Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    REVIEW

    Research Progress in Immunotherapy of NSCLC With EGFR-Sensitive Mutations

    Yudie Yang*1, Xia Zhang†1, Yajie Gao*, Yan Dong*, Di Wang*, Yanping Huang*, Tianhao Qu*, Buqun Fan*, Qizheng Li*, Chunxia Zhang*, Xiaonan Cui*, Bin Zhang*

    Oncology Research, Vol.29, No.1, pp. 63-74, 2021, DOI:10.3727/096504022X16462176651719

    Abstract Lung cancer is a malignant tumor with high incidence and mortality across the world. The use of immune checkpoint inhibitors for lung cancer has improved the prognosis of some lung cancer patients to a greater extent and provided a new direction for the clinical treatment of lung cancer. Immunotherapy still has limitations in terms of its appropriate population and adverse reactions. Particularly for non-small cell lung cancer (NSCLC) patients with epidermal growth factor receptor (EGFR) mutation, there has been no major breakthrough in current immunotherapy. Whether immunotherapy can bring new benefits after drug resistance is induced by tyrosine kinase inhibitor-targeted… More >

  • Open Access

    ARTICLE

    Comparison of UGT1A1 Polymorphism as Guidance of Irinotecan Dose Escalation in RAS Wild-Type Metastatic Colorectal Cancer Patients Treated With Cetuximab or Bevacizumab Plus FOLFIRI as the First-Line Therapy

    Hsiang-Lin Tsai*†, Yen-Cheng Chen*‡, Tzu-Chieh Yin*§¶, Wei-Chih Su*‡, Po-Jung Chen*,Tsung-Kun Chang*†, Ching-Chun Li*, Ching-Wen Huang*†, Jaw-Yuan Wang*†‡#**††‡‡

    Oncology Research, Vol.29, No.1, pp. 47-61, 2021, DOI:10.3727/096504022X16451187313084

    Abstract Uridine diphosphate glucuronosyltransferase 1A1 (UGT1A1) polymorphism plays a crucial role in the increased susceptibility and toxicity of patients to irinotecan. This retrospective, observational study compared the clinical outcomes and adverse events (AEs) in RAS wild-type metastatic colorectal cancer (mCRC) patients treated with cetuximab or bevacizumab plus FOLFIRI with UGT1A1 genotyping and irinotecan dose escalation as the first-line therapy. In total, 173 patients with mCRC with RAS wild-type were enrolled. Among them, 98 patients were treated with cetuximab, whereas 75 patients were treated with bevacizumab. All patients received irinotecan dose escalation based on UGT1A1 genotyping. We compared the progression-free survival (PFS),… More >

  • Open Access

    ARTICLE

    Lactate Maintains BCR/Abl Expression and Signaling in Chronic Myeloid Leukemia Cells Under Nutrient Restriction

    Angela Silvano*†1, Giulio Menegazzi*1, Silvia Peppicelli*1, Caterina Mancini*, Alessio Biagioni*, Alessandro Tubita*, Ignazia Tusa*, Jessica Ruzzolini*, Matteo Lulli*, Elisabetta Rovida*, Persio Dello Sbarba*

    Oncology Research, Vol.29, No.1, pp. 33-46, 2021, DOI:10.3727/096504022X16442289212164

    Abstract This study was directed to deepen the effects of nutrient shortage on BCR/Ablprotein expression and signaling in chronic myeloid leukemia (CML) cells. The backbone of the study was cell culture in medium lacking glucose, the consumption of which we had previously shown to drive BCR/Ablprotein suppression, and glutamine, the other main nutrient besides glucose. In this context, we focused on the role of lactate, the main by-product of glucose metabolism under conditions of rapid cell growth, in particular as a modulator of the maintenance of CML stem/progenitor cell potential, a crucial determinant of disease course and relapse of disease. The… More >

  • Open Access

    ARTICLE

    Real-World Data: Fruquintinib in Treating Metastatic Colorectal Cancer

    Shuai Liu*†1, Lu Lu*†1, Feng Pan, Chunsheng Yang*†, Jing Liang§, Jinfeng Liu, Jian Wang#, Rong Shen**, Fu-Ze Xin††, Nan Zhang*†

    Oncology Research, Vol.29, No.1, pp. 25-31, 2021, DOI:10.3727/096504022X16427607626672

    Abstract Fruquintinib, also called HMPL-013, was first discovered by Hutchison Whampoa Pharmaceuticals Co. Ltd., Shanghai, China, and it is an oral vascular endothelial growth factor receptor (VEGFR) inhibitor. In clinical trials, fruquintinib has demonstrated a survival benefit in metastatic colorectal cancer (mCRC) patients. The purpose of this study was to retrospectively evaluate the efficacy and toxicity of fruquintinib in real-world patients. We collected data from patients with mCRC treated with oral fruquintinib from 2018 to 2020 in six different institutions. Patients with mCRC initially received 5 mg of oral fruquintinib daily for 3 weeks. Progression-free survival (PFS) was evaluated using the… More >

  • Open Access

    ARTICLE

    STAT3 Polymorphism Associates With mTOR Inhibitor-Induced Interstitial Lung Disease in Patients With Renal Cell Carcinoma

