期刊文献+
共找到851篇文章
< 1 2 43 >
每页显示 20 50 100
A survey of backdoor attacks and defenses:From deep neural networks to large language models
1
作者 Ling-Xin Jin Wei Jiang +5 位作者 Xiang-Yu Wen Mei-Yu Lin Jin-Yu Zhan Xing-Zhi Zhou Maregu Assefa Habtie Naoufel Werghi 《Journal of Electronic Science and Technology》 2025年第3期13-35,共23页
Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susce... Deep neural networks(DNNs)have found extensive applications in safety-critical artificial intelligence systems,such as autonomous driving and facial recognition systems.However,recent research has revealed their susceptibility to backdoors maliciously injected by adversaries.This vulnerability arises due to the intricate architecture and opacity of DNNs,resulting in numerous redundant neurons embedded within the models.Adversaries exploit these vulnerabilities to conceal malicious backdoor information within DNNs,thereby causing erroneous outputs and posing substantial threats to the efficacy of DNN-based applications.This article presents a comprehensive survey of backdoor attacks against DNNs and the countermeasure methods employed to mitigate them.Initially,we trace the evolution of the concept from traditional backdoor attacks to backdoor attacks against DNNs,highlighting the feasibility and practicality of generating backdoor attacks against DNNs.Subsequently,we provide an overview of notable works encompassing various attack and defense strategies,facilitating a comparative analysis of their approaches.Through these discussions,we offer constructive insights aimed at refining these techniques.Finally,we extend our research perspective to the domain of large language models(LLMs)and synthesize the characteristics and developmental trends of backdoor attacks and defense methods targeting LLMs.Through a systematic review of existing studies on backdoor vulnerabilities in LLMs,we identify critical open challenges in this field and propose actionable directions for future research. 展开更多
关键词 Backdoor Attacks Backdoor defenses Deep neural networks Large language model
在线阅读 下载PDF
Caterpillar feeding drives patterns of induced defenses and herbivore resistance in wild Pinus tabuliformis
2
作者 Tianhua Sun Guona Zhou +4 位作者 Yanan Zhao Suhong Gao Jie Liu Junxia Liu Baojia Gao 《Journal of Forestry Research》 2025年第1期391-411,共21页
The defense mechanisms induced in wild Chinese pine(Pinus tabuliformis)in response to herbivores are not well characterized,especially in the field.To address this knowledge gap,we established a biological model syste... The defense mechanisms induced in wild Chinese pine(Pinus tabuliformis)in response to herbivores are not well characterized,especially in the field.To address this knowledge gap,we established a biological model system to evaluate proteome variations in pine needles after feeding by the Chinese pine caterpillar(Dendrolimus tabulaeformis),a major natural enemy and dominant herbivore.Quantitative tandem mass tag(TMT)proteomics and bioinformatics were utilized to systematically identify differentially abundant proteins implicated in the induced defense response of Chinese pine.We validated key protein changes using parallel reaction monitoring(PRM)technology.Pathway analysis revealed that the induced defenses involved phenylpropanoid,coumarin,and flavonoid biosynthesis,among other processes.To elucidate the regulatory patterns underlying pine resistance,we determined the activities of defense enzymes and levels of physiological and biochemical compounds.In addition,the expression of upstream genes for key proteins was validated by qRT-PCR.Our results provide new molecular insights into the induced defense mechanisms in Chinese pine against this caterpillar in the field.A better understanding of these defense strategies will inform efforts to breed more-resistant pine varieties. 展开更多
关键词 Pinus tabuliformis Dendrolimus tabulaeformis PROTEOMICS Induced Defensive responses
在线阅读 下载PDF
Adversarial attacks and defenses for digital communication signals identification 被引量:2
3
作者 Qiao Tian Sicheng Zhang +1 位作者 Shiwen Mao Yun Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第3期756-764,共9页
