19 results on '"Zequan Zhou"'
Search Results
2. A Blockchain-Based Fine-Grained Access Data Control Scheme With Attribute Change Function
- Author
-
Yifu Xu, Xiling Luo, Feixiang Luo, Zequan Zhou, Yi Bai, and Xiaochao Wang
- Subjects
Public-key cryptography ,Information privacy ,Revocation ,business.industry ,Computer science ,Distributed data store ,Ciphertext ,Overhead (computing) ,Access control ,business ,Encryption ,Computer network - Abstract
A distributed storage system (DSS) has the ad-vantages of low price and high throughput, but it also raises serious data confidentiality and privacy issues. Fine-grained access control (AC) is important for further applications. Although attribute-based encryption (ABE) schemes can achieve fine-grained AC, almost all schemes distribute a private key to a visitor by a private key generator that may leak data. Besides, attribute revocation functions of the ABE scheme will lead to collusion attacks. Blockchain-based ABE schemes rarely consider ciphertext-based search and attribute revocation functions which lead to a large communication overhead. In this paper, we propose a secure ABE scheme in which a data owner is the only person who has the right to distribute keys. Then we combine blockchain with the proposed ABE scheme to realize fine-grained AC over a distributed storage system, which supports the attribute change function and resists collusive attacks. In addition, we build a series of smart contracts to ensure the fairness of trade between the data owner and visitor. The auxiliary information of data stored on the blockchain can realize ciphertext-based search. Finally, we prove the scheme resists collusion attacks under the computational Diffie-Hellman assumption (CDH) and conduct multiple experiments based on Ethernet test Network. The experimental results demonstrate our scheme has the running time of algorithms reached a millisecond-level and the ET H cost is acceptable.
- Published
- 2021
3. Secure Accountable Dynamic Storage Integrity Verification
- Author
-
Feng Zeng, Xiaochao Wang, Zequan Zhou, Yi Bai, Xiling Luo, and Yupeng Wang
- Subjects
business.industry ,Computer science ,Discrete logarithm ,Server ,Overhead (computing) ,Cloud computing ,Bloom filter ,Data loss ,business ,Encryption ,Cloud storage ,Computer network - Abstract
Integrity verification of cloud data is of great importance for secure and effective cloud storage since attackers can change the data even though it is encrypted. Traditional integrity verification schemes only let the client know the integrity status of the remote data. When the data is corrupted, the system cannot hold the server accountable. Besides, almost all existing schemes assume that the users are credible. Instead, especially in a dynamic operation environment, users can deny their behaviors, and let the server bear the penalty of data loss. To address the issues above, we propose an accountable dynamic storage integrity verification (ADS-IV) scheme which provides means to detect or eliminate misbehavior of all participants. In the meanwhile, we modify the Invertible Bloom Filter (IBF) to recover the corrupted data and use the Mahalanobis distance to calculate the degree of damage. We prove that our scheme is secure under Computational Diffie-Hellman (CDH) assumption and Discrete Logarithm (DL) assumption and that the audit process is privacy-preserving. The experimental results demonstrate that the computational complexity of the audit is constant; the storage overhead is $O(\sqrt n )$, which is only 1/400 of the size of the original data; and the whole communication overhead is O(1).As a result, the proposed scheme is not only suitable for large-scale cloud data storage systems, but also for systems with sensitive data, such as banking systems, medical systems, and so on.
- Published
- 2021
4. A Cloud Data Integrity Verification Scheme Based on Blockchain
- Author
-
Yifu Xu, Xiaochao Wang, Xiling Luo, Zequan Zhou, Yi Bai, and Feng Liu
- Subjects
business.industry ,Computer science ,Distributed computing ,Data integrity ,Dynamic data ,Hash function ,Homomorphic encryption ,Message authentication code ,Cloud computing ,business ,Raw data ,Cloud storage - Abstract
Cloud storage saves a lot of storage overheads for users to manage data. However, it also brings data integrity challenges. Relying only on message authentication codes (MAC) and hash functions introduces serious communication overheads. Existing integrity verification schemes usually rely on third-party auditors (TPAs) to reduce users’ audit burden. However, malicious TPAs not only extract raw data from repeated audit processes but also collude with a cloud server to launch collusive attacks. Recently, some integrity verification schemes based on blockchain are presented to solve challenges of raw data extraction and collusive attacks. These schemes cannot realize large-scale data processing on a blockchain as well as dynamic data operations. To address the above issues, we propose a blockchain-based cloud data integrity verification scheme (BCD-IV) that removes TPAs by using chain-code that solves collusive attacks. Furthermore, we construct a new homomorphic verification tag (HVT) based on the signature proposed by Zhang, Safavi, and Susilo (ZSS), which supports blockless verification. The proposed scheme realizes full dynamic operations with auxiliary information that stores on a blockchain. Mathematical analysis shows that our scheme has lower complexity in terms of communication and computation overhead, which are both O(c). Finally, we conduct experiments on Hyperledger Fabric V2.2 to demonstrate that the computation efficiency of audit is the highest compared to the state-of-the-art and the storage overhead is negligible.
