Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,008)
  • Open Access

    ARTICLE

    RP3-340N1.2 Knockdown Suppresses Proliferation and Migration by Downregulating IL-6 in Non-Small Cell Lung Cancer

    Hang Zhang1,#, Meng-Yuan Chu1,#, Guohui Lv1, You-Jie Li1, Xuhang Liu2, Fei Jiao1,*, Yun-Fei Yan1,*

    BIOCELL, Vol.50, No.1, 2026, DOI:10.32604/biocell.2025.068322 - 23 January 2026

    Abstract Objectives: Non-small cell lung cancer (NSCLC) remains a leading cause of cancer-related mortality, with limited understanding of lncRNA-driven mechanisms in tumor progression. This study aimed to identify differentially expressed lncRNAs in NSCLC tissues and elucidate the functional role of the significantly upregulated RP3-340N1.2 in promoting malignancy. Methods: RNA sequencing was used to screen dysregulated lncRNAs. RP3-340N1.2 was functionally characterized via gain/loss-of-function assays in NSCLC cells, assessing proliferation, migration, and macrophage polarization. Mechanisms of interleukin 6 (IL-6) regulation were explored using cytokine profiling, Actinomycin D assays, and RNA Immunoprecipitation (RIP) assays to study RP3-340N1.2 interactions with… More >

  • Open Access

    REVIEW

    A Systematic Review of Frameworks for the Detection and Prevention of Card-Not-Present (CNP) Fraud

    Kwabena Owusu-Mensah*, Edward Danso Ansong , Kofi Sarpong Adu-Manu, Winfred Yaokumah

    Journal of Cyber Security, Vol.8, pp. 33-92, 2026, DOI:10.32604/jcs.2026.074265 - 20 January 2026

    Abstract The rapid growth of digital payment systems and remote financial services has led to a significant increase in Card-Not-Present (CNP) fraud, which is now the primary source of card-related losses worldwide. Traditional rule-based fraud detection methods are becoming insufficient due to several challenges, including data imbalance, concept drift, privacy concerns, and limited interpretability. In response to these issues, a systematic review of twenty-four CNP fraud detection frameworks developed between 2014 and 2025 was conducted. This review aimed to identify the technologies, strategies, and design considerations necessary for adaptive solutions that align with evolving regulatory standards.… More >

  • Open Access

    ARTICLE

    The Impact of SWMF Features on the Performance of Random Forest, LSTM and Neural Network Classifiers for Detecting Trojans

    Fatemeh Ahmadi Abkenari*, Melika Zandi, Shanmugapriya Gopalakrishnan

    Journal of Cyber Security, Vol.8, pp. 93-109, 2026, DOI:10.32604/jcs.2026.074197 - 20 January 2026

    Abstract Nowadays, cyberattacks are considered a significant threat not only to the reputation of organizations through the theft of customers’ data or reducing operational throughput, but also to their data ownership and the safety and security of their operations. In recent decades, machine learning techniques have been widely employed in cybersecurity research to detect various types of cyberattacks. In the domain of cybersecurity data, and especially in Trojan detection datasets, it is common for datasets to record multiple statistical measures for a single concept. We referred to them as SWMF features in this paper, which include… More >

  • Open Access

    ARTICLE

    SDHA Deficiency in Hepatocellular Carcinoma Promotes Tumor Progression through Succinate-Induced M2 Macrophage Polarization

    Xinyang Li1,2,3,#, Luyuan Ma1,2,3,#, Chuan Shen1,2,3, Ruolan Gu1,2,3, Shilong Dong1,2,3, Mingjie Liu1,2,3, Ying Xiao1,2,3, Wenpeng Liu1,2,3, Yuexia Liu1,2,3, Caiyan Zhao1,2,3,*

    Oncology Research, Vol.34, No.2, 2026, DOI:10.32604/or.2025.073179 - 19 January 2026

    Abstract Background: Hepatocellular carcinoma (HCC) is an aggressive and lethal malignancy. Metabolic reprogramming dynamically remodels the tumor microenvironment (TME) and drives HCC progression. This study investigated the mechanism through which metabolic reprogramming remodels the TME in HCC. Methods: HCC patient transcriptome data were subjected to bioinformatics analysis to identify differentially expressed genes and immune infiltration status. Immunohistochemical analysis was performed to determine the correlation between succinate dehydrogenase complex subunit A (SDHA) expression and M2 macrophage infiltration. SDHA-knockdown or SDHA-overexpressing HCC cells were used for in vitro experiments, including co-culturing, flow cytometry, and enzyme-linked immunosorbent assay. Western blotting… More >

  • Open Access

    ARTICLE

    Prognostic Value of Circulating Tumor Cells and Cancer Associated Macrophage-Like Cells in Metastatic Non-Small Cell Lung Cancer Patients: A Retrospective Exploratory Analysis

    Marco Siringo1,2,#,*, Michela De Meo1,#, Alain Jonathan Gelibter3, Chiara Nicolazzo4,5,§, Paola Gazzaniga5,§

