdf: A discrete flow model for molecular graph generation,
Y. Luo, K. Yan, and S. Ji, “Graphdf: A discrete flow model for molecular graph generation,” in International conference on machine learning. PMLR, 2021, pp. 7192–7203
work page 2021
-
[35]
Graphaf: a flow-based autoregressive model for molecular graph generation,
C. Shi, M. Xu, Z. Zhu, W. Zhang, M. Zhang, and J. Tang, “Graphaf: a flow-based autoregressive model for molecular graph generation,” in International Conference on Learning Representations, 2020
work page 2020
-
[36]
Instruction-based molecular graph generation with unified text-graph diffusion model,
Y. Xiang, H. Zhao, C. Ma, and Z.-H. Deng, “Instruction-based molecular graph generation with unified text-graph diffusion model,” in European Conference on Artificial Intelligence, 2025
work page 2025
-
[37]
Graphusion: Latent diffusion for graph generation,
L. Yang, Z. Huang, Z. Zhang, Z. Liu, S. Hong, W. Zhang, W. Yang, B. Cui, and L. Zhang, “Graphusion: Latent diffusion for graph generation,” IEEE Transactions on Knowledge and Data Engineering, vol. 36, no. 11, pp. 6358–6369, 2024
work page 2024
-
[38]
De novo molecule generation with graph latent diffusion model,
C. Wang, H. H. Ong, S. Chiba, and J. C. Rajapakse, “De novo molecule generation with graph latent diffusion model,” in ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2024, pp. 2121–2125
work page 2024
-
[39]
Hyperbolic geometric latent diffusion model for graph generation,
X. Fu, Y. Gao, Y. Wei, Q. Sun, H. Peng, J. Li, and X. Li, “Hyperbolic geometric latent diffusion model for graph generation,” in International Conference on Machine Learning. PMLR, 2024, pp. 14102–14124
work page 2024
-
[40]
J. Chang and J. C. Ye, “LDMol: A text-to-molecule diffusion model with structurally informative latent space surpasses AR models,” in Forty-second International Conference on Machine Learning, 2025
work page 2025
-
[41]
Text- to-image diffusion models can be easily backdoored through multimodal data poisoning,
S. Zhai, Y. Dong, Q. Shen, S. Pu, Y. Fang, and H. Su, “Text- to-image diffusion models can be easily backdoored through multimodal data poisoning,” in Proceedings of the 31st ACM International Conference on Multimedia, 2023, pp. 1577–1587
work page 2023
-
[42]
High-resolution image synthesis with latent diffusion models,
R. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Om- mer, “High-resolution image synthesis with latent diffusion models,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 10684– 10695
work page 2022
-
[43]
From trojan horses to castle walls: Unveiling bilateral backdoor effects in diffusion models,
Z. Pan, Y. Yao, G. Liu, B. Shen, H. V. Zhao, R. R. Kompella, and S. Liu, “From trojan horses to castle walls: Unveiling bilateral backdoor effects in diffusion models,” in NeurIPS 2023 Workshop on Backdoors in Deep Learning-The Good, the Bad, and the Ugly, 2023
work page 2023
-
[44]
Villandiffusion: A unified backdoor attack framework for diffusion models,
S.-y. Chou, P.-Y. Chen, and T.-y. Ho, “Villandiffusion: A unified backdoor attack framework for diffusion models,” in Annual Conference on Neural Information Processing Systems, 2023
work page 2023
-
[45]
Denoising diffusion proba- bilistic models,
J. Ho, A. Jain, and P. Abbeel, “Denoising diffusion proba- bilistic models,” Advances in neural information processing systems, vol. 33, pp. 6840–6851, 2020
work page 2020
-
[46]
Generative modeling by estimating gradients of the data distribution,
Y. Song and S. Ermon, “Generative modeling by estimating gradients of the data distribution,” Advances in neural information processing systems, vol. 32, 2019
work page 2019
-
[47]
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
T. Gu, B. Dolan-Gavitt, and S. Garg, “Badnets: Identifying vulnerabilities in the machine learning model supply chain,” arXiv preprint arXiv:1708.06733, 2017
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[48]
Molca: Molecular graph-language modeling with cross-modal projector and uni-modal adapter,
Z. Liu, S. Li, Y. Luo, H. Fei, Y. Cao, K. Kawaguchi, X. Wang, and T.-S. Chua, “Molca: Molecular graph-language modeling with cross-modal projector and uni-modal adapter,” in The 2023 Conference on Empirical Methods in Natural Language Processing, 2023
work page 2023
-
[49]
Text2mol: Cross-modal molecule retrieval with natural language queries,
C. Edwards, C. Zhai, and H. Ji, “Text2mol: Cross-modal molecule retrieval with natural language queries,” in Proceed- ings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021, pp. 595–607. 16 VOLUME 11, 2023 L. Y eet al.: BadGraph: A Backdoor Attack Against Latent Diffusion Model for Text-Guided Graph Generation
work page 2021
-
[50]
Z. Zeng, Y. Yao, Z. Liu, and M. Sun, “A deep-learning system bridging molecule structure and biomedical text with comprehension comparable to human professionals,” Nature communications, vol. 13, no. 1, p. 862, 2022
work page 2022
-
[51]
A molecular multimodal foundation model associating molecule graphs with natural language
B. Su, D. Du, Z. Yang, Y. Zhou, J. Li, A. Rao, H. Sun, Z. Lu, and J.-R. Wen, “A molecular multimodal foundation model associating molecule graphs with natural language,” arXiv preprint arXiv:2209.05481, 2022
-
[52]
Reoptimization of mdl keys for use in drug discovery,
J. L. Durant, B. A. Leland, D. R. Henry, and J. G. Nourse, “Reoptimization of mdl keys for use in drug discovery,” Journal of chemical information and computer sciences, vol. 42, no. 6, pp. 1273–1280, 2002. LIANG YE received the M.S. degree in Computer Application Technology and the Ph.D. degree in Management Science and Engineering from Shanghai Universi...
work page 2002
-
[53]
He has been involved in the research in the fields of information security
He is currently an associate professor in the School of Computer Engineering and Science, Shanghai University, China. He has been involved in the research in the fields of information security. His current research interests include mobile and IoT security, security and privacy in machine learning, applications of deep learning in systems security and app...
work page 2023
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.