- Published
- 2021
5. A DRL-Driven Intelligent Optimization Strategy for Resource Allocation in Cloud-Edge-End Cooperation Environments
- Author
-
Chao Fang, Tianyi Zhang, Jingjing Huang, Hang Xu, Zhaoming Hu, Yihui Yang, Zhuwei Wang, Zequan Zhou, and Xiling Luo
- Subjects
Physics and Astronomy (miscellaneous) ,resource allocation ,cloud-edge-end cooperation networks ,deep reinforcement learning ,in-network caching ,request aggregation ,Chemistry (miscellaneous) ,General Mathematics ,Computer Science (miscellaneous) - Abstract
Complex dynamic services and heterogeneous network environments make the asymmetrical control a curial issue to handle on the Internet. With the advent of the Internet of Things (IoT) and the fifth generation (5G), the emerging network applications lead to the explosive growth of mobile traffic while bringing forward more challenging service requirements to future radio access networks. Therefore, how to effectively allocate limited heterogeneous network resources to improve content delivery for massive application services to ensure network quality of service (QoS) becomes particularly urgent in heterogeneous network environments. To cope with the explosive mobile traffic caused by emerging Internet services, this paper designs an intelligent optimization strategy based on deep reinforcement learning (DRL) for resource allocation in heterogeneous cloud-edge-end collaboration environments. Meanwhile, the asymmetrical control problem caused by complex dynamic services and heterogeneous network environments is discussed and overcome by distributed cooperation among cloud-edge-end nodes in the system. Specifically, the multi-layer heterogeneous resource allocation problem is formulated as a maximal traffic offloading model, where content caching and request aggregation mechanisms are utilized. A novel DRL policy is proposed to improve content distribution by making cache replacement and task scheduling for arriving content requests in accordance with the information about users’ history requests, in-network cache capacity, available link bandwidth and topology structure. The performance of our proposed solution and its similar counterparts are analyzed in different network conditions.
- Published
- 2022
6. Preparation and evaluation of dissolving microneedle loaded with azelaic acid for acne vulgaris therapy
- Author
-
Mengzhen Xing, Suohui Zhang, Yuning Ma, Yingzhi Chen, Guozhong Yang, Zequan Zhou, and Yunhua Gao
- Subjects
Pharmaceutical Science - Published
- 2022
7. Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems
- Author
-
Feixiang Luo, Zequan Zhou, Wang Zhen, Jun Wang, and Xiling Luo
- Subjects
Article Subject ,Computer Networks and Communications ,business.industry ,Computer science ,Big data ,Mobile commerce ,Cyber-physical system ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Trusted third party ,Computer security ,computer.software_genre ,Encryption ,Data exchange ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,Arbitration ,lcsh:T1-995 ,020201 artificial intelligence & image processing ,lcsh:Science (General) ,business ,computer ,lcsh:Q1-390 ,Information Systems - Abstract
Recently, optimistic fair exchange in electronic commerce (e-commerce) or mobile commerce (m-commerce) has made great progress. However, new technologies create large amounts of data and it is difficult to handle them. Fortunately, with the assistance of cloud computing and big data, optimistic fair exchange of digital items in cyber-physical systems (CPSes) can be efficiently managed. Optimistic fair exchange in cloud-assisted CPSes mainly focuses on online data exchange in e-commerce or online contracts signing. However, there exist new forms of risks in the uncertain network environment. To solve the above problems, we use a new technique called verifiably encrypted identity-based signature (VEIS) to construct optimistic fair exchange in cloud-assisted CPSes. VEIS is an encrypted signature, and we can check the validity of the underlying signature without decrypting it. We introduce a robust arbitration mechanism to guarantee fairness of the exchange, and even the trusted third party (TTP) cannot get the original signatures of the exchange parties. And the TTP in our protocol is offline, which greatly improves the efficiency. Besides, we show that our protocol is secure, fair, and practical.
