7 results on '"Yu-Ting Kuang"'
Search Results
2. Study on the Expression and Signifi cance of TGF-β1, p-ERK1/2 and K-ras in Colorectal Cancer Using Tissue Microarray Technique
- Author
-
Xin Hu, Yu-ting Kuang, Mao-ming Sun, Ying-ying Wang, Yu-juan Zhang, Ling-ling Guo, and Shou-li Wang
- Subjects
colorectal cancer ,TGF-β1 ,ERK1/2 ,K-ras ,tissue microarray technique ,Neoplasms. Tumors. Oncology. Including cancer and carcinogens ,RC254-282 - Abstract
OBJECTIVE This study aimed to explore the expression and significance of transforming growth factor β1(TGF-β1), extracellular signal-regulated kinases 1/2 (ERK1/2), and K-ras in colorectal cancer (CRC) using tissue microarray technology.METHODS The expressions of TGF-β1, ERK1/2, and K-ras in colon cancer cells taken from the specimens of 92 CRC patients (stage I: 16 cases, stage II: 28 cases, stage III: 24 cases, and stage IV: 24 cases) were analyzed using tissue microarray technology and immunohistochemistry, and compared with those of 20 normal colon tissue samples.RESULTS High immunoreactive scores (IRS) of TGF-β1, p-ERK1/2, and K-ras protein in CRC were obtained, which were 66.3% (61/92), 59.8% (55/92), and 48.9% (45/92), respectively, and those in normal epithelial cells of colon were 10% (2/20), 20% (4/20), and 30% (6/20), respectively (P0.05).CONCLUSION High level expressions of TGF-β1 and ERK1/2 are closely related to the clinical stages of colon cancer and crosstalk may exist between the 2 signal pathways.
- Published
- 2011
- Full Text
- View/download PDF
3. Using data visualization technique to detect sensitive information re-identification problem of real open dataset
- Author
-
Chiun-How Kao, Yu-Ting Kuang, Chuan-Kai Yang, Yu-Feng Chu, and Chih-Hung Hsieh
- Subjects
business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Data science ,Visualization ,Information sensitivity ,Open data ,Data visualization ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Data mining ,business ,Personally identifiable information ,computer ,Software ,Record linkage ,Vulnerability (computing) - Abstract
With plenty valuable information, open data are often deemed as great assets to academia or industry. In spite of some de-identification processing that most of data owners will perform before releasing the data, the more datasets are opened to public, the more likely personal privacy will be exposed. According to previous real case studies, even though the personally identifiable information has been de-identified, sensitive personal information could still be uncovered by heterogeneous or cross-domain data joining operations. The involved privacy re-identification processes are usually too complicated or obscure to be realized by data owners, not to mention that this problem will be more severe as the scale of data will get larger and larger. For preventing the leakage of sensitive information, this paper shows how to use a novel visualization analysis tool for open data de-identification (ODD Visualizer) to verify whether there exists sensitive information leakage problem in the target datasets. The high effectiveness that the ODD Visualizer can provide mainly comes from implementing a scalable computing platform as well as developing an efficient data visualization technique. Our demonstrations show that the ODD Visualizer can indeed uncover real vulnerability of record linkage attacks among open datasets available on the Internet.
- Published
- 2017
- Full Text
- View/download PDF
4. Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
- Author
-
Chih-Hung Hsieh, Kuo-Chan Lee, Ching-Hao Mao, Yu-Ting Kuang, Jyun-Han Dai, and Li-Jia Wei
- Subjects
Service (systems architecture) ,Focus (computing) ,Computer science ,Event (computing) ,Timeline ,Computational intelligence ,02 engineering and technology ,Information security ,computer.software_genre ,Theoretical Computer Science ,World Wide Web ,Threat intelligence ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Geometry and Topology ,Web service ,Set (psychology) ,computer ,Software - Abstract
Recognition of cyber threats from open threat intelligence can give advantages to incident response in very early stage. Previous related studies mostly focus on finding general hot terms instead of specific continuously changing targets; as a result, usage of these methods may be limited when given specific theme as default. To our best knowledge so far, the proposed Sec-Buzzer is the first web-based service not only finding the various emerging topics of cyber threats and its corresponding annotations (i.e., nearly zero-day attacks) but also providing the possible remedy solutions. Unlike previous works, Sec-Buzzer leverages different kinds of open source, Twitter and domain-specific blogs, and benefits a lot from the community-oriented filtering strategy as well as novel topic-association graph. Therefore, a set of highly contributing Twitter users will be grouped and scored as an expert community, and information from that will be explored then efficiently exploited. Demonstrations show that, by combining several measurements to quantify significances of experts and terms, Sec-Buzzer indeed uncovers unseen valuable domain experts to be information providers, as well as identifies emerging (or suddenly appearing) topics which are highly related to real security events happened recently.