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ... As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research. 展开更多
关键词 Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators
在线阅读 下载PDF
Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems:Hierarchical Poisoning Attacks and Defenses in Federated Learning
4
作者 Yongsheng Zhu Chong Liu +8 位作者 Chunlei Chen Xiaoting Lyu Zheng Chen Bin Wang Fuqiang Hu Hanxi Li Jiao Dai Baigen Cai Wei Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1305-1325,共21页
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning o... The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency.Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data.However,despite its privacy benefits,federated learning systems are vulnerable to poisoning attacks,where adversaries alter local model parameters on compromised clients and send malicious updates to the server,potentially compromising the global model’s accuracy.In this study,we introduce PMM(Perturbation coefficient Multiplied by Maximum value),a new poisoning attack method that perturbs model updates layer by layer,demonstrating the threat of poisoning attacks faced by federated learning.Extensive experiments across three distinct datasets have demonstrated PMM’s ability to significantly reduce the global model’s accuracy.Additionally,we propose an effective defense method,namely CLBL(Cluster Layer By Layer).Experiment results on three datasets have confirmed CLBL’s effectiveness. 展开更多
关键词 PRIVACY-PRESERVING intelligent railway transportation system federated learning poisoning attacks defenses
在线阅读 下载PDF
Plant Chemical Defenses against Insect Herbivores—Using theWild Tobacco as a Model
5
作者 Guangwei Sun Xuanhao Zhang +4 位作者 Yi Liu Liguang Chai Daisong Liu Zhenguo Chen Shiyou Lü 《Phyton-International Journal of Experimental Botany》 SCIE 2024年第4期641-659,共19页
The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has develope... The Nicotiana genus, commonly known as tobacco, holds significant importance as a crucial economic crop. Confrontedwith an abundance of herbivorous insects that pose a substantial threat to yield, tobacco has developed adiverse and sophisticated array of mechanisms, establishing itself as a model of plant ecological defense. Thisreview provides a concise overview of the current understanding of tobacco’s defense strategies against herbivores.Direct defenses, exemplified by its well-known tactic of secreting the alkaloid nicotine, serve as a potent toxinagainst a broad spectrum of herbivorous pests. Moreover, in response to herbivore attacks, tobacco enhancesthe discharge of volatile compounds, harnessing an indirect strategy that attracts the predators of the herbivores.The delicate balance between defense and growth leads to the initiation of most defense strategies only after aherbivore attack. Among plant hormones, notably jasmonic acid (JA), play central roles in coordinating thesedefense processes. JA signaling interacts with other plant hormone signaling pathways to facilitate the extensivetranscriptional and metabolic adjustments in plants following herbivore assault. By shedding light on these ecologicaldefense strategies, this review emphasizes not only tobacco’s remarkable adaptability in its natural habitatbut also offers insights beneficial for enhancing the resilience of current crops. 展开更多
关键词 TOBACCO HERBIVORE chemical defense jasmonic acid REGULATION
在线阅读 下载PDF
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review 被引量:30
6
作者 Han Xu Yao Ma +4 位作者 Hao-Chen Liu Debayan Deb Hui Liu Ji-Liang Tang Anil K.Jain 《International Journal of Automation and computing》 EI CSCD 2020年第2期151-178,共28页
Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-... Deep neural networks(DNN)have achieved unprecedented success in numerous machine learning tasks in various domains.However,the existence of adversarial examples raises our concerns in adopting deep learning to safety-critical applications.As a result,we have witnessed increasing interests in studying attack and defense mechanisms for DNN models on different data types,such as images,graphs and text.Thus,it is necessary to provide a systematic and comprehensive overview of the main threats of attacks and the success of corresponding countermeasures.In this survey,we review the state of the art algorithms for generating adversarial examples and the countermeasures against adversarial examples,for three most popular data types,including images,graphs and text. 展开更多