- Published
- 2019
8. Two-Layer Sustained-Release Microneedles Encapsulating Exenatide for Type 2 Diabetes Treatment
- Author
-
Han, Liu, Suohui, Zhang, Zequan, Zhou, Mengzhen, Xing, and Yunhua, Gao
- Subjects
Pharmaceutical Science ,type 2 diabetes ,sustained-release ,two-layer microneedles ,sodium alginate ,exenatide - Abstract
Daily administration of multiple injections can cause inconvenience and reduce compliance in diabetic patients; thus, microneedle (MN) administration is favored due to its various advantages. Accordingly, the two-layer sustained-release MNs (TS-MNs) were fabricated by encapsulating exenatide (EXT) in calcium alginate (CA) gel in this work. The TS-MNs were composed of a sodium alginate (SA) tip and a water-soluble matrix-containing calcium chloride (CaCl2). Subsequently, the calcium ion (Ca2+) contained in the matrix layer penetrated the tip layer for cross-linking, leaving the drug in the cross-linked network. The patches have adequate mechanical strength to pierce the skin; then, the matrix layer is dissolved, leaving the tip layer to achieve sustained release. Additionally, the TS-MNs encapsulating EXT retained high activity during long-term storage at room temperature. The pharmacokinetic results indicated that the plasma concentrations of EXT were sustained for 48 h in the EXT MN group, which agreed with the in vitro release test. Furthermore, they had high relative bioavailability (83.04%). Moreover, the hypoglycemic effect was observed to last for approximately 24 h after a single administration and remained effective after multiple administrations without drug resistance. These results suggest that the TS-MNs are a promising depot for the sustained delivery of encapsulated EXT.
- Published
- 2022
9. Process optimization of Ca2+ cross-linked alginate-based swellable microneedles for enhanced transdermal permeability: More applicable to acidic drugs
- Author
-
Zequan Zhou, Mengzhen Xing, Suohui Zhang, Guozhong Yang, and Yunhua Gao
- Subjects
Pharmaceutical Science - Published
- 2022
10. An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
- Author
-
Xiling Luo, Zequan Zhou, Jian Mao, Lin Zhong, and Chaoyong Chen
- Subjects
Scheme (programming language) ,020203 distributed computing ,Information privacy ,Service (systems architecture) ,Correctness ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Hash function ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Outsourcing ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:T1-995 ,lcsh:Science (General) ,business ,Cloud storage ,computer ,lcsh:Q1-390 ,Information Systems ,computer.programming_language - Abstract
Cloud storage services allow users to outsource their data remotely to save their local storage space and enable them to manage resources on demand. However, once users outsourced their data to the remote cloud platform, they lose the physical control of the data. How to ensure the integrity of outsourced data is the major concern of cloud users and also is the main challenge in the cloud service deployment. Limited by the communication and computation overheads, traditional hash-based integrity verification solutions in the stand-alone systems cannot be directly adopted in remote cloud storing environment. In this paper, we improve the previous privacy preserving model and propose an effective integrity verification scheme of cloud data based on BLS signature (EoCo), which ensures public audition and data privacy preserving. In addition, EoCo also supports batch auditing operations. We conducted theoretical analysis of our scheme, demonstrated its correctness and security properties, and evaluated the system performance as well.
