期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Input-output specific orchestration of aversive valence in lateral habenula during stress dynamics
1
作者 Taida HUANG Xiaonan GUO +3 位作者 Xiaomin HUANG Chenju YI yihui cui Yiyan DONG 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 CSCD 2024年第12期1055-1065,共11页
Stress has been considered as a major risk factor for depressive disorders,triggering depression onset via inducing persistent dysfunctions in specialized brain regions and neural circuits.Among various regions across... Stress has been considered as a major risk factor for depressive disorders,triggering depression onset via inducing persistent dysfunctions in specialized brain regions and neural circuits.Among various regions across the brain,the lateral habenula(LHb)serves as a critical hub for processing aversive information during the dynamic process of stress accumulation,thus having been implicated in the pathogenesis of depression.LHb neurons integrate aversive valence conveyed by distinct upstream inputs,many of which selectively innervate the medial part(LHbM)or lateral part(LHbL)of LHb.LHb subregions also separately assign aversive valence via dissociable projections to the downstream targets in the midbrain which provides feedback loops.Despite these strides,the spatiotemporal dynamics of LHb-centric neural circuits remain elusive during the progression of depression-like state under stress.In this review,we attempt to describe a framework in which LHb orchestrates aversive valence via the input-output specific neuronal architecture.Notably,a physiological form of Hebbian plasticity in LHb under multiple stressors has been unveiled to incubate neuronal hyperactivity in an input-specific manner,which causally encodes chronic stress experience and drives depression onset.Collectively,the recent progress and future efforts in elucidating LHb circuits shed light on early interventions and circuit-specific antidepressant therapies. 展开更多
关键词 Lateral habenula Neural circuits AVERSION Stress dynamics Depression-like state Head-to-head comparison
原文传递
Enhancement of memory function in aged mice by a novel derivative of xanomeline 被引量:3
2
作者 yihui cui Dong Wang +5 位作者 Wen Si Wen Lv Yan Niu Xiaoping Lei Yinhe Hu Xiaohua Cao 《Cell Research》 SCIE CAS CSCD 2008年第11期1151-1153,共3页
In age-related cognitive deficits and Alzheimer's disease (AD), one of the most common pathological changes appears to be the loss of cholinergic neurons in the forebrain and the depletion of cortical cholinergic a... In age-related cognitive deficits and Alzheimer's disease (AD), one of the most common pathological changes appears to be the loss of cholinergic neurons in the forebrain and the depletion of cortical cholinergic axons [1]. Accordingly, attempts have been made to generate therapies that aim to reverse the cognitive deficits associated with AD and aging by direct stimulation of mAChRs with specific agonists. 展开更多
关键词 细胞 衰老 死亡 研究
在线阅读 下载PDF
Public integrity verification for data sharing in cloud with asynchronous revocation
3
作者 Wei Song Yu Wu +5 位作者 yihui cui Qilie Liu Yuan Shen Zicheng Qiu Jianjun Yao Zhiyong Peng 《Digital Communications and Networks》 SCIE CSCD 2022年第1期33-43,共11页
Cloud data sharing service,which allows a group of people to access and modify the shared data,is one of the most popular and efficient working styles in enterprises.Recently,there is an uprising trend that enterprise... Cloud data sharing service,which allows a group of people to access and modify the shared data,is one of the most popular and efficient working styles in enterprises.Recently,there is an uprising trend that enterprises tend to move their IT service from local to cloud to ease the management and reduce the cost.Under the new cloud environment,the cloud users require the data integrity verification to inspect the data service at the cloud side.Several recent studies have focused on this application scenario.In these studies,each user within a group is required to sign a data block created or modified by him.While a user is revoked,all the data previously signed by him should be resigned.In the existing research,the resigning process is dependent on the revoked user.However,cloud users are autonomous.They may exit the system at any time without notifying the system admin and even are revoked due to misbehaviors.As the developers in the cloud-based software development platform,they are voluntary and not strictly controlled by the system.Due to this feature,cloud users may not always follow the cloud service protocol.They may not participate in generating the resigning key and may even expose their secret keys after being revoked.If the signature is not resigned in time,the subsequent verification will be affected.And if the secret key is exposed,the shared data will be maliciously modified by the attacker who grasps the key.Therefore,forcing a revoked user to participate in the revocation process will lead to efficiency and security problems.As a result,designing a practical and efficient integrity verification scheme that supports this scenario is highly desirable.In this paper,we identify this challenging problem as the asynchronous revocation,in which the revocation operations(i.e.,re-signing key generation and resigning process)and the user's revocation are asynchronous.All the revocation operations must be able to be performed without the participation of the revoked user.Even more ambitiously,the revocation process should not rely on any special entity,such as the data owner or a trusted agency.To address this problem,we propose a novel public data integrity verification mechanism in which the data blocks signed by the revoked user will be resigned by another valid user.From the perspectives of security and practicality,the revoked user does not participate in the resigning process and the re-signing key generation.Our scheme allows anyone in the cloud computing system to act as the verifier to publicly and efficiently verify the integrity of the shared data using Homomorphic Verifiable Tags(HVTs).Moreover,the proposed scheme resists the collusion attack between the cloud server and the malicious revoked users.The numerical analysis and experimental results further validate the high efficiency and scalability of the proposed scheme.The experimental results manifest that re-signing 10,000 data blocks only takes 3.815 s and a user can finish the verification in 300 ms with a 99% error detection probability. 展开更多
关键词 Cloud storage Integrity verification Asynchronous revocation
在线阅读 下载PDF
RADICAL:a rationally designed ion channel activated by ligand for chemogenetics
4
作者 Heng Zhang Zhiwei Zheng +5 位作者 Xiaoying Chen Lizhen Xu Chen Guo Jiawei Wang yihui cui Fan Yang 《Protein & Cell》 2025年第2期136-142,共7页
Dear Editor,Manipulating neuronal activities by exogenous means is always much desired in the field of neuroscience and beyond.Though many optogenetics and chemogenetics tools,such as channelrhodopsins and DREADDs(Arm... Dear Editor,Manipulating neuronal activities by exogenous means is always much desired in the field of neuroscience and beyond.Though many optogenetics and chemogenetics tools,such as channelrhodopsins and DREADDs(Armbruster et al.,2007;Sternson and Roth,2014),have been developed and widely used,there are several limitations in these tools.For optogenetics,the invasiveness of implanted optical fiber is unavoidable. 展开更多
关键词 RATIONAL CHANNEL LIMITATIONS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部