Exploring the macrocyclic chemical space for heuristic drug design with deep learning models

23 June 2025, Version 1
This content is an early or alternative research output and has not been peer-reviewed by Cambridge University Press at the time of posting.

Abstract

Macrocyclic compounds have shown great potential as therapeutic agents due to their distinctive structural and pharmacological properties. However, structural optimization of macrocycles—a critical step in the rational design of macrocyclic drugs—remains constrained by the limited availability of bioactive candidates, which in turn hampers the systematic exploration of structure-activity relationships. In this paper, we introduce ‌CycleGPT‌, a generative chemical language model designed specifically to address these challenges. CycleGPT is characterized by a progressive transfer learning paradigm to incrementally transfer knowledge from pre-trained chemical language models to specialized macrocycle generation to overcome the data shortage issue; in the meantime, it adopts an innovative probabilistic sampling strategy that effectively improves the structural novelty of generated macrocycles while ensuring domain-specific adaptability. In a prospective drug design based on CycleGPT and our custom JAK2 activity predictive model, three synthesized macrocycles exhibited high inhibitory activity against JAK2, with the most potent compound 2 showing an IC₅₀ of 1.17 nM. Moreover, compound 2 exhibited a favorable selectivity profile and demonstrated in vivo efficacy in polycythemia mice model. These novel therapeutic candidates demonstrate the significant potential of CycleGPT for advancing macrocyclic drug discovery.

Keywords

Drug Design
Molecular Generation
Polycythemia Treatment
Artificial Intelligence

Supplementary materials

Title
Description
Actions
Title
Exploring the macrocyclic chemical space for heuristic drug design with deep learning models
Description
Supplementary materials of Exploring the macrocyclic chemical space for heuristic drug design with deep learning models
Actions

Comments

Comments are not moderated before they are posted, but they can be removed by the site moderators if they are found to be in contravention of our Commenting and Discussion Policy [opens in a new tab] - please read this policy before you post. Comments should be used for scholarly discussion of the content in question. You can find more information about how to use the commenting feature here [opens in a new tab] .
This site is protected by reCAPTCHA and the Google Privacy Policy [opens in a new tab] and Terms of Service [opens in a new tab] apply.
Comment number 1, Brad: Jun 23, 2025, 17:37

Cybersecurity experts may ethically monitor social media and mobile devices in limited circumstances to protect individuals from threats, exploitation, or to aid criminal investigations, and to safeguard organizations by preventing data loss, ensuring regulatory compliance, responding to incidents, or combating malware. Monitoring can also enhance public safety through threat intelligence or fighting serious cybercrime. However, such actions are only ethical with strict safeguards, including explicit consent, transparency, proportionality in data collection, data minimization, secure storage, legal compliance, and robust oversight. Without these, monitoring risks becoming unethical and may infringe on privacy or legal boundaries. Guard Your Digital World With Innovative Tech! Do you require social media access, a phone hack, email breach or website security fix? OR Do you simply wish to recover lost crypto funds, detect/track a location or carry out data alterations? Our Elite cybersecurity services cover everything from result upgrades to clearing debts and fixing credit. For Unparalleled security and reliable results, choose the best in the business. For further assistance, contact cyberhelpdesk88@gmail.com or +1 862-660-2702 or Telegram: cyberhelpdesk00