- Published
- 2018
11. An Adaptive Denoising Algorithm for Chaotic Signals Based on Improved Empirical Mode Decomposition
- Author
-
Yicheng Zeng, Zhijun Li, Zequan Zhou, and Mengjiao Wang
- Subjects
0209 industrial biotechnology ,Computer science ,Applied Mathematics ,Noise reduction ,Mode (statistics) ,Chaotic ,Scale (descriptive set theory) ,02 engineering and technology ,Thresholding ,Signal ,Hilbert–Huang transform ,Adaptive denoising ,020901 industrial engineering & automation ,Signal Processing ,Algorithm - Abstract
It is difficult to determine the threshold of mode cell in the interval-thresholding algorithm, when it is used to denoise chaotic signals. In this paper, an adaptive denoising algorithm is proposed for chaotic signals based on improved empirical mode decomposition. First, the noisy chaotic signal is decomposed into the intrinsic mode functions (IMFs) by improved complete ensemble empirical mode decomposition. Then, the zero-crossing scale thresholding denoising algorithm is used to denoise the IMFs with different thresholds. The optimal threshold is obtained by the Durbin–Watson criterion. With the optimal threshold, the final denoised chaotic signal is obtained. The proposed algorithm effectively solves the issue mentioned above. The experimental results show the proposed algorithm can denoise noisy chaotic signals in different conditions effectively and is better than other existing algorithms.
- Published
- 2018
12. Novel dissolving microneedles preparation for synergistic melasma therapy: Combined effects of tranexamic acid and licorice extract
- Author
-
Aguo Cheng, Han Liu, Wang Xue, Suohui Zhang, Lichun Zhao, Mengzhen Xing, Yunhua Gao, Baorui Wang, and Zequan Zhou
- Subjects
Melasma ,Guinea Pigs ,Pharmaceutical Science ,02 engineering and technology ,Administration, Cutaneous ,030226 pharmacology & pharmacy ,Polyvinyl alcohol ,Melanosis ,Matrix (chemical analysis) ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Glycyrrhiza ,medicine ,Animals ,Dissolution ,Transdermal ,Polyvinylpyrrolidone ,Plant Extracts ,Chemistry ,021001 nanoscience & nanotechnology ,medicine.disease ,In vitro permeation ,Tranexamic Acid ,0210 nano-technology ,Tranexamic acid ,medicine.drug ,Nuclear chemistry - Abstract
The aim of this study was to prepare dissolving microneedles (DMNs) patches containing tranexamic acid (TA) for the treatment of melasma. Polyvinyl alcohol (PVA) and polyvinylpyrrolidone (PVP) were preferred as matrix materials through the compatibility experiment. In the in vitro permeation study, the transdermal amount of TA was significantly promoted through dissolving microneedles with the cumulative release was 44.43 ± 6.55%. By comparison, the release of TA solution assisted with solid microneedles (SMNs) was merely 11.31 ± 2.30% (p 0.05). Pharmacokinetics study indicated the bioavailability of dissolving microneedles was more than 1.3 times compared with oral administration. In pharmacodynamics investigation, TA dissolving microneedles obviously reduced melanin deposition in the skin of melasma guinea pigs after 8 consecutive administrations. In particular, the combination of tranexamic acid and licorice extract (LIC) dissolving microneedles worked better than tranexamic acid alone. Accelerated stress conditions including high temperature, high humidity, as well as photostability were designed to prove that TA microneedles maintained good pharmaceutical stability. In conclusion, tranexamic acid dissolving microneedles showed reliable quality and remarkable effect. Moreover, the combination of tranexamic acid and licorice extract had a synergistic therapy in melasma.
- Published
- 2021
13. Gait planning and research of hexapod bionic robot based on bipedal injury
- Author
-
Zequan Zhou, Xiaoqi Liu, Lei Wang, Fenghui Xu, and Yongxing Jia
- Subjects
Hexapod ,Computer science ,Robot ,Gait planning ,Control engineering - Abstract
Hexapod bionic robot plays an important role in battlefield reconnaissance and battlefield rescue. However, due to the complex battlefield situation, the robot’s legs are often damaged due to attacks, electromagnetic interference and other reasons, so it cannot work normally according to the original gait planning. In this paper, the damage situation of the hexapod bionic robot gait planning study, establish a foot injury cases six-legged robot model, USES the existing six-legged robot, combined with Matlab simulation model, build six-legged robot for foot injury under the condition of six-legged robot, simulation analysis is carried out under the different gait, planning out the suitable gait of robot movement. According to the analysis, the suitable gait under the condition of different injuries was obtained. This study can be used to improve the adaptability of hexapod robot in battlefield conditions and extend the working life of hexapod robot.
