Article
Cell Biology
Jing Zhang, Pingxia Zhao, Siyan Chen, Liangqi Sun, Jieli Mao, Shutang Tan, Chengbin Xiang
Summary: Abscisic acid (ABA) and auxin signaling interact through the ABI3-ERF1 module to regulate lateral root (LR) emergence in Arabidopsis. ABI3 transcriptionally activates ERF1, while ERF1 also activates ABI3, forming a regulatory loop for signal amplification. ABI3 physically interacts with ERF1, reducing the binding activities of both proteins and attenuating the expression of LR emergence and ABA signaling genes. This study provides insights into the crosstalk between ABA and auxin signaling in LR development.
Article
Computer Science, Information Systems
Khalid Hussain, N. Z. Jhanjhi, Hafiz Mati-ur-Rahman, Jawad Hussain, Muhammad Hasan Islam
Summary: This research critically analyzes proposed schemes, highlights underlying weaknesses, and emphasizes the importance of incorporating security features. It evaluates the latest scheme, suggests improvements, and introduces a novel scheme rating mechanism.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Cell Biology
Dawn Sijin Nin, Caryn Wujanto, Tuan Zea Tan, Diana Lim, J. Mirjam A. Damen, Kuan-Yi Wu, Ziyu Melvin Dai, Zheng-Wei Lee, Shabana Binte Idres, Yiat Horng Leong, Sudhakar Jha, Joseph Soon-Yau Ng, Jeffrey J. H. Low, Shih-Chung Chang, David Shao Peng Tan, Wei Wu, Bok Ai Choo, Lih-Wen Deng
Summary: This study identifies G antigen (GAGE) as a mediator of radio resistance in cervical cancers, with elevated GAGE expression positively associating with de novo RT resistance in clinical samples. GAGE confers RT resistance through chromatin dynamics regulation, leading to increased chromatin accessibility and improved DNA repair efficiency. Targeting GAGE and its associated complex could restore radiosensitivity in cervical cancers.
Article
Oncology
Jikui Sun, Quanfeng Ma, Chang Shu, Jinbiao Xiong, Banban Li, Jingchao Wu, Shusheng Zhang, Jialin Li, Jun Liu, Jinhuan Wang
Summary: MicroRNA-mediated mRNA dysregulation and multiple signaling pathways play important roles in various cancers, including gliomas. MiR-301a was found to be significantly upregulated in gliomas and associated with poor prognosis. Zinc and ring finger 3 (ZNRF3) were identified as critical mediators of miR-301a effects on proliferation and apoptosis in gliomas. Furthermore, a novel feedback loop involving miR-301a/ZNRF3/wnt/beta-catenin signaling was discovered, which may serve as a potential therapeutic target for glioma tumorigenesis.
INTERNATIONAL JOURNAL OF ONCOLOGY
(2021)
Article
Biochemistry & Molecular Biology
Soo Yeon Lee, Soo-Yeon Park, Seung-Hyun Lee, Hyunsik Kim, Jae-Hwan Kwon, Jung-Yoon Yoo, Kyunggon Kim, Moo Suk Park, Chun Geun Lee, Jack A. Elias, Myung Hyun Sohn, Hyo Sup Shim, Ho-Geun Yoon
Summary: Researchers have discovered increased levels of the protein p300 in lung cells from IPF patients, as well as in a mouse model of the disease. Deletion of the p300 gene in alveolar type II cells reduced lung fibrosis. The deubiquitination of p300 by UCHL3 led to the activation of chemokines and the promotion of M2 macrophage polarization. Inhibiting p300 activity resulted in the reprogramming of macrophages and reduced fibrosis formation.
EXPERIMENTAL AND MOLECULAR MEDICINE
(2023)
Article
Computer Science, Information Systems
Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian
Summary: The proposed secure two-factor authentication scheme is based on user's possession of a password and a crypto-capable device, providing end-to-end security against various types of attacks. The scheme is proven to be secure in a formal model as an extension of the traditional PAKE model, and has been implemented in a prototype with positive results from a usability study.
ACM TRANSACTIONS ON PRIVACY AND SECURITY
(2021)
Article
Computer Science, Hardware & Architecture
Md Jakir Hossain, Chunxiang Xu, Chuang Li, S. M. Hasan Mahmud, Xiaojun Zhang, Wanpeng Li
Summary: With the increase in users in remote server environments, secure authentication is becoming more important. This paper proposes a two-factor-based identity-concealed authentication scheme (ICAS) to enhance security, ensuring secure authentication between users and servers and preventing privacy issues.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Computer Science, Artificial Intelligence
Ran Liu, Xiang Wang, Can Wang
Summary: With the rapid development of network communication technology, identity authentication based on smart cards is a common two-factor authentication scheme. Two-factor authentication schemes based on ECC are efficient, but hash-based methods, such as NDB, can further improve time efficiency. This paper proposes an efficient two-factor authentication scheme based on NDB, achieving password changing function and reducing data updating frequency. Experimental results verify its time efficiency and security.
