Results 91 to 100 of about 1,173,800 (295)
This study demonstrates that dual UCP2/IL‐17 blockade reprograms T‐cell metabolism to overcome PDAC immunosuppression. Genipin‐mediated UCP2 inhibition enhances CD8⁺ T‐cell IFN‐γ via IL‐12R/STAT4/mTOR signaling and mitochondrial OXPHOS. Combined IL‐17 depletion amplifies Tc1/Th1 responses, reduces MDSCs, and prolongs survival in PDAC models ...
Chuan‐Teng Liu +11 more
wiley +1 more source
Solid predominant lung adenocarcinoma exhibits an immune‐excluded, ferroptosis‐resistant niche enriched with IL4I1⁺ TAMs and TDO2⁺ myCAFs. Spatial and multi‐omics analyses reveal AhR‐driven crosstalk that promotes T cell exhaustion and therapy resistance. Blocking AhR with CH‐223191 restores ferroptosis sensitivity, and its combination with ferroptosis
Zhaoxuan Wang +16 more
wiley +1 more source
An evolutionary molecular dynamics platform is used to design P1.6, a membrane‐active peptide that senses lipid packing defects in viral envelopes. P1.6 adopts a stabilized α‐helical structure upon membrane contact, disrupts virus‐like liposomes, and damages HIV‐1 particles.
Pascal von Maltitz +10 more
wiley +1 more source
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai +4 more
doaj +1 more source
This study presents a vascularized 3D tumor model to investigate immune–stromal–tumor interactions under allogeneic PBMC perfusion. While immune cells induced tumor shrinkage, they also promoted vascular regression, stromal activation, and cancer cell invasion.
Alexandra Raab +8 more
wiley +1 more source
Adversarial Attack on CAN IDS Leveraging Multi-DDQN Agent
As Controller Area Network (CAN) Intrusion Detection Systems (IDS) become increasingly sophisticated and incorporate deep learning architectures, adversarial attacks have evolved correspondingly over the past decade.
Yeonjeong Hwang +4 more
doaj +1 more source
A pH/ROS‐dual‐responsive injectable hydrogel, formed by dynamic boronic ester and Schiff base crosslinking, co‐delivers enoblituzumab (B7‐H3 blocker) and Cl‐amidine (NETs suppressor). Via localized intratumoral delivery, it synergistically reprograms the immunosuppressive tumor microenvironment, overcomes T cell infiltration barriers, restores ...
Huan Li +12 more
wiley +1 more source
Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks
In this study, we present a novel approach to adversarial attacks for graph neural networks (GNNs), specifically addressing the unique challenges posed by graphical data.
Hyun Kwon, Jang-Woon Baek
doaj +1 more source
Explainability Guided Adversarial Evasion Attacks on Malware Detectors [PDF]
As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical.
Kshitiz Aryal +3 more
semanticscholar +1 more source
In this study, a highly robust N‐glycoproteomics (HRN) platform with a newly developed match‐between‐run scheme is used for biomarker discovery. This study proposes a protein‐centric strategy to prioritize proteins susceptible to aberrant glycosylation.
Lei Liu +15 more
wiley +1 more source