    Oncology Research, Vol.34, No.2, 2026, DOI:10.32604/or.2025.069832 - 19 January 2026

    Abstract Objectives: Although immune checkpoint inhibitors (ICIs) and targeted therapies have reshaped treatment non-small cell lung cancer (NSCLC) paradigms, prognosis remains poor for many patients due to delayed diagnosis and resistance mechanisms. Liquid biopsy offers a minimally invasive approach to monitoring tumor evolution. Among circulating biomarkers, circulating tumor cells (CTCs) and cancer-associated macrophage-like cells (CAM-Ls) may provide complementary prognostic insights. The study aimed to evaluate the prognostic role of CTC and CAM-Ls dynamic in metastatic NSCLC patients. Methods: We retrospectively analyzed 77 patients with metastatic NSCLC who underwent CTC and CAM-L evaluation via the CellSearch® system… More >

  • Open Access

    ARTICLE

    Hybrid Runtime Detection of Malicious Containers Using eBPF

    Jeongeun Ryu1, Riyeong Kim2, Soomin Lee1, Sumin Kim1, Hyunwoo Choi1,2, Seongmin Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.074871 - 12 January 2026

    Abstract As containerized environments become increasingly prevalent in cloud-native infrastructures, the need for effective monitoring and detection of malicious behaviors has become critical. Malicious containers pose significant risks by exploiting shared host resources, enabling privilege escalation, or launching large-scale attacks such as cryptomining and botnet activities. Therefore, developing accurate and efficient detection mechanisms is essential for ensuring the security and stability of containerized systems. To this end, we propose a hybrid detection framework that leverages the extended Berkeley Packet Filter (eBPF) to monitor container activities directly within the Linux kernel. The framework simultaneously collects flow-based network… More >

  • Open Access

    REVIEW

    A Survey of Federated Learning: Advances in Architecture, Synchronization, and Security Threats

    Faisal Mahmud1, Fahim Mahmud2, Rashedur M. Rahman1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073519 - 12 January 2026

    Abstract Federated Learning (FL) has become a leading decentralized solution that enables multiple clients to train a model in a collaborative environment without directly sharing raw data, making it suitable for privacy-sensitive applications such as healthcare, finance, and smart systems. As the field continues to evolve, the research field has become more complex and scattered, covering different system designs, training methods, and privacy techniques. This survey is organized around the three core challenges: how the data is distributed, how models are synchronized, and how to defend against attacks. It provides a structured and up-to-date review of… More >

  • Open Access

    ARTICLE

    Defending against Topological Information Probing for Online Decentralized Web Services

    Xinli Hao1, Qingyuan Gong2, Yang Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073155 - 12 January 2026

    Abstract Topological information is very important for understanding different types of online web services, in particular, for online social networks (OSNs). People leverage such information for various applications, such as social relationship modeling, community detection, user profiling, and user behavior prediction. However, the leak of such information will also pose severe challenges for user privacy preserving due to its usefulness in characterizing users. Large-scale web crawling-based information probing is a representative way for obtaining topological information of online web services. In this paper, we explore how to defend against topological information probing for online web services,… More >

  • Open Access

    ARTICLE

    A Hybrid Approach to Software Testing Efficiency: Stacked Ensembles and Deep Q-Learning for Test Case Prioritization and Ranking

    Anis Zarrad1, Thomas Armstrong2, Jaber Jemai3,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072768 - 12 January 2026

    Abstract Test case prioritization and ranking play a crucial role in software testing by improving fault detection efficiency and ensuring software reliability. While prioritization selects the most relevant test cases for optimal coverage, ranking further refines their execution order to detect critical faults earlier. This study investigates machine learning techniques to enhance both prioritization and ranking, contributing to more effective and efficient testing processes. We first employ advanced feature engineering alongside ensemble models, including Gradient Boosted, Support Vector Machines, Random Forests, and Naive Bayes classifiers to optimize test case prioritization, achieving an accuracy score of 0.98847More >

  • Open Access

    REVIEW

    A Review on Fault Diagnosis Methods of Gas Turbine

    Tao Zhang1,*, Hailun Wang1, Tianyue Wang1, Tian Tian2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072696 - 12 January 2026

    Abstract The critical components of gas turbines suffer from prolonged exposure to factors such as thermal oxidation, mechanical wear, and airflow disturbances during prolonged operation. These conditions can lead to a series of issues, including mechanical faults, air path malfunctions, and combustion irregularities. Traditional model-based approaches face inherent limitations due to their inability to handle nonlinear problems, natural factors, measurement uncertainties, fault coupling, and implementation challenges. The development of artificial intelligence algorithms has provided an effective solution to these issues, sparking extensive research into data-driven fault diagnosis methodologies. The review mechanism involved searching IEEE Xplore, ScienceDirect,… More >

Displaying 11-20 on page 2 of 2008. Per Page