关键词 Adversarial EXAMPLE model safety ROBUSTNESS defenses deep learning
原文传递
Influence of fasting on muscle composition and antioxidant defenses of market-size Sparus macrocephalus 被引量:1
7
作者 ZHANG Xiao-dong WU Tian-xing +1 位作者 CAI Li-sheng ZHU Yong-fei 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2007年第12期906-911,共6页
The study was conducted to investigate fasting effects on flesh composition and antioxidant defenses of market-size Sparus macrocephalus. Two hundred fish (main initial weight 580 g) were divided into two groups (cont... The study was conducted to investigate fasting effects on flesh composition and antioxidant defenses of market-size Sparus macrocephalus. Two hundred fish (main initial weight 580 g) were divided into two groups (control and fasted) and reared in 6 cages. After two weeks of adaptation, group I fasted for 28 d; group II was fed normally as a control. In 3, 7, 14, 21 and 28 d, 6 fish per group were sampled for proximate flesh composition, liver antioxidant enzyme activities and malondialdehyde flesh content analyses. In fasted fish, the reduction of lipid content in muscle occurred after day 3, and, compared to controls, the content of protein decreased from day 14, the activities of liver antioxidative enzymes superoxide dismutase (SOD) and glutathione peroxidase (GPX) increased from day 3, and flesh malondialdehyde levels increased from day 21. Flesh fat reduction shows that fasting may be used as a technique to reduce flesh lipid content in Sparus macrocephalus. However, considering flesh protein loss and the subsequent oxidative stress, the fasting technique should be used with precautions. 展开更多
关键词 Antioxidant defenses FASTING Muscle composition Sparus macrocephalus
在线阅读 下载PDF
Chemical cues from kingsnakes do not cause inducible defenses in house mice
8
作者 W. Wallace STARKE Ⅲ Michael H. FERKIN 《Current Zoology》 SCIE CAS CSCD 2012年第6期797-804,共8页
Abstract Many rodents exhibit inducible defenses when exposed to chemical cues from mammalian predators. These responses may include delays in sexual maturation, smaller adult body size and decreases in litter size an... Abstract Many rodents exhibit inducible defenses when exposed to chemical cues from mammalian predators. These responses may include delays in sexual maturation, smaller adult body size and decreases in litter size and pup weight. We exposed the hybrid juvenile offspring of field-caught and lab-descended house mice Mus musculus to the chemical cues of mouse-fed or chick-fed kingsnakes, Lampropeltis getula, for 20 days after weaning, to examine the effects of ophidian predator cues on prey development. We hypothesized that these cues would elicit inducible defenses such as alteration of growth rates, and/or the timing of reproductive development in mice. Once mature, the reproductive effort of the mice might also be impacted by producing smaller litter sizes or lighter pups or not reproducing at all. We found no effect of kingsnake cues on any of the measures. These findings support the hypothesis that inducible defenses may have evolved as a strategy to deal with specific predators. 展开更多
关键词 Inducible defenses House mice Kingsnakes Chemical cues Growth and development
原文传递
An Overview of Adversarial Attacks and Defenses
9
作者 Kai Chen Jinwei Wang Jiawei Zhang 《Journal of Information Hiding and Privacy Protection》 2022年第1期15-24,共10页
In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classificat... In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many fields.In tasks such as image classification,natural language processing,information hiding,multimedia synthesis,and so on,the performance of deep learning has far exceeded the traditional algorithms.However,researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks,the model is vulnerable to the example which is modified artificially.This technology is called adversarial attacks,while the examples are called adversarial examples.The existence of adversarial attacks poses a great threat to the security of the neural network.Based on the brief introduction of the concept and causes of adversarial example,this paper analyzes the main ideas of adversarial attacks,studies the representative classical adversarial attack methods and the detection and defense methods. 展开更多
