-
Article
Open AccessA phosphoinositide switch mediates exocyst recruitment to multivesicular endosomes for exosome secretion
Exosomes are secreted to the extracellular milieu when multivesicular endosomes (MVEs) dock and fuse with the plasma membrane. However, MVEs are also known to fuse with lysosomes for degradation. How MVEs are ...
-
Article
Open AccessFeedback between mechanosensitive signaling and active forces governs endothelial junction integrity
The formation and recovery of gaps in the vascular endothelium governs a wide range of physiological and pathological phenomena, from angiogenesis to tumor cell extravasation. However, the interplay between th...
-
Article
Open AccessActin polymerization promotes invagination of flat clathrin-coated lattices in mammalian cells by pushing at lattice edges
Clathrin-mediated endocytosis (CME) requires energy input from actin polymerization in mechanically challenging conditions. The roles of actin in CME are poorly understood due to inadequate knowledge of actin ...
-
Article
Open AccessHRS phosphorylation drives immunosuppressive exosome secretion and restricts CD8+ T-cell infiltration into tumors
The lack of tumor infiltration by CD8+ T cells is associated with poor patient response to anti-PD-1 therapy. Understanding how tumor infiltration is regulated is key to improving treatment efficacy. Here, we rep...
-
Article
Open AccessT-Plastin reinforces membrane protrusions to bridge matrix gaps during cell migration
Migrating cells move across diverse assemblies of extracellular matrix (ECM) that can be separated by micron-scale gaps. For membranes to protrude and reattach across a gap, actin filaments, which are relative...
-
Article
Open AccessGraph database-based network security situation awareness data storage method
With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network security situation awareness data presents the char...
-
Chapter and Conference Paper
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage
As one of the most important services in the cloud computing, cloud storage service can provide boundless storage resources for clients. Because of its tremendous advantages, cloud storage service has attracte...