Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 54
Filtrar
1.
Sci Immunol ; 9(98): eadk2612, 2024 Aug 02.
Artigo em Inglês | MEDLINE | ID: mdl-39093956

RESUMO

Aberrant activation of the cyclic guanosine monophosphate-adenosine monophosphate synthase-stimulator of interferon genes (cGAS-STING) pathway causes autoimmunity in humans and mice; however, the exact mechanism by which the cGAS-STING pathway initiates adaptive immunity and tissue pathology is still not fully understood. Here, we used a cGAS knockin (KI) mouse model that develops systemic autoimmunity. In the lungs of cGAS-KI mice, blood vessels were enclosed by organized lymphoid tissues that resemble tertiary lymphoid structures (TLSs). Cell-intrinsic cGAS induction promoted up-regulation of CCR5 in CD8+ T cells and led to CCL5 production in vascular endothelial cells. Peripheral CD8+ T cells were recruited to the lungs and produced CXCL13 and interferon-γ. The latter triggered endothelial cell death, potentiated CCL5 production, and was essential for TLS establishment. Blocking CCL5 or CCR5, or depleting CD8+ T cells, impaired TLS formation. cGAS-mediated TLS formation also enhanced humoral and antitumor responses. These data demonstrate that cGAS signaling drives a specialized lymphoid structure that underlies autoimmune tissue pathology.


Assuntos
Linfócitos T CD8-Positivos , Células Endoteliais , Nucleotidiltransferases , Estruturas Linfoides Terciárias , Animais , Nucleotidiltransferases/imunologia , Nucleotidiltransferases/genética , Nucleotidiltransferases/metabolismo , Camundongos , Células Endoteliais/imunologia , Estruturas Linfoides Terciárias/imunologia , Linfócitos T CD8-Positivos/imunologia , Quimiocina CCL5/imunologia , Quimiocina CCL5/genética , Camundongos Endogâmicos C57BL , Camundongos Transgênicos , Transdução de Sinais/imunologia , Receptores CCR5/imunologia , Receptores CCR5/genética , Receptores CCR5/metabolismo , Autoimunidade/imunologia
2.
Entropy (Basel) ; 25(8)2023 Aug 02.
Artigo em Inglês | MEDLINE | ID: mdl-37628187

RESUMO

Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign. Existing Proxy-BS schemes are based on traditional cryptographically hard problems, and they cannot resist quantum attacks. Moreover, most current Proxy-BS schemes depend on public key infrastructure (PKI), which leads to high certificate storage and management overhead. To simplify key management and resist quantum attacks, we propose a post-quantum secure identity-based proxy blind signature (ID-Proxy-BS) scheme on a lattice using a matrix cascade technique and lattice cryptosystem. Under the random oracle model (ROM), the security of the proposed scheme is proved. Security shows that the proposed scheme assures security against quantum attacks and satisfies the correctness, blindness, and unforgeability. In addition, we apply the ID-Proxy-BS scheme on a lattice to e-voting and propose a quantum-resistant proxy e-voting system, which is resistant to quantum attacks and achieves the efficiency of e-voting.

3.
Entropy (Basel) ; 25(8)2023 Aug 02.
Artigo em Inglês | MEDLINE | ID: mdl-37628189

RESUMO

The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective solution. Most existing strong forward-secure digital signature schemes rely on traditional cryptosystems, which cannot effectively resist quantum attacks. By introducing lattice-based delegation technology into the key-iteration process, a two-direction and lattice-based key-iteration algorithm with strong forward security is proposed. In the proposed algorithm, a unique key pair is assigned to the signer in every period. Based on the proposed algorithm, a strong forward-secure signature scheme is further put forward, which achieves resistance to quantum attacks. Performance analysis shows that under the security assumption of the SIS problem on the lattice, the proposed strong forward-secure signature scheme is existentially unforgeable under the random oracle model. Ultimately, based on the proposed strong forward-secure signature scheme, a remote identity-authentication scheme that is resistant to quantum attacks is proposed, ensuring post-quantum security in the user-authentication process.