关键词 Deep learning adversarial example adversarial attacks adversarial defenses
在线阅读 下载PDF
The Research Mode Concerning with Chinese Enterprises Dynamic Strategic Alliances and Risk Defenses
10
作者 Shoufeng Ji Qingshan Zhang 《Chinese Business Review》 2005年第1期1-5,共5页
China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dy... China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dynamic strategic alliances run successfully. This paper puts forward a mode of risk defenses internal system through analyzing the facts of China enterprises dynamic strategic alliances' creative models. 展开更多
关键词 dynamic strategic alliances risk defenses internal system
在线阅读 下载PDF
Biological Defenses against Ultra-Violet, Visible Light, and Near-Infrared Exposure
11
作者 Yohei Tanaka Hideki Motomura Masafumi Jinno 《Optics and Photonics Journal》 2016年第1期8-14,共7页
Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared expos... Objective: Humans are increasingly exposed to artificial light and electromagnetic wave radiation, in addition to solar radiation. Many studies have shown the biological effects of ultra-violet and near-infrared exposure, but few have extensively investigated the innate biological defenses within human tissues against visible light and near-infrared exposure. Herein, we investigated spectral properties of endogenous human biological defenses against ultra-violet to near-infrared. Methods: A double-beam spectrophotometer (190 - 2700 nm) was used to measure the transmission spectra of a saline solution used to imitate perspiration, and oil to imitate sebum, as well as human skin, blood, adipose tissue, and muscle. Results: Saline (thickness, 0.5 mm) blocked 27.5% - 98.6% of ultra-violet, 13.2% - 34.3% of visible light, and 10.7% - 99.8% of near-infrared. Oil (thickness, 0.5 mm) blocked 50.5% - 100% of ultra-violet, 28.7% - 54.8% of visible light, and 19.0% - 98.3% of near-infrared. Blood thicknesses of 0.05 and 0.5 mm blocked over 97.8%, 100% of ultra-violet, over 94.6%, 99.7% of visible light, and over 75.8%, 99.4% of near-infrared, respectively. Skin thicknesses of 0.25 and 0.5 mm blocked over 99.4%, 100% of ultra-violet and over 94.3%, 99.7% of visible light, and over 74.7%, 93.5% of near-infrared, respectively. Adipose tissue thickness of 0.25 and0.5 mm blocked over 98.3%, 100% of ultra-violet, over 94.7%, 99.7% of visible light, and over 88.1%, 98.6% of near-infrared, respectively. Muscle thickness of 0.25 and0.5 mm blocked over 95.4%, 99.8% of ultra-violet, over 93.1%, 99.5% of visible light, and over 86.9%, 98.3% of near-infrared, respectively. Conclusions: Humans possess endogenous biological protection against ultra-violet, visible light and near-infrared exposure on multiple levels, including through perspiration, sebum, blood, skin, adipose tissue, and muscle. Since solar and artificial radiation affects human tissues, biological defenses made of biological materials may be induced to protect subcutaneous tissues against these wavelengths. 展开更多
关键词 Biological defenses NEAR-INFRARED Ultra-Violet Visible Light
暂未订购
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel 被引量:13
12
作者 Yu Zheng Zheng Li +1 位作者 Xiaolong Xu Qingzhan Zhao 《Digital Communications and Networks》 SCIE CSCD 2022年第4期422-435,共14页
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe... Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security. 展开更多
关键词 Cyber security Dynamic defense Moving target defense Mimic defense
在线阅读 下载PDF
Adversarial Attacks and Defenses in Deep Learning 被引量:22
13
作者 Kui Ren Tianhang Zheng +1 位作者 Zhan Qin Xue Liu 《Engineering》 SCIE EI 2020年第3期346-360,共15页
