76 research outputs found

    Statistical and Biological Evaluation of Different Gene Set Analysis Methods

    Get PDF
    AbstractGene-set analysis (GSA) methods have been widely used in microarray data analysis. Owing to the unusual characteristics of microarray data, such as multi-dimension, small sample size and complicated relationship between genes, no generally accepted methods have been used to detect differentially expressed gene sets (DEGs) up to now. Our group assessed the statistical performance of some commonly used methods through Monte Carlo simulation combined with the analysis of real-world microarray data sets. Not only did we discover a few novel features of GSA methods during experiences, but also we find that some GSA methods are effective only if genes were assumed to be independent. And we also detected that model-based methods (GlobalTest and PCOT2) performed well when analyzing our simulated data sets in which the inter-gene correlation structure was incorporated into each gene set separately for more reasonable. Through analysis of real-world microarray data, we found GlobalTest is more effective. Then we concluded that GlobalTest is a more effective gene set analysis method, and recommended using it with microarray data analysis

    Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping

    Full text link
    The malicious applications of deep forgery, represented by face swapping, have introduced security threats such as misinformation dissemination and identity fraud. While some research has proposed the use of robust watermarking methods to trace the copyright of facial images for post-event traceability, these methods cannot effectively prevent the generation of forgeries at the source and curb their dissemination. To address this problem, we propose a novel comprehensive active defense mechanism that combines traceability and adversariality, called Dual Defense. Dual Defense invisibly embeds a single robust watermark within the target face to actively respond to sudden cases of malicious face swapping. It disrupts the output of the face swapping model while maintaining the integrity of watermark information throughout the entire dissemination process. This allows for watermark extraction at any stage of image tracking for traceability. Specifically, we introduce a watermark embedding network based on original-domain feature impersonation attack. This network learns robust adversarial features of target facial images and embeds watermarks, seeking a well-balanced trade-off between watermark invisibility, adversariality, and traceability through perceptual adversarial encoding strategies. Extensive experiments demonstrate that Dual Defense achieves optimal overall defense success rates and exhibits promising universality in anti-face swapping tasks and dataset generalization ability. It maintains impressive adversariality and traceability in both original and robust settings, surpassing current forgery defense methods that possess only one of these capabilities, including CMUA-Watermark, Anti-Forgery, FakeTagger, or PGD methods

    Communication-efficient federated learning for digital twin systems of industrial internet of things

    Get PDF
    With the rapid development and deployment of Industrial Internet of Things technology, it promotes interconnection and edge applications in smart manufacturing. However, challenges remain, such as yet-to-improve communication efficiency and trade-offs between computing power and energy consumption, which limits the application and further development of IIoT technology. This paper proposes the digital twin systems into the IIoT to build model between physical objects and digital virtual systems to optimize the structure of IIoT. And we further introduce federal learning to train the digital twins model and to improve the communication efficiency of IIoT. In this paper, we first establish the digital twins model of IIoT based on industrial scenario. Moreover, to optimize the communication overhead allocation problem, this paper proposes an improved communication-efficient distribution algorithm, which speeds up the training performance of federated model and ensures the performance of industrial system model by changing the update training mode of client and server and allowing some industrial equipment to participate in federated training. This paper simulates the real-word intelligent camera detection to validate the proposed method. Comparing our proposed method with the existing traditional methods, the results show the advantages of the proposed method can improve the communication performance of the training model

    Heparin Alters Viral Serpin, Serp-1, Anti-Thrombolytic Activity to Anti-Thrombotic Activity

    Get PDF
    Serine protease inhibitors (serpins) regulate coagulation and inflammation. Heparin, a glycosaminoglycan, is an important cofactor for modulation of the inhibitory function of mammalian serpins. The secreted myxoma viral serpin, Serp-1 exerts profound anti-inflammatory activity in a wide range of animal models. Serp-1 anti-inflammatory and anti-atherogenic activity is dependent upon inhibition of the uPA / uPA receptor thrombolytic complex. We demonstrate here that heparin binds to Serp-1 and enhances Serp-1 inhibition of thrombin, a human pro-thrombotic serine protease, in vitro, altering inhibitory activity to a more predominant anti-thrombotic activity. Heparin also facilitates the simultaneous thrombin-mediated cleavage of Serp-1 and prevents formation of a serpin-typical SDS-resistant complex, implying mutual neutralization of Serp-1 and thrombin. In a cell-based assay, heparin facilitates Serp-1 reversal of cellular activation by stabilizing cellular membrane fluidity in thrombin-activated monocytes. In conclusion, heparin and other GAGs serve as cofactors enhancing Serp-1 regulation of local thrombotic and inflammatory pathway
    • …
    corecore