APPLIED SOFT COMPUTING
(2022)
Article
Biochemistry & Molecular Biology
Caroline Molinaro, Alain Martoriati, Arlette Lescuyer, Ingrid Fliniaux, David Tulasne, Katia Cailliau
Summary: The study reveals that Src acts as an adapter to recruit PDK1 to the MET signaling complex via its SH2 domain, leading to Akt phosphorylation and contributing to cell entry into the M phase induced by MET.
Article
Computer Science, Theory & Methods
Shanshan Li, Chunxiang Xu, Yuan Zhang, Jianying Zhou
Summary: In this paper, the authors investigate the vulnerabilities of existing password+hardware token-based authentication schemes and propose a secure two-factor authentication scheme called ATTACH. The scheme utilizes a non-interactively re-randomizable reverse firewall signature mechanism and a servers-aided password-based encryption mechanism to strengthen hardware tokens and protect user secrets.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Xinyan Zhou, Jiaqi Pan, Zenan Zhang, Xiaoyu Ji, Haiming Chen
Summary: Verifying the user identity of wearable devices is important for system security, and a promising solution is PPG-based two-factor authentication using widely deployed PPG sensors. This article presents the design of G-PPG, a gesture-related PPG-based authentication mechanism that can validate the user's identity nonintrusively. G-PPG achieves high accuracy through a gesture detection module, specific feature extraction, user-defined security level, and adaptive update scheme, with over 90% accuracy in experimental scenarios.
IEEE SENSORS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
Fengmei Chen, Bin Zhao, Yilong Gao, Wenyin Zhang
Summary: This paper proposes a two-factor dynamic identity authentication scheme for data trading based on alliance chain (BTDA) to address the problems of centralization of identity authentication, dynamic changes of identities, and ambiguity of trading authority. The scheme simplifies the use of identity certificates, designs a two-factor dynamic authentication strategy, and achieves dynamic identity authentication throughout the data trading using distributed ledger. The theoretical comparison and analysis with similar schemes show that the proposed scheme has lower cost, higher authentication efficiency and security, easier authority management, and can be widely applied in various fields of data trading scenarios.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Qingxuan Wang, Ding Wang, Chi Cheng, Debiao He
Summary: This article presents a quantum-resistant smart-card-based password authentication scheme that utilizes lattice-based key exchange and fuzzy-verifier + honeywords technique to effectively protect against quantum attacks. The scheme is proven to be secure under the random oracle model and demonstrates better computation efficiency compared to the state-of-the-art conventional 2FA schemes.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Toxicology
Yi Liu, Guanghui Chen, Hui Wang
Summary: Decreased sperm quality in male infertility is linked to prenatal dexamethasone exposure (PDE) in this study. PDE was found to decrease sperm count and motility, and increase deformity rate in male offspring. The expression of connexin 43 (CX43) in offspring testes was also reduced. These findings demonstrate the epigenetic programming of TBX2/CX43 in Sertoli cells as a mechanism by which PDE affects sperm quality in male offspring.
TOXICOLOGICAL SCIENCES
(2023)
Article
Computer Science, Information Systems
Yetong Cao, Fan Li, Qian Zhang, Song Yang, Yu Wang
Summary: In this paper, we propose PPGPass, a novel mobile two-factor authentication system, which leverages Photoplethysmography (PPG) sensors available in most wrist-worn wearables. PPGPass simultaneously performs a password/pattern/signature authentication and a physiological-based authentication. Extensive experiments demonstrate that PPGPass can achieve the false acceptance rate of 3.11% and the false recognition rate of 3.71%, which confirms its high effectiveness, security, and usability.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Oncology
Somnath Pandey, Rahinatou Djibo, Anais Darracq, Gennaro Calendo, Hanghang Zhang, Ryan A. Henry, Andrew J. Andrews, Stephen B. Baylin, Jozef Madzo, Rafael Najmanovich, Jean-Pierre J. Issa, Noel J-M Raynal
Summary: By combining drug screens, transcriptomic studies, and in vitro assays, our study identified toyocamycin as a potent and selective CDK9 inhibitor. Toyocamycin exhibits specific CDK9 inhibition in cancer cells and has the potential for cancer chemotherapy.