With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algor... With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the security and robustness of the deployed algorithms.Recently,the security vulnerability of DL algorithms to adversarial samples has been widely recognized.The fabricated samples can lead to various misbehaviors of the DL models while being perceived as benign by humans.Successful implementations of adversarial attacks in real physical-world scenarios further demonstrate their practicality.Hence,adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years.In this paper,we first introduce the theoretical foundations,algorithms,and applications of adversarial attack techniques.We then describe a few research efforts on the defense techniques,which cover the broad frontier in the field.Several open problems and challenges are subsequently discussed,which we hope will provoke further research efforts in this critical area. 展开更多
关键词 Machine learning Deep neural network Adversarial example Adversarial attack Adversarial defense
在线阅读 下载PDF
(E)-Nerolidol is a volatile signal that induces defenses against insects and pathogens in tea plants 被引量:23
14
作者 Shenglong Chen Liping Zhang +6 位作者 Xiaoming Cai Xin Li Lei Bian Zongxiu Luo Zhaoqun Li Zongmao Chen Zhaojun Xin 《Horticulture Research》 SCIE 2020年第1期2152-2166,共15页
Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many ques... Plants release large amounts of volatile organic compounds(VOCs)in response to attackers.Several VOCs can serve as volatile signals to elicit defense responses in undamaged tissues and neighboring plants,but many questions about the ecological functions of VOCs remain unanswered.Tea plants are impacted by two harmful invaders,the piercing herbivore Empoasca(Matsumurasca)onukii Matsuda and the pathogen Colletotrichum fructicola.To determine the VOC signals in tea,we confirmed CsOPR3 as a marker gene and set up a rapid screening method based on a 1.51 kb CsOPR3 promoter fused with aβ-glucuronidase(GUS)reporter construct(OPR3p::GUS)in Arabidopsis.Using this screening system,a terpenoid volatile(E)-nerolidol was identified as a potent signal that elicits plant defenses.The early responses triggered by(E)-nerolidol included the activation of a mitogen-activated protein kinase and WRKY,an H2O2 burst,and the induction of jasmonic acid and abscisic acid signaling.The induced plants accumulated high levels of defenserelated chemicals,which possessed broad-spectrum anti-herbivore or anti-pathogen properties,and ultimately triggered resistance against Empoasca onukii and Colletotrichum fructicola in tea.We propose that these findings can supply an environmentally friendly management strategy for controlling an insect pest and a disease of tea plants. 展开更多
关键词 VOLATILE DEFENSE neighboring
原文传递
Silencing JA hydroxylases in Nicotiana attenuata enhances jasmonic acid-isoleucine-mediated defenses against Spodoptera litura 被引量:2
15
作者 Jinxiang Tang Dahai Yang +2 位作者 Jianqiang Wu Suiyun Chen Lei Wang 《Plant Diversity》 SCIE CAS CSCD 2020年第2期111-119,共9页
Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced ... Jasmonic acid(JA)plays important roles in plant resistance to insect herbivores.One important derivative of JA is 12-OH-JA,which is produced by two independent pathways:direct hydroxylation of JA by jasmonate-induced oxygenases(JOXs)or hydrolyzation of 12-OH-JA-Ile.Yet the function of 12-OH-JA in plant-herbivore interactions remains largely unknown.In this study,we silenced four JOX homologs independently in the wild tobacco Nicotiana attenuata by virus-induced gene silencing(VIGS),and found that all four JOX homologs are involved in JA hydroxylation.Simultaneously silencing the four JA hydroxylases in VIGS-NaJOXs plants decreased herbivory-induced 12-OH-JA by 33%,but JA and JA-Ile levels increased by 45%and 30%,respectively,compared to those in control plants.Compared to direct hydroxylation from JA,hydrolyzation from 12-OH-JA-Ile is equally important for herbivory-induced 12-OHJA accumulation:in the 12-OH-JA-Ile deficient irJAR4/6 plants,12-OH-JA decreased 34%.Moreover,VIGSNaJOXs plants exhibited enhanced resistance to the generalist herbivore Spodoptera litura.The poor larval performance was strongly correlated with high levels of several JA-Ile-dependent direct defense metabolites in the VIGS-NaJOXs plants.When we simultaneously silenced all four JA hydroxylases in the JAIle-deficient irJAR4/6 background,the enhanced herbivore resistance diminished,demonstrating that enhanced herbivore resistance resulted from elevated JA-Ile levels.Given that silencing these NaJOX-like genes did not detectably alter plant growth but highly increased plant defense levels,we propose that JOX genes are potential targets for genetic improvement of herbivore-resistant crops. 展开更多
