Stress has been considered as a major risk factor for depressive disorders,triggering depression onset via inducing persistent dysfunctions in specialized brain regions and neural circuits.Among various regions across...Stress has been considered as a major risk factor for depressive disorders,triggering depression onset via inducing persistent dysfunctions in specialized brain regions and neural circuits.Among various regions across the brain,the lateral habenula(LHb)serves as a critical hub for processing aversive information during the dynamic process of stress accumulation,thus having been implicated in the pathogenesis of depression.LHb neurons integrate aversive valence conveyed by distinct upstream inputs,many of which selectively innervate the medial part(LHbM)or lateral part(LHbL)of LHb.LHb subregions also separately assign aversive valence via dissociable projections to the downstream targets in the midbrain which provides feedback loops.Despite these strides,the spatiotemporal dynamics of LHb-centric neural circuits remain elusive during the progression of depression-like state under stress.In this review,we attempt to describe a framework in which LHb orchestrates aversive valence via the input-output specific neuronal architecture.Notably,a physiological form of Hebbian plasticity in LHb under multiple stressors has been unveiled to incubate neuronal hyperactivity in an input-specific manner,which causally encodes chronic stress experience and drives depression onset.Collectively,the recent progress and future efforts in elucidating LHb circuits shed light on early interventions and circuit-specific antidepressant therapies.展开更多
In age-related cognitive deficits and Alzheimer's disease (AD), one of the most common pathological changes appears to be the loss of cholinergic neurons in the forebrain and the depletion of cortical cholinergic a...In age-related cognitive deficits and Alzheimer's disease (AD), one of the most common pathological changes appears to be the loss of cholinergic neurons in the forebrain and the depletion of cortical cholinergic axons [1]. Accordingly, attempts have been made to generate therapies that aim to reverse the cognitive deficits associated with AD and aging by direct stimulation of mAChRs with specific agonists.展开更多
Cloud data sharing service,which allows a group of people to access and modify the shared data,is one of the most popular and efficient working styles in enterprises.Recently,there is an uprising trend that enterprise...Cloud data sharing service,which allows a group of people to access and modify the shared data,is one of the most popular and efficient working styles in enterprises.Recently,there is an uprising trend that enterprises tend to move their IT service from local to cloud to ease the management and reduce the cost.Under the new cloud environment,the cloud users require the data integrity verification to inspect the data service at the cloud side.Several recent studies have focused on this application scenario.In these studies,each user within a group is required to sign a data block created or modified by him.While a user is revoked,all the data previously signed by him should be resigned.In the existing research,the resigning process is dependent on the revoked user.However,cloud users are autonomous.They may exit the system at any time without notifying the system admin and even are revoked due to misbehaviors.As the developers in the cloud-based software development platform,they are voluntary and not strictly controlled by the system.Due to this feature,cloud users may not always follow the cloud service protocol.They may not participate in generating the resigning key and may even expose their secret keys after being revoked.If the signature is not resigned in time,the subsequent verification will be affected.And if the secret key is exposed,the shared data will be maliciously modified by the attacker who grasps the key.Therefore,forcing a revoked user to participate in the revocation process will lead to efficiency and security problems.As a result,designing a practical and efficient integrity verification scheme that supports this scenario is highly desirable.In this paper,we identify this challenging problem as the asynchronous revocation,in which the revocation operations(i.e.,re-signing key generation and resigning process)and the user's revocation are asynchronous.All the revocation operations must be able to be performed without the participation of the revoked user.Even more ambitiously,the revocation process should not rely on any special