Redirecting to original paper in 30 seconds...
Click below to go immediately or wait for automatic redirect
📄 Abstract
Abstract: The emergence of graph foundation models (GFMs), particularly those
incorporating language models (LMs), has revolutionized graph learning and
demonstrated remarkable performance on text-attributed graphs (TAGs). However,
compared to traditional GNNs, these LM-empowered GFMs introduce unique security
vulnerabilities during the unsecured prompt tuning phase that remain
understudied in current research. Through empirical investigation, we reveal a
significant performance degradation in traditional graph backdoor attacks when
operating in attribute-inaccessible constrained TAG systems without explicit
trigger node attribute optimization. To address this, we propose a novel
dual-trigger backdoor attack framework that operates at both text-level and
struct-level, enabling effective attacks without explicit optimization of
trigger node text attributes through the strategic utilization of a
pre-established text pool. Extensive experimental evaluations demonstrate that
our attack maintains superior clean accuracy while achieving outstanding attack
success rates, including scenarios with highly concealed single-trigger nodes.
Our work highlights critical backdoor risks in web-deployed LM-empowered GFMs
and contributes to the development of more robust supervision mechanisms for
open-source platforms in the era of foundation models.
Authors (7)
Xiaoyu Xue
Yuni Lai
Chenxi Huang
Yulin Zhu
Gaolei Li
Xiaoge Zhang
+1 more
Submitted
October 16, 2025
Key Contributions
This paper proposes a novel dual-trigger backdoor attack framework for LM-empowered Graph Foundation Models (GFMs), operating at both text and structure levels. It demonstrates effective attacks without explicit optimization of trigger node text attributes, addressing security vulnerabilities in prompt tuning.
Business Value
Highlights critical security risks in emerging LM-empowered graph models, driving the need for robust defense mechanisms and secure development practices.