关键词 JA metabolism 12-OH-JA SPODOPTERA litura 2-Oxoglutarate OXYGENASE Herbivore defense Nicotiana attenuata
在线阅读 下载PDF
Immediate–Early(IE) gene regulation of cytomegalovirus:IE1-and pp71-mediated viral strategies against cellular defenses 被引量:2
16
作者 Lilith Torres Qiyi Tang 《Virologica Sinica》 SCIE CAS CSCD 2014年第6期343-352,共10页
Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of ... Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus–host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host(latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate–early(IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate–early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses. 展开更多
关键词 cytomegalovirus(CMV) major IMMEDIATE EARLY promoter(MIEP) IE1 pp71 nuclear domain 10(ND10) intrinsic CELLULAR defense ENHANCER virus-host interaction
暂未订购
Spirulina platensis extract improves the production and defenses of the common bean grown in a heavy metals-contaminated saline soil 被引量:1
17
作者 Mostafa M.Rady Ahmed S.Elrys +5 位作者 Eman Selem Ahmed A.A.Mohsen Safaa M.A.I.Arnaout Ahmed H.El-Sappah Khaled A.El-Tarabily El-Sayed M.Desoky 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2023年第7期240-257,共18页
Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(... Plants have to cope with several abiotic stresses,including salinity and heavymetals(HMs).Under these stresses,several extracts have been used as effective natural biostimulants,however,the use of Spirulina platensis(SP)extract(SPE)remains elusive.The effects of SPE were evaluated as soil addition(SA)and/or foliar spraying(FS)on antioxidant defenses and HMs content of common bean grown in saline soil contaminated with HMs.Individual(40 or 80 mg SPE/hill added as SA or 20 or 40 mg SPE/plant added as FS)or integrative(SA+FS)applications of SPE showed significant improvements in the following order:SA-80+FS-40>SA-80+FS-20>SA-40+FS-40>SA-40+FS-20>SA-80>SA-40>FS-40>FS-20>control.Therefore,the integrative SA+FS with 40 mg SP/plant was the most effective treatment in increasing plant growth and production,overcoming stress effects and minimizing contamination of the edible part.It significantly increased plant growth(74%–185%)and yield(107%–227%)by enhancing net photosynthetic rate(78.5%),stomatal conductance(104%),transpiration rate(124%),and contents of carotenoids(60.0%),chlorophylls(49%–51%),and NPK(271%–366%).These results were concurrent with the marked reductions in malondialdehyde(61.6%),hydrogen peroxide(42.2%),nickel(91%–94%),lead(80%–9%),and cadmium(74%–91%)contents due to the improved contents of glutathione(87.1%),ascorbate(37.0%),andα-tocopherol(77.2%),and the activities of catalase(18.1%),ascorbate peroxidase(18.3%),superoxide dismutase(192%),and glutathione reductase(52.2%)as reinforcing mechanisms.Therefore,this most effective treatment is recommended to mitigate the stress effects of salinity and HMs on common bean production while minimizing HMs in the edible part. 展开更多
关键词 Antioxidant defense system Biostimulants Heavy metals Microalgae extracts Saline soil Soil pollution
原文传递
Absence of anti-parasitic defenses in an Asian population of the magpie, a regular host of the great spotted cuckoo in Europe 被引量:1
18
作者 Canchao Yang Jialiang Huang +1 位作者 Wei Liang Anders P.MФLLER 《Current Zoology》 SCIE CAS CSCD 2021年第3期345-347,共3页