entity,such as the data owner or a trusted agency.To address this problem,we propose a novel public data integrity verification mechanism in which the data blocks signed by the revoked user will be resigned by another valid user.From the perspectives of security and practicality,the revoked user does not participate in the resigning process and the re-signing key generation.Our scheme allows anyone in the cloud computing system to act as the verifier to publicly and efficiently verify the integrity of the shared data using Homomorphic Verifiable Tags(HVTs).Moreover,the proposed scheme resists the collusion attack between the cloud server and the malicious revoked users.The numerical analysis and experimental results further validate the high efficiency and scalability of the proposed scheme.The experimental results manifest that re-signing 10,000 data blocks only takes 3.815 s and a user can finish the verification in 300 ms with a 99% error detection probability.展开更多
Dear Editor,Manipulating neuronal activities by exogenous means is always much desired in the field of neuroscience and beyond.Though many optogenetics and chemogenetics tools,such as channelrhodopsins and DREADDs(Arm...Dear Editor,Manipulating neuronal activities by exogenous means is always much desired in the field of neuroscience and beyond.Though many optogenetics and chemogenetics tools,such as channelrhodopsins and DREADDs(Armbruster et al.,2007;Sternson and Roth,2014),have been developed and widely used,there are several limitations in these tools.For optogenetics,the invasiveness of implanted optical fiber is unavoidable.展开更多
基金supported by the STI2030-Major Projects(No.2022ZD0211700)the National Natural Science Foundation of China(Nos.32371057,31922031,32071017,81971309,32170980,82201707,and 82200562)+6 种基金the Zhejiang Provincial Natural Science Foundation of China(No.LDQ24C090001)the Non-profit Central Research Institute Fund of Chinese Academy of Medical Sciences(No.2023PT310-01)the CAS Youth Interdisciplinary Team(No.JCTD2022-11)the China Postdoctoral Science Foundation(No.BX20230319)the Guangdong Basic and Applied Basic Research Foundation(Nos.2022B1515020012 and 2021A1515110121)the Science and Technology Planning Project of Guangdong Province(No.2023B1212060018)the Shenzhen Fundamental Research Program(Nos.JCYJ20210324123212035,RCYX20200714114644167,ZDSYS20220606100801003,JCYJ20210324122809025,and JCYJ20230807110315031),China。
文摘Stress has been considered as a major risk factor for depressive disorders,triggering depression onset via inducing persistent dysfunctions in specialized brain regions and neural circuits.Among various regions across the brain,the lateral habenula(LHb)serves as a critical hub for processing aversive information during the dynamic process of stress accumulation,thus having been implicated in the pathogenesis of depression.LHb neurons integrate aversive valence conveyed by distinct upstream inputs,many of which selectively innervate the medial part(LHbM)or lateral part(LHbL)of LHb.LHb subregions also separately assign aversive valence via dissociable projections to the downstream targets in the midbrain which provides feedback loops.Despite these strides,the spatiotemporal dynamics of LHb-centric neural circuits remain elusive during the progression of depression-like state under stress.In this review,we attempt to describe a framework in which LHb orchestrates aversive valence via the input-output specific neuronal architecture.Notably,a physiological form of Hebbian plasticity in LHb under multiple stressors has been unveiled to incubate neuronal hyperactivity in an input-specific manner,which causally encodes chronic stress experience and drives depression onset.Collectively,the recent progress and future efforts in elucidating LHb circuits shed light on early interventions and circuit-specific antidepressant therapies.
基金This research was supported by the National Basic Research Program of China (973 Program) (NO2003CB716605) from the Ministry of Science and Technology, National Natural Science Foundation of China (NO30670682, NO30640068), and grants from Shanghai Science and Technology Commission (05DJ14007, 06DZ19003).
文摘In age-related cognitive deficits and Alzheimer's disease (AD), one of the most common pathological changes appears to be the loss of cholinergic neurons in the forebrain and the depletion of cortical cholinergic axons [1]. Accordingly, attempts have been made to generate therapies that aim to reverse the cognitive deficits associated with AD and aging by direct stimulation of mAChRs with specific agonists.