4.
J Leukoc Biol ; 114(4): 335-346, 2023 Sep 27.
Artigo em Inglês | MEDLINE | ID: mdl-37479674

RESUMO

CD8+ invariant natural killer T (iNKT) cells are functionally different from other iNKT cells and are enriched in human but not in mouse. To date, their developmental pathway and molecular basis for fate decision remain unclear. Here, we report enrichment of CD8+ iNKT cells in neonatal mice due to their more rapid maturation kinetics than CD8- iNKT cells. Along developmental trajectories, CD8+ and CD8- iNKT cells separate at stage 0, following stage 0 double-positive iNKT cells, and differ in HIVEP3 expression. HIVEP3 is lowly expressed in stage 0 CD8+ iNKT cells and negatively controls their development, whereas it is highly expressed in stage 0 CD8- iNKT cells and positively controls their development. Despite no effect on IFN-γ, HIVEP3 inhibits granzyme B but promotes interleukin-4 production in CD8+ iNKT cells. Together, we reveal that, as a negative regulator for CD8+ iNKT fate decision, low expression of HIVEP3 in stage 0 CD8+ iNKT cells favors their development and T helper 1-biased cytokine responses as well as high cytotoxicity.

5.
World Wide Web ; : 1-16, 2023 May 26.
Artigo em Inglês | MEDLINE | ID: mdl-37361139

RESUMO

The COVID-19 is still spreading today, and it has caused great harm to human beings. The system at the entrance of public places such as shopping malls and stations should check whether pedestrians are wearing masks. However, pedestrians often pass the system inspection by wearing cotton masks, scarves, etc. Therefore, the detection system not only needs to check whether pedestrians are wearing masks, but also needs to detect the type of masks. Based on the lightweight network architecture MobilenetV3, this paper proposes a cascaded deep learning network based on transfer learning, and then designs a mask recognition system based on the cascaded deep learning network. By modifying the activation function of the MobilenetV3 output layer and the structure of the model, two MobilenetV3 networks suitable for cascading are obtained. By introducing transfer learning into the training process of two modified MobilenetV3 networks and a multi-task convolutional neural network, the ImagNet underlying parameters of the network models are obtained in advance, which reduces the computational load of the models. The cascaded deep learning network consists of a multi-task convolutional neural network cascaded with these two modified MobilenetV3 networks. A multi-task convolutional neural network is used to detect faces in images, and two modified MobilenetV3 networks are used as the backbone network to extract the features of masks. After comparing with the classification results of the modified MobilenetV3 neural network before cascading, the classification accuracy of the cascading learning network is improved by 7%, and the excellent performance of the cascading network can be seen.

6.
Chemphyschem ; 24(10): e202200813, 2023 May 16.
Artigo em Inglês | MEDLINE | ID: mdl-36759326

RESUMO

In this work, two kinds of BN-nanowires (BNnws): a-BNnw and d-BNnw, respectively composed of azo (N-N) and diboron (B-B) bonds, are proposed with the aid of the first-principles simulations. Their structural stabilities are carefully verified from the energetics, lattice dynamics, and thermodynamic perspectives. Similar to the other common boron nitride polymorph, the a-BNnw and d-BNnw are semiconductors with relatively wide band gaps of 3.256 and 4.631 eV at the HSE06 level, respectively. The corresponding projected DOS patterns point out that their band edges are composed of different atomic species, which can help with the separation of their excitons. The band gaps can be manipulated monotonically by axial strains within the elastic ranges. The major charge carriers are electron holes. Significantly, a-BNnw possesses very high carrier mobilities around 0.44×104  cm2 V-1 s-1 .

8.
Proc Natl Acad Sci U S A ; 118(46)2021 11 16.
Artigo em Inglês | MEDLINE | ID: mdl-34772808

RESUMO

Invariant natural killer T (iNKT) cells play important roles in regulating immune responses. Based on cytokine profiling and key transcriptional factors, iNKT cells are classified into iNKT1, iNKT2, and iNKT17 subsets. However, whether the development and functions of these subsets are controlled by distinct mechanisms remains unclear. Here, we show that forkhead box protein O1 (Foxo1) promotes differentiation of iNKT1 and iNKT2 cells but not iNKT17 cells because of its distinct contributions to IL7R expression in these subsets. Nuclear Foxo1 is essential for Il7r expression in iNKT1 and iNKT2 cells at early stages of differentiation but is dispensable in iNKT17 cells. RORγt, instead of Foxo1, promotes IL7R expression in iNKT17 cells. Additionally, Foxo1 is required for the effector function of iNKT1 and iNKT2 cells but not iNKT17 cells. Cytoplasmic Foxo1 promotes activation of mTORC1 in iNKT1 and iNKT2 cells through inhibiting TSC1-TSC2 interaction, whereas it is dispensable for mTORC1 activation in iNKT17 cells. iNKT17 cells display distinct metabolic gene expression patterns from iNKT1 and iNKT2 cells that match their different functional requirements on Foxo1. Together, our results demonstrate that iNKT cell subsets differ in their developmental and functional requirements on Foxo1.