Obligate brood parasitism,which refers to parasitic birds,fish,and insects that lay eggs in host nests,imposes strong selective pressure on hosts because the reproductive output of hosts is reduced considerably or eli... Obligate brood parasitism,which refers to parasitic birds,fish,and insects that lay eggs in host nests,imposes strong selective pressure on hosts because the reproductive output of hosts is reduced considerably or eliminated completely while the foster parents provide extra-parental care to unrelated nestlings(Soler 2016).After parasites succeed in laying eggs,egg rejection by hosts plays an important role in avoiding parasitism by recognition and rejection of parasite eggs from host nests(Yang et al.2014). 展开更多
关键词 eliminated considerably DEFENSE
原文传递
<i>Rhizobium</i>alters inducible defenses in broad bean, <i>Vicia faba</i>
19
作者 Edward Brian Mondor Misty Cree Summers 《Open Journal of Ecology》 2011年第3期57-62,共6页
Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how thes... Conversion of inorganic nitrogen by mutualistic nitrogen-fixing bacteria is essential for plant growth and reproduction, as well as the development of chemical and mechanical defenses. It is unclear, however, how these bacteria alter co-occurring symbioses at higher trophic levels;e.g., extrafloral nectary (EFN) induction, in response to herbivory, to attract defensive mutualists. We hypothesized that plants colonized by nitrogen-fixing bacteria would mount a larger inducible, defensive response than plants lacking symbioses, as defensive traits are costly. We predicted that bean plants, Vicia faba L., harboring Rhizobium leguminosarum bv. viciae Frank would produce more EFNs upon leaf damage, than plants lacking the symbionts, as EFN induction in V. faba is resource-dependent. Here we report that V. faba colonized by R. leguminosarum produced similar numbers of EFNs as did plants without symbionts. Plants with symbionts, however, produced significantly fewer EFNs over 1 week in response to leaf damage, than those without leaf damage. As such, nitrogen-fixing bacteria may not always benefit the host plant, but rather, the utility of these bacteria may be dependent on the prevailing ecological conditions. 展开更多
关键词 Extrafloral NECTARY Inducible Defense MUTUALISM Phenotypic Plasticity RHIZOBIA
暂未订购
Maternal Environment Effects on Phenolic Defenses in <i>Abutilon theophrasti</i>Seeds
20
作者 Brian J. Schutte Sam E. Wortman +1 位作者 John L. Lindquist Adam S. Davis 《American Journal of Plant Sciences》 2013年第5期1127-1133,共7页
A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP... A class of phenolic compounds, ortho-dihydroxyphenols (hereafter “o-DHP”), has been implicated with seed survival. Based on expectations of the growth-differentiation balance hypothesis, we predicted that seed o-DHP concentration exhibits a curvilinear response to increasing resource availability in the maternal environment, with maximum o-DHP occurring at moderate resource levels. To test this hypothesis, Abutilon theophrasti seeds were produced under field conditions at two locations. Each location included twelve maternal environments established through factorial combinations of soil compost (+/-), species assemblage (A. theophrasti with and without maize), and soil nitrogen fertilizer (0, 0.5× or 1× local recommendations for maize). Resource availability with respect to A. theophrasti growth was summarized by above-ground biomass at seed harvest (maternal biomass). Results indicated that seed o-DHP concentrations increased then decreased in response to increasing maternal biomass. This relationship was modeled with a unimodal function specific to location (Location 1, y = 1.18 + 0.03xe-0.02x, pseudo-R2 = 0.59, p = 0.003;Location 2, y = 1.40 + 0.006xe-0.005x;pseudo-R2 = 0.34, p = 0.05). Seed protein concentrations remained constant across maternal biomass levels. Because inherent vulnerability to predation and decay is considered a consequence of chemical protection relative to nutritional offering, our results suggest that A. theophrasti seed susceptibility to lethal attack is influenced by resource levels in the maternal environment. More broadly, our results suggest that the growth-differentiation balance hypothesis can be extended to maternal effects on seed phenolics. 展开更多
关键词 Environmental Maternal Effect Growth-Differentiation Balance Hypothesis ortho-Dihydroxyphenols SEED Defense SEED Protein
暂未订购
上一页 1 2 43 下一页 到第
使用帮助 返回顶部