Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a T...Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a Trojan horse strategy-based nanocarrier has been developed by integrating the cell membrane of a brain-homing cancer cell and a polymeric drug depot. With the camouflage of a MDA-MB-231/Br cell membrane, doxorubicin-loaded poly(D, L-lactic-co-glycolic acid) nanoparticle(DOX-PLGA@CM) shows enhanced cellular uptake and boosted killing potency for MDA-MB-231/Br cells. Furthermore, DOX-PLGA@CM is equipped with naturally selected molecules for BBB penetration, as evidenced by its boosted capacity in entering the brain of both healthy and early-stage BMBC mouse models. Consequently, DOX-PLGA@CM effectively reaches the metastatic tumor lesions in the brain, slows down cancer progression, reduces tumor burden, and extends the survival time for the BMBC animal.Furthermore, the simplicity and easy scale-up of the design opens a new window for the treatment of BMBC and other brain metastatic cancers.展开更多
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy...The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time.展开更多
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ...We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.展开更多
Osteochondrosis (OC) is a developmental disease in horses with a significant impact on the horse’s welfare and performance. The early disturbance of enchondral ossification progresses to inflammatory and healing proc...Osteochondrosis (OC) is a developmental disease in horses with a significant impact on the horse’s welfare and performance. The early disturbance of enchondral ossification progresses to inflammatory and healing process in older horses. Metabolic pathway analysis showed an obvious dysregulation of several signaling pathways related to cartilage formation and cartilage repair such as Wnt/β-catenin, Indian hedgehog and TGF-β signaling pathways. Other regulated genes appeared to be involved in high carbohydrate diet, abnormal insulin metabolism or inflammation. Sclerostin is an osteocyte-secreted soluble antagonist of the Wnt/β-catenin signaling pathway. It is crucial for osteoblast development and activity and is increased in naturally occurring lesions of equine osteochondrosis. The aim of this study is to compare the circulating sclerostin levels between OC-affected (n = 20) and healthy horses (n = 19). A significant linear regression between plasma sclerostin and age is observed especially in the healthy young horses. The mean plasma sclerostin concentration is significantly higher in young horses suffering from osteochondrosis compared to the control horses. These results reinforce the possible role of the Wnt/β-catenin signaling pathway in the OC pathogeny. The inhibition of this essential pathway could disturb the osteo-chondral differentiation. More studies are currently needed to define the eventual clinic interest of plasma sclerostin as future biomarker in bone and cartilage diseases.展开更多
安全性和灵活性是各种改进的BLP模型追求的目标.如何在保持安全性的前提下增加BLP模型的灵活性,一直是安全操作系统研究人员研究的重点.安全模型是系统设计的基础,如果在系统中实现了不安全的“安全模型”,其后果是严重的.结合多级安全(...安全性和灵活性是各种改进的BLP模型追求的目标.如何在保持安全性的前提下增加BLP模型的灵活性,一直是安全操作系统研究人员研究的重点.安全模型是系统设计的基础,如果在系统中实现了不安全的“安全模型”,其后果是严重的.结合多级安全(MLS)的核心思想,通过实例列举的方式深入分析了两个改进的BLP模型——DBLP(dynamic BLP)和SLCF(security label common framework).尽管这两个模型都提出了在系统运行时动态地调整主体安全级的规则,但是分析表明,它们还是不安全的.在这两个模型的规则控制下,特洛伊木马可以通过显式地读和写操作将高安全等级的信息泄漏给低安全等级的主体,从而违反了多级安全(MLS)策略.研究结果为人们避免选用不安全的模型提供了有意义的理论支持.展开更多
基金the National Institutes of Health(1R01AG054839-01A1,1R41CA254500-01A1,and 1R21CA252360-01)for financial support of the research。
文摘Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a Trojan horse strategy-based nanocarrier has been developed by integrating the cell membrane of a brain-homing cancer cell and a polymeric drug depot. With the camouflage of a MDA-MB-231/Br cell membrane, doxorubicin-loaded poly(D, L-lactic-co-glycolic acid) nanoparticle(DOX-PLGA@CM) shows enhanced cellular uptake and boosted killing potency for MDA-MB-231/Br cells. Furthermore, DOX-PLGA@CM is equipped with naturally selected molecules for BBB penetration, as evidenced by its boosted capacity in entering the brain of both healthy and early-stage BMBC mouse models. Consequently, DOX-PLGA@CM effectively reaches the metastatic tumor lesions in the brain, slows down cancer progression, reduces tumor burden, and extends the survival time for the BMBC animal.Furthermore, the simplicity and easy scale-up of the design opens a new window for the treatment of BMBC and other brain metastatic cancers.
文摘The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time.
基金supported by the National Basic Research Program of China(Grant No.2013CB338002)the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261)
文摘We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.
文摘Osteochondrosis (OC) is a developmental disease in horses with a significant impact on the horse’s welfare and performance. The early disturbance of enchondral ossification progresses to inflammatory and healing process in older horses. Metabolic pathway analysis showed an obvious dysregulation of several signaling pathways related to cartilage formation and cartilage repair such as Wnt/β-catenin, Indian hedgehog and TGF-β signaling pathways. Other regulated genes appeared to be involved in high carbohydrate diet, abnormal insulin metabolism or inflammation. Sclerostin is an osteocyte-secreted soluble antagonist of the Wnt/β-catenin signaling pathway. It is crucial for osteoblast development and activity and is increased in naturally occurring lesions of equine osteochondrosis. The aim of this study is to compare the circulating sclerostin levels between OC-affected (n = 20) and healthy horses (n = 19). A significant linear regression between plasma sclerostin and age is observed especially in the healthy young horses. The mean plasma sclerostin concentration is significantly higher in young horses suffering from osteochondrosis compared to the control horses. These results reinforce the possible role of the Wnt/β-catenin signaling pathway in the OC pathogeny. The inhibition of this essential pathway could disturb the osteo-chondral differentiation. More studies are currently needed to define the eventual clinic interest of plasma sclerostin as future biomarker in bone and cartilage diseases.
文摘安全性和灵活性是各种改进的BLP模型追求的目标.如何在保持安全性的前提下增加BLP模型的灵活性,一直是安全操作系统研究人员研究的重点.安全模型是系统设计的基础,如果在系统中实现了不安全的“安全模型”,其后果是严重的.结合多级安全(MLS)的核心思想,通过实例列举的方式深入分析了两个改进的BLP模型——DBLP(dynamic BLP)和SLCF(security label common framework).尽管这两个模型都提出了在系统运行时动态地调整主体安全级的规则,但是分析表明,它们还是不安全的.在这两个模型的规则控制下,特洛伊木马可以通过显式地读和写操作将高安全等级的信息泄漏给低安全等级的主体,从而违反了多级安全(MLS)策略.研究结果为人们避免选用不安全的模型提供了有意义的理论支持.