    Kazuhiro Yamamoto*, Takeshi Ioroi*, Kazuaki Shinomiya, Ayaka Yoshida*, Kenichi Harada, Masato Fujisawa, Tomohiro Omura*, Yasuaki Ikemi§, Shunsaku Nakagawa§, Atsushi Yonezawa§, Osamu Ogawa, Kazuo Matsubara§, Takuya Iwamoto#, Kohei Nishikawa**, Sayaka Hayashi††, Daichi Tohara††, Yoji Murakami‡‡, Takanobu Motoshima‡‡, Hirofumi Jono††, Ikuko Yano

    Oncology Research, Vol.29, No.1, pp. 11-23, 2021, DOI:10.3727/096504022X16418911579334

    Abstract We evaluated the association of signal transducer and activator of transcription 3 (STAT3) polymorphisms with the incidence of mammalian target of rapamycin (mTOR) inhibitor-induced interstitial lung disease (ILD) in patients with renal cell carcinoma (RCC). We also used lung-derived cell lines to investigate the mechanisms of this association. Japanese patients with metastatic RCC who were treated with mTOR inhibitors were genotyped for the STAT3 polymorphism, rs4796793 (−1697C/G). We evaluated the association of the STAT3 genotype with the incidence of ILD and therapeutic outcome. In the 57 patients included in the primary analysis, the ILD rate within 140 days was significantly… More >

  • Open Access

    ARTICLE

    MYCN Directly Targets NeuroD1 to Promote Cellular Proliferation in Neuroblastoma

    Fangjin Lu*, Bin Mu, Ge Jin*, Lin Zhu, Ping Mu§

    Oncology Research, Vol.29, No.1, pp. 1-10, 2021, DOI:10.3727/096504021X16401852341873

    Abstract NeuroD1 is a neuronal differentiation factor that contains a basic helix–loop–helix (bHLH) motif. Recently, NeuroD1 was found to be associated with tumorigenesis in neuroblastoma (NB) and is known to promote cell proliferation and migration in these cells. Here we found that MYCN regulates the expression of NeuroD1 in NB cells and that the downregulation of MYCN using short hairpin RNAs (shRNA) results in the inhibition of cellular proliferation in NB cells. Moreover, the phenotype induced by MYCN shRNA was rescued by the exogenous expression of NeuroD1. Chromatin immunoprecipitation (ChIP) assay showed that MYCN directly binds to the E-box element in… More >

  • Open Access

    ARTICLE

    Conceptual Modeling and Simulation Application Analysis of In-service Assessment

    Jian-Hua Luo1, Xi Chen1,*, Hua Li1, Yu-Hang Zhou1, Jing-Wen Li2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 53-60, 2022, DOI:10.32604/jihpp.2022.032109

    Abstract Firstly, this paper expounds the conceptual connotation of in-service assessment in the new system, then applies modeling and Simulation in the field of in-service assessment, establishes the conceptual model of in-service assessment and its process, and finally analyzes the application of modeling and simulation in the specific links of in-service assessment. More >

  • Open Access

    ARTICLE

    A Survey of Anti-forensic for Face Image Forgery

    Haitao Zhang*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 41-51, 2022, DOI:10.32604/jihpp.2022.031707

    Abstract Deep learning related technologies, especially generative adversarial network, are widely used in the fields of face image tampering and forgery. Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery, especially face images, but there is still a lack of overview of anti-forensic methods at this stage. Therefore, this paper will systematically discuss the anti-forensic methods for face image tampering and forgery. Firstly, this paper expounds the relevant background, including the relevant tampering and forgery methods and forensic schemes of face images. The former mainly includes four aspects: conventional processing, fake face… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Using a Distributed Ensemble Design Based Convolutional Neural Network in Fog Computing

    Aiming Wu1, Shanshan Tu1,*, Muhammad Wagas1,2,3, Yongjie Yang1, Yihe Zhang1, Xuetao Bai1

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 25-39, 2022, DOI:10.32604/jihpp.2022.029922

    Abstract With the rapid development of the Internet of Things (IoT), all kinds of data are increasing exponentially. Data storage and computing on cloud servers are increasingly restricted by hardware. This has prompted the development of fog computing. Fog computing is to place the calculation and storage of data at the edge of the network, so that the entire Internet of Things system can run more efficiently. The main function of fog computing is to reduce the burden of cloud servers. By placing fog nodes in the IoT network, the data in the IoT devices can be transferred to the fog… More >

  • Open Access

    ARTICLE

    An Overview of Adversarial Attacks and Defenses

    Kai Chen*, Jinwei Wang, Jiawei Zhang

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 15-24, 2022, DOI:10.32604/jihpp.2022.029006

    Abstract In recent years, machine learning has become more and more popular, especially the continuous development of deep learning technology, which has brought great revolutions to many fields. In tasks such as image classification, natural language processing, information hiding, multimedia synthesis, and so on, the performance of deep learning has far exceeded the traditional algorithms. However, researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks, the model is vulnerable to the example which is modified artificially. This technology is called adversarial attacks, while the examples are called adversarial examples.… More >

Displaying 7401-7410 on page 741 of 22212. Per Page