- Published
- 2020
14. Research on gait design of Hexapod Bionic Robot under damaged condition
- Author
-
Qin Shi, Zequan Zhou, Fenghui Xu, Zhidong Jia, Jiangcheng Xu, and Hao Chen
- Subjects
History ,Hexapod ,Working life ,Gait (human) ,Battlefield ,Computer science ,Work (physics) ,Robot ,Control engineering ,Stable gait ,Computer Science Applications ,Education ,Research method - Abstract
Hexapod robot plays an important role in rescue and relief, battlefield rescue and other occasions. However, due to the influence of environment and other factors, the hexapod robot may be damaged to different degrees, which makes it unable to work normally. This paper studies the gait of hexapod robot under the condition of damage, analyzes the different damaged conditions of hexapod robot, establishes the hexapod robot model under different damaged conditions, studies the gait and stability of hexapod robot under the condition of single-leg damaged, and plans the stable gait suitable for the robot to continue to work. According to the simulation analysis, the four-legged and three-legged gait of the hexapod robot under the condition of single-foot damage which makes itself work normally is obtained. The research method in this paper can be applied to other multi-legged robots under different damage conditions, which has certain significance to improve the working life of these kinds of robots.
- Published
- 2020
15. Exploring Trehalose on the Release of Levonorgestrel from Implantable PLGA Microneedles
- Author
-
Zequan Zhou, Xiaoyu Zhao, Yunhua Gao, Suohui Zhang, and Yang Guozhong
- Subjects
endocrine system ,microneedles ,Polymers and Plastics ,macromolecular substances ,02 engineering and technology ,010402 general chemistry ,01 natural sciences ,Article ,lcsh:QD241-441 ,chemistry.chemical_compound ,lcsh:Organic chemistry ,Pharmacokinetics ,medicine ,drug delivery system ,Levonorgestrel ,trehalose ,Hydrophobic drug ,technology, industry, and agriculture ,General Chemistry ,Plasma levels ,021001 nanoscience & nanotechnology ,Trehalose ,0104 chemical sciences ,PLGA ,chemistry ,poly (lactic-co-glycolic acid) ,Biophysics ,Drug release ,0210 nano-technology ,medicine.drug - Abstract
Hydrophobic drugs wrapped in poly (lactic-co-glycolic acid) (PLGA)-based microneedles (MNs) require a long time to release completely. To obtain the desired duration, it is still necessary to modulate the release of hydrophobic drugs from MNs, while the PLGA composition is unchangeable. In this work, implantable PLGA microneedles (IPMNs) composed of PLGA arrowheads encapsulating levonorgestrel (LNG) and a water-soluble supporting array were designed. We explored trehalose used as a porogen on the release of hydrophobic LNG from PLGA-based MNs. Varying the trehalose content in PLGA arrowheads could induce different rates of drug release. The highest cumulative release of LNG was 76.2 ±, 3.9% for IPMNs with 33.3% trehalose during 21 days in vitro, while the cumulative release of LNG was 60.4 ±, 3.5% for IPMNs without trehalose. Pharmacokinetic results in rats showed that plasma levels of LNG were sustained for 13 days for IPMNs with 33.3% trehalose and 16 days for IPMNs without trehalose. Furthermore, the PLGA arrowheads with trehalose degraded more rapidly than those without trehalose over 21 days in rats. Consequently, using trehalose as a porogen was a feasible approach to modulate the release of a hydrophobic drug from PLGA-based MNs.
- Published
- 2020
16. RETRACTED ARTICLE: SOX2 oncogenes amplified and operate to activate AKT signaling in gastric cancer and predict immunotherapy responsiveness
- Author
-
Yongsheng Li, Peng Zhao, Shengxiang Wang, Yi Luo, Yajun Tian, Zequan Zhou, Xin Jia, Junmin Wang, Da Cai, and Maosheng Dong
- Subjects
Regulation of gene expression ,Cancer Research ,Oncogene ,medicine.medical_treatment ,Cancer ,General Medicine ,Immunotherapy ,Biology ,medicine.disease ,Phenotype ,Oncology ,SOX2 ,medicine ,Cancer research ,Transcriptional regulation ,Protein kinase B - Abstract
Introduction Gastric cancer is the second leading cause of cancer mortality in the world. Whether the oncogene, amplified on chromosome 3q26, SOX2, a master transcriptional regulator of stemness, operate to drive strong growth phenotype in gastric cancer were unknown.