Assuntos
Proteína Forkhead Box O1/metabolismo , Células T Matadoras Naturais/metabolismo , Animais , Diferenciação Celular/fisiologia , Subunidade alfa de Receptor de Interleucina-7/metabolismo , Alvo Mecanístico do Complexo 1 de Rapamicina/metabolismo , Camundongos , Camundongos Endogâmicos C57BL , Membro 3 do Grupo F da Subfamília 1 de Receptores Nucleares/metabolismo , Transdução de Sinais/fisiologia , Fatores de Transcrição/metabolismo
9.
Proc Natl Acad Sci U S A ; 118(2)2021 01 12.
Artigo em Inglês | MEDLINE | ID: mdl-33372138

RESUMO

Precise regulation of coinhibitory receptors is essential for maintaining immune tolerance without interfering with protective immunity, yet the mechanism underlying such a balanced act remains poorly understood. In response to protein immunization, T follicular helper (TFH) cells lacking Tcf1 and Lef1 transcription factors were phenotypically normal but failed to promote germinal center formation and antibody production. Transcriptomic profiling revealed that Tcf1/Lef1-deficient TFH cells aberrantly up-regulated CTLA4 and LAG3 expression, and treatment with anti-CTLA4 alone or combined with anti-LAG3 substantially rectified B-cell help defects by Tcf1/Lef1-deficient TFH cells. Mechanistically, Tcf1 and Lef1 restrain chromatin accessibility at the Ctla4 and Lag3 loci. Groucho/Tle corepressors, which are known to cooperate with Tcf/Lef factors, were essential for TFH cell expansion but dispensable for repressing coinhibitory receptors. In contrast, mutating key amino acids in histone deacetylase (HDAC) domain in Tcf1 resulted in CTLA4 derepression in TFH cells. These findings demonstrate that Tcf1-instrinsic HDAC activity is necessary for preventing excessive CTLA4 induction in protein immunization-elicited TFH cells and hence guarding their B-cell help function.


Assuntos
Fator 1-alfa Nuclear de Hepatócito/metabolismo , Fator 1 de Ligação ao Facilitador Linfoide/metabolismo , Células T Auxiliares Foliculares/imunologia , Animais , Antígenos CD , Linfócitos B/metabolismo , Linfócitos T CD8-Positivos/imunologia , Antígeno CTLA-4/metabolismo , Diferenciação Celular/imunologia , Feminino , Centro Germinativo/imunologia , Fator 1-alfa Nuclear de Hepatócito/imunologia , Tolerância Imunológica , Fator 1 de Ligação ao Facilitador Linfoide/imunologia , Masculino , Camundongos , Camundongos Endogâmicos C57BL , Proteínas Proto-Oncogênicas c-bcl-6 , Células T Auxiliares Foliculares/metabolismo , Linfócitos T Auxiliares-Indutores/imunologia , Proteína do Gene 3 de Ativação de Linfócitos
10.
Sensors (Basel) ; 20(22)2020 Nov 22.
Artigo em Inglês | MEDLINE | ID: mdl-33266471

RESUMO

Anonymous technology is an effective way for protecting users' privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties. While, in unstable wireless sensor networks, frequent topology changes often lead to route-failure in anonymous communication. To deal with the problems of anonymous route-failure in unstable sensor networks, in this paper we propose a fully anonymous routing protocol with self-healing capability in unstable sensor networks by constructing a new key agreement scheme and proposing an anonymous identity scheme. The proposed protocol maintains full anonymity of sensor nodes with the self-healing capability of anonymous routes. The results from the performance analysis show that the proposed self-healing anonymity-focused protocol achieves full anonymity of source nodes, destination nodes, and communication association.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA