Towards Effective, Stealthy, and Persistent Backdoor Attacks Targeting Graph Foundation Models

Open in new window