- Published
- 2014
17. Retraction Note to: SOX2 oncogenes amplified and operate to activate AKT signalling in gastric cancer and predict immunotherapy responsiveness
- Author
-
Peng Zhao, Junmin Wang, Xin Jia, Yajun Tian, Yongsheng Li, Zequan Zhou, Shengxiang Wang, Da Cai, Yi Luo, and Maosheng Dong
- Subjects
Oncology ,Cancer Research ,medicine.medical_specialty ,Akt signalling ,Hematology ,business.industry ,medicine.medical_treatment ,MEDLINE ,Cancer ,General Medicine ,Immunotherapy ,medicine.disease ,SOX2 ,Internal medicine ,Medicine ,business - Abstract
The Editor-in-Chief is retracting this article (Tian et al 2014) due to concerns regarding peer review, authorship and originality of the article.
- Published
- 2019
18. Apoptotic effect of genistein on human colon cancer cells via inhibiting the nuclear factor-kappa B (NF-κB) pathway
- Author
-
Zequan Zhou, Yan-gao Zhang, Yu Zhang, Shengxiang Wang, Peng Zhao, Yi Luo, and Zheng Wang
- Subjects
Cell cycle checkpoint ,Colorectal cancer ,Blotting, Western ,Genistein ,Apoptosis ,Biology ,chemistry.chemical_compound ,Downregulation and upregulation ,medicine ,Tumor Cells, Cultured ,Anticarcinogenic Agents ,Humans ,Phosphorylation ,Cell Proliferation ,bcl-2-Associated X Protein ,Cell Nucleus ,Cell Cycle ,NF-kappa B ,Cancer ,NF-κB ,General Medicine ,medicine.disease ,Cell biology ,chemistry ,Proto-Oncogene Proteins c-bcl-2 ,Colonic Neoplasms ,Signal transduction ,Signal Transduction - Abstract
Genistein possesses a wide variety of biological activities, and it is best known for its ability to inhibit cancer progression. Its cancer-preventive effect has been attributed to various mechanisms, including the induction of cell cycle arrest and apoptosis as well as the antioxidant functions. Nuclear factor kappa-B (NF-κB) is a signaling pathway that controls transcriptional activation of genes important for the tight regulation of many cellular processes and is aberrantly expressed in many types of cancer. Inhibitors of NF-κB pathway have shown potential anti-tumor activities. However, it is not fully elucidated in colon cancer. In the present study, we demonstrated that genistein could induce apoptosis in human colon cancer LoVo and HT-29 cells through inhibiting NF-κB pathway, as well as downregulation of Bcl-2 and upregulation of Bax, thus providing basis for clinical application of genistein in colon cancer cases.
- Published
- 2014
19. SOX2 oncogenes amplified and operate to activate AKT signaling in gastric cancer and predict immunotherapy responsiveness
- Author
-
Yajun, Tian, Xin, Jia, Shengxiang, Wang, Yongsheng, Li, Peng, Zhao, Da, Cai, Zequan, Zhou, Junmin, Wang, Yi, Luo, and Maosheng, Dong
- Subjects
Adult ,Male ,SOXB1 Transcription Factors ,Gene Amplification ,Middle Aged ,Prognosis ,Gene Expression Regulation, Neoplastic ,Oncogene Protein v-akt ,Treatment Outcome ,Stomach Neoplasms ,Humans ,Female ,Immunotherapy ,Molecular Targeted Therapy ,Aged ,Signal Transduction - Abstract
Gastric cancer is the second leading cause of cancer mortality in the world. Whether the oncogene, amplified on chromosome 3q26, SOX2, a master transcriptional regulator of stemness, operate to drive strong growth phenotype in gastric cancer were unknown.The gene expression changes of SOX2 in human gastric cancer tissues compared with non-cancerous tissues was detected using real-time quantitative reverse transcriptase-polymerase chain reaction (QRT-PCR) analysis and immunohistochemistry, which identified the gene overexpression of SOX2 in gastric cancer. Moreover, we discovered that SOX2 promoted cancer cell proliferation in vitro/vivo and SOX2 expression correlated with elevated AKT phosphorylation in gastric cancer, while the AKT phosphorylation was required for SOX2's oncogenic effects. Next, our data point to the usefulness of SOX2 overexpression, as a new predictive marker for responsiveness to trastuzumab.SOX2 is a commonly activated tumor promoter that activate AKT signaling in gastric cancer and a new predictive marker for targeted therapy.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.