94 research outputs found
Recommended from our members
A common MET polymorphism harnesses HER2 signaling to drive aggressive squamous cell carcinoma.
c-MET receptors are activated in cancers through genomic events like tyrosine kinase domain mutations, juxtamembrane splicing mutation and amplified copy numbers, which can be inhibited by c-MET small molecule inhibitors. Here, we discover that the most common polymorphism known to affect MET gene (N375S), involving the semaphorin domain, confers exquisite binding affinity for HER2 and enables METN375S to interact with HER2 in a ligand-independent fashion. The resultant METN375S/HER2 dimer transduces potent proliferative, pro-invasive and pro-metastatic cues through the HER2 signaling axis to drive aggressive squamous cell carcinomas of the head and neck (HNSCC) and lung (LUSC), and is associated with poor prognosis. Accordingly, HER2 blockers, but not c-MET inhibitors, are paradoxically effective at restraining in vivo and in vitro models expressing METN375S. These results establish METN375S as a biologically distinct and clinically actionable molecular subset of SCCs that are uniquely amenable to HER2 blocking therapies
Recommended from our members
A common MET polymorphism harnesses HER2 signaling to drive aggressive squamous cell carcinoma.
c-MET receptors are activated in cancers through genomic events like tyrosine kinase domain mutations, juxtamembrane splicing mutation and amplified copy numbers, which can be inhibited by c-MET small molecule inhibitors. Here, we discover that the most common polymorphism known to affect MET gene (N375S), involving the semaphorin domain, confers exquisite binding affinity for HER2 and enables METN375S to interact with HER2 in a ligand-independent fashion. The resultant METN375S/HER2 dimer transduces potent proliferative, pro-invasive and pro-metastatic cues through the HER2 signaling axis to drive aggressive squamous cell carcinomas of the head and neck (HNSCC) and lung (LUSC), and is associated with poor prognosis. Accordingly, HER2 blockers, but not c-MET inhibitors, are paradoxically effective at restraining in vivo and in vitro models expressing METN375S. These results establish METN375S as a biologically distinct and clinically actionable molecular subset of SCCs that are uniquely amenable to HER2 blocking therapies
A Study on Using Emojis in a Shoulder Surfing Resistant Authentication Method
While images or emojis offer good memorability when used in an authentication method, inherently graphical data are highly susceptible to shoulder surfing attacks. An authentication system incorporating emojis was proposed and designed, which offers resistance to shoulder surfing attacks. The proposed system implements emojis in place of numerics in the reference method, DragPIN, and adds cue questions. The methods are compared in terms of performance and memorability, through user testing. The proposed authentication system was found to be successful at resisting shoulder surfing attacks. After 4–6 weeks, memorability was also higher in the proposed method compared to the reference method
Methods to Eye Gaze Interaction for Authentication
One of the methods touted to reduce shoulder
surfing during onscreen authentication is eye gaze input. Eye gaze
authentication methods have thus far relied on a few methods for
selection of on screen objects, namely dwell time, blinking, eye
gestures and pursuit of moving objects. This paper surveys the
literature on the various approaches. From analysis of the
advantages and drawbacks of the surveyed approaches, we find
that the dwell method has advantages in security and usability. We
then describe a method designed previously by the authors that
enhances the dwell method by making use of peripheral vision.
The proposed method is in the ideation stag
Vulnerabilities in Online Food Ordering Website
In this paper, we show several vulnerabilities in the ordering mechanism of one of Malaysia’s online food ordering services company (which we will call “Company X”) website. In particular, we show that the system is open to several kinds of abuse, demonstrating two proof-of-concept attacks we carried out, as well as discuss more potentially disruptive theoretical attacks. We also suggest several countermeasures to rectify the issues, that are not only applicable to Company X website, but also to other similar online ordering systems
- …