Results 91 to 100 of about 1,173,800 (295)

Metabolic Reprogramming of T Cells by Dual UCP2 and IL‐17 Blockade Enhances Immunity Against Pancreatic Cancer

open access: yesAdvanced Science, EarlyView.
This study demonstrates that dual UCP2/IL‐17 blockade reprograms T‐cell metabolism to overcome PDAC immunosuppression. Genipin‐mediated UCP2 inhibition enhances CD8⁺ T‐cell IFN‐γ via IL‐12R/STAT4/mTOR signaling and mitochondrial OXPHOS. Combined IL‐17 depletion amplifies Tc1/Th1 responses, reduces MDSCs, and prolongs survival in PDAC models ...
Chuan‐Teng Liu   +11 more
wiley   +1 more source

IL4I1⁺ Macrophages and TDO2⁺ Myofibroblasts Drive AhR‐Mediated Immunosuppression and Ferroptosis Resistance in Solid Predominant Lung Adenocarcinoma

open access: yesAdvanced Science, EarlyView.
Solid predominant lung adenocarcinoma exhibits an immune‐excluded, ferroptosis‐resistant niche enriched with IL4I1⁺ TAMs and TDO2⁺ myCAFs. Spatial and multi‐omics analyses reveal AhR‐driven crosstalk that promotes T cell exhaustion and therapy resistance. Blocking AhR with CH‐223191 restores ferroptosis sensitivity, and its combination with ferroptosis
Zhaoxuan Wang   +16 more
wiley   +1 more source

Identification and Characterization of an In Silico Designed Membrane‐Active Peptide with Antiviral Properties

open access: yesAdvanced Science, EarlyView.
An evolutionary molecular dynamics platform is used to design P1.6, a membrane‐active peptide that senses lipid packing defects in viral envelopes. P1.6 adopts a stabilized α‐helical structure upon membrane contact, disrupts virus‐like liposomes, and damages HIV‐1 particles.
Pascal von Maltitz   +10 more
wiley   +1 more source

Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers

open access: yesIEEE Access
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai   +4 more
doaj   +1 more source

Allogeneic Immune Cell Perfusion Inhibits the Growth of Vascularized 3D In Vitro Tumor Models, Induces Vascular Regression and Desmoplasia, but Promotes Tumor Cell Invasion

open access: yesAdvanced Science, EarlyView.
This study presents a vascularized 3D tumor model to investigate immune–stromal–tumor interactions under allogeneic PBMC perfusion. While immune cells induced tumor shrinkage, they also promoted vascular regression, stromal activation, and cancer cell invasion.
Alexandra Raab   +8 more
wiley   +1 more source

Adversarial Attack on CAN IDS Leveraging Multi-DDQN Agent

open access: yesIEEE Access
As Controller Area Network (CAN) Intrusion Detection Systems (IDS) become increasingly sophisticated and incorporate deep learning architectures, adversarial attacks have evolved correspondingly over the past decade.
Yeonjeong Hwang   +4 more
doaj   +1 more source

pH/ROS‐Responsive Injectable Hydrogel Co‐Loaded with B7‐H3 Blocker and NETs Suppressor Boosts OSCC Synergistic Immunotherapy

open access: yesAdvanced Science, EarlyView.
A pH/ROS‐dual‐responsive injectable hydrogel, formed by dynamic boronic ester and Schiff base crosslinking, co‐delivers enoblituzumab (B7‐H3 blocker) and Cl‐amidine (NETs suppressor). Via localized intratumoral delivery, it synergistically reprograms the immunosuppressive tumor microenvironment, overcomes T cell infiltration barriers, restores ...
Huan Li   +12 more
wiley   +1 more source

Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks

open access: yesIEEE Access
In this study, we present a novel approach to adversarial attacks for graph neural networks (GNNs), specifically addressing the unique challenges posed by graphical data.
Hyun Kwon, Jang-Woon Baek
doaj   +1 more source

Explainability Guided Adversarial Evasion Attacks on Malware Detectors [PDF]

open access: yesInternational Conference on Computer Communications and Networks
As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical.
Kshitiz Aryal   +3 more
semanticscholar   +1 more source

A Protein‐Centric Strategy Coupled with Match‐Between‐Run Glycoproteomics Enables Discovery of Robust Site‐Specific Glycan Biomarkers for Hepatocellular Carcinoma

open access: yesAdvanced Science, EarlyView.
In this study, a highly robust N‐glycoproteomics (HRN) platform with a newly developed match‐between‐run scheme is used for biomarker discovery. This study proposes a protein‐centric strategy to prioritize proteins susceptible to aberrant glycosylation.
Lei Liu   +15 more
wiley   +1 more source

Home - About - Disclaimer - Privacy