基金partially supported by National Key Research and Development Project No.2020YFC1522602National Natural Science Foundation of China Nos.62072349,U1811263,61572378+5 种基金Technological Innovation Major Program of Hubei Province No.2019AAA072Tarim University President Fund Doctoral Foundation Research Project No.19/1117596Xinjiang Regional Innovation Guidance Project No.2017DB004Basic and Advanced Research Projects of CSTC No.cstc2019jcyj-zdxm0102Chongqing Science and Technology Innovation Leading Talent Support Program No.CSTCCXLJRC201908Science and Technology Research Program of Chongqing Municipal Education Commission No.KJZD-K201900605.
文摘Cloud data sharing service,which allows a group of people to access and modify the shared data,is one of the most popular and efficient working styles in enterprises.Recently,there is an uprising trend that enterprises tend to move their IT service from local to cloud to ease the management and reduce the cost.Under the new cloud environment,the cloud users require the data integrity verification to inspect the data service at the cloud side.Several recent studies have focused on this application scenario.In these studies,each user within a group is required to sign a data block created or modified by him.While a user is revoked,all the data previously signed by him should be resigned.In the existing research,the resigning process is dependent on the revoked user.However,cloud users are autonomous.They may exit the system at any time without notifying the system admin and even are revoked due to misbehaviors.As the developers in the cloud-based software development platform,they are voluntary and not strictly controlled by the system.Due to this feature,cloud users may not always follow the cloud service protocol.They may not participate in generating the resigning key and may even expose their secret keys after being revoked.If the signature is not resigned in time,the subsequent verification will be affected.And if the secret key is exposed,the shared data will be maliciously modified by the attacker who grasps the key.Therefore,forcing a revoked user to participate in the revocation process will lead to efficiency and security problems.As a result,designing a practical and efficient integrity verification scheme that supports this scenario is highly desirable.In this paper,we identify this challenging problem as the asynchronous revocation,in which the revocation operations(i.e.,re-signing key generation and resigning process)and the user's revocation are asynchronous.All the revocation operations must be able to be performed without the participation of the revoked user.Even more ambitiously,the revocation process should not rely on any special entity,such as the data owner or a trusted agency.To address this problem,we propose a novel public data integrity verification mechanism in which the data blocks signed by the revoked user will be resigned by another valid user.From the perspectives of security and practicality,the revoked user does not participate in the resigning process and the re-signing key generation.Our scheme allows anyone in the cloud computing system to act as the verifier to publicly and efficiently verify the integrity of the shared data using Homomorphic Verifiable Tags(HVTs).Moreover,the proposed scheme resists the collusion attack between the cloud server and the malicious revoked users.The numerical analysis and experimental results further validate the high efficiency and scalability of the proposed scheme.The experimental results manifest that re-signing 10,000 data blocks only takes 3.815 s and a user can finish the verification in 300 ms with a 99% error detection probability.
基金supported by funding from the National Natural Science Foundation of China(32122040 and 31971040 to F.Y.32071017 and 31922031 to Y.C.)+6 种基金Zhejiang Provincial Natural Science Foundation of China(LR20C050002 to F.Y.)China Postdoctoral Program for Innovative Talents(BX20230323 to H.Z.)China Postdoctoral Science Foundation(2024M752858 to H.Z.)The Fundamental Research Funds for the Central Universities(226-2022-00227 to F.Y.226-2022-00149 to Y.C.)Shenzhen-Hong Kong Institute of Brain Science-Shenzhen Fundamental Research Institutions(NYKFKT2019001 to Y.C.)The Fundamental Research Funds for the Central Universities(226-2022-00227 to F.Y.)。
文摘Dear Editor,Manipulating neuronal activities by exogenous means is always much desired in the field of neuroscience and beyond.Though many optogenetics and chemogenetics tools,such as channelrhodopsins and DREADDs(Armbruster et al.,2007;Sternson and Roth,2014),have been developed and widely used,there are several limitations in these tools.For optogenetics,the invasiveness of implanted optical fiber is unavoidable.