- Published
- 2016
- Full Text
- View/download PDF
5. MITC Viz: Visual Analytics for Man-in-the-Cloud Threats Awareness
- Author
-
Jyun-Han Dai, Yu-Ting Kuang, Lai Chi-Ping, Chiun-How Kao, Ru Ko, and Ching-Hao Mao
- Subjects
Visual analytics ,Exploit ,business.industry ,Computer science ,Software as a service ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Data visualization ,Workflow ,Analytics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,File synchronization ,computer - Abstract
Several common file synchronization services (such as GoogleDrive, Dropbox and so on) are employed as infrastructure for being used by command and control(C&C) and data exfiltration, saying Man-in-the-Cloud (MITC) attacks. MITC is not easily detected by common security measures result in without using any exploits, and re-configuration of these services can easily turn them into an attack tool. In this study, we propose Interactive Visualization Threats Explorer that can be with intuition to aware the potential cloud threats hiding in data and eventually improve the analyzing effectiveness significantly. Drill-down and quick response visualization analytics provides cloud administrators full and deep views between cloud resources and users behavior. In addition, Collaborative Risk Estimator which considers users social and business workflow behavior enhance analysis performance. By learning from past behavior of an individual user and social network relations, rolling up behavior models to continue adapt enterprise environment changes. Analyst can quickly aware high risk access behavior locality from abnormal cloud resource access and drill-down the unusual patterns and access behavior. To illustrate the effectiveness of this approach, we present example explorations on two real-world data sets for the detection and understanding of potential Advanced Persistent Threats in progress.
- Published
- 2016
- Full Text
- View/download PDF
6. Using Data Visualization Technique to Detect Sensitive Information Re-Identification Problem of Real Open Dataset
- Author
-
Chiun-How Kao, Yu-Ting Kuang, Chih-Hung Hsieh, and Yu-Feng Chu
- Subjects
Information privacy ,business.industry ,Computer science ,05 social sciences ,computer.software_genre ,01 natural sciences ,Data science ,Visualization ,010104 statistics & probability ,Open data ,Information sensitivity ,Data visualization ,0502 economics and business ,The Internet ,Data mining ,0101 mathematics ,business ,Personally identifiable information ,computer ,050205 econometrics ,Vulnerability (computing) - Abstract
Opening data of plenty valuable information as public dataset provides great potential treasure to academy or industry. Despite of de-identification process that most of data owner will take before releasing those data, however, the more datasets are opened to public, the more likely personal privacy exposed will be. Previous studies have shown that personal identity and sensitive information might be re-identified by joining two or more de-identified data table with common attributes. According to previous real case studies, even though the personally identifiable information have been de-identified, sensitive personal information still could be uncovered by heterogeneous or cross-domain data joining operation. This kind of privacy re-identification are usually too complicated or obscure to be realized by data owner, not to mention that this problem will be more severe as the scale of data goes large. For the purpose of preventing damage of sensitive information leakage, this paper shows how to use a novel open data de-identification visualization analysis tool (ODD Visualizer) to verify whether there exists sensitive information leakage problem in the target datasets. The high effectiveness, that ODD Visualizer can provide, mainly comes from implementing scalable computing platform as well as developing efficient data visualization technique. Demonstration proves that ODD Visualizer indeed uncovered one real vulnerability of record linkage attack among open datasets available on the internet.
- Published
- 2016
- Full Text
- View/download PDF
7. Prognostic role of YB-1 expression in breast cancer: a meta-analysis
- Author
-
Xu, Wang, Xiao-Bo, Guo, Xiao-Chun, Shen, Hao, Zhou, Dan-Wei, Wan, Xiao-Feng, Xue, Ye, Han, Bin, Yuan, Jin, Zhou, Hong, Zhao, Qiao-Ming, Zhi, and Yu-Ting, Kuang
- Subjects
Original Article - Abstract
Objective: In published studies, Y-box binding protein-1 (YB-1) correlated with the prognosis of patients with breast cancer (BC), but the specific role of YB-1 is still unclear. Our study aimed to evaluate the prognostic value of YB-1 in BC patients using meta-analysis based on the published studies. Methods: We searched the relevant literatures deadline for June 2014 in databases, including PubMed, Embase, Medline and Cochrane library, and finally 8 studies were included in our study. Our study contained 1094 BC patients with 398 YB-1 positive and 696 YB-1 negative. Results: Our results showed that YB-1 abnormal expression did not correlated with the lymph node status [OR = 1.258, 95% CI = 0.895-1.769, P = 0.186], high histological grade [OR = 2.709, 95% CI = 0.861-8.530, P = 0.089], histological type [OR = 0.837, 95% CI = 0.526-1.331, P = 0.452], P53 status [OR = 2.006, 95% CI 0.686-5.865, P = 0.203] and PR [OR = 0.607, 95% CI = 0.347-1.061, P = 0.080] in BC patients. But YB-1 over-expression was associated with other unfavorable factors: ER negativity [OR = 0.604, 95% CI = 0.388-0.941, P = 0.026], HER2 positivity [OR = 3.841, 95% CI = 2.637-5.594, P = 0.000], and high tumorous T stage [OR = 2.169, 95% CI = 1.295-3.632, P = 0.003]. In addition, our data suggested that high YB-1 expression had an adverse impact on 5-year OS [RR = 2.767, 95% CI = 2.054-3.727, P = 0.000] in BC patients. Conclusions: Our findings implied that YB-1 might a novel biomarker to predict the prognosis of BC, and could be a potential direction for developing diagnostic and therapeutic approaches in BC.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.