Xurui Zhang
YOU?
Author Swipe
View article: Reactive Oxygen Species‐Mediated <scp>TRPM2</scp> Activation Facilitates Phagocytosis of Macrophages to Reverse Profibrotic Phenotype
Reactive Oxygen Species‐Mediated <span>TRPM2</span> Activation Facilitates Phagocytosis of Macrophages to Reverse Profibrotic Phenotype Open
Background and Aims Macrophages play plastic roles during fibrogenesis and fibrosis regression. Phagocytosis is considered a trigger for shifting macrophages from a profibrotic phenotype to a restorative phenotype. However, the underlying …
View article: Splicing to keep splicing: A feedback system for cellular homeostasis and state transition
Splicing to keep splicing: A feedback system for cellular homeostasis and state transition Open
Background Alternative splicing (AS) plays a crucial role in regulating gene expression and governing proteomic diversity by generating multiple protein isoforms from a single gene. Increasing evidence has highlighted the regulation for pr…
View article: Metadiscourse in Three Minute Thesis Presentations: An Interdisciplinary Perspective
Metadiscourse in Three Minute Thesis Presentations: An Interdisciplinary Perspective Open
Three Minute Thesis (3MT) competition, as a flourishing academic genre, contributes to assisting scholars to popularize scientific knowledge to a heterogenous audience. Regarding metadiscourse of 3MT genre, much attention has been paid to …
View article: Splicing to orchestrate cell fate
Splicing to orchestrate cell fate Open
Alternative splicing (AS) plays a critical role in gene expression by generating protein diversity from single genes. This review provides an overview of the role of AS in regulating cell fate, focusing on its involvement in processes such…
View article: Wall effect on single bubble rising in a Hele–Shaw cell
Wall effect on single bubble rising in a Hele–Shaw cell Open
Single air bubble rising near vertical wall in a Hele–Shaw cell was investigated experimentally. Bubbles with a large range of size from 4.46 mm to 21.68 mm were generated. A vertical wall was introduced in the cell, and the initial distan…
View article: Development of RSA and some attack points
Development of RSA and some attack points Open
Currently, the relatively popular public key encryption is RSA. It was officially launched in 1978 and given their initials as a name. Different encryption and decryption keys are used in the RSA public-key cryptosystem. Deriving decryptio…
View article: CD11b+CD43hiLy6Clo splenocyte‐derived macrophages exacerbate liver fibrosis via spleen–liver axis
CD11b+CD43hiLy6Clo splenocyte‐derived macrophages exacerbate liver fibrosis via spleen–liver axis Open
Background and Aims: Monocyte‐derived macrophages (MoMFs), a dominant population of hepatic macrophages under inflammation, play a crucial role in liver fibrosis progression. The spleen serves as an extra monocyte reservoir in inflammatory…
View article: Two Types of 3D Quantum Hall Effects in Multilayer WTe$_2$
Two Types of 3D Quantum Hall Effects in Multilayer WTe$_2$ Open
Interplay between the topological surface states and bulk states gives rise to diverse exotic transport phenomena in topological materials. The recently proposed Weyl orbit in topological semimetals in the presence of magnetic field is a r…
View article: Symbiont-Induced Phagosome Changes Rather than Extracellular Discrimination Contribute to the Formation of Social Amoeba Farming Symbiosis
Symbiont-Induced Phagosome Changes Rather than Extracellular Discrimination Contribute to the Formation of Social Amoeba Farming Symbiosis Open
Protists are single-celled, extremely diverse eukaryotic microbes. Like animals and plants, they live with bacterial symbionts and have complex relationships.
View article: Attachment of a particle to a pendant drop: How large can we go?
Attachment of a particle to a pendant drop: How large can we go? Open
Small solid particles can be attached to an air–liquid interface due to the pulling of surface tension. We investigate experimentally under which conditions a spherical solid particle can be attached under a pendant drop, varying the densi…
View article: Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer Open
Adversarial attacks and backdoor attacks are two common security threats that hang over deep learning. Both of them harness task-irrelevant features of data in their implementation. Text style is a feature that is naturally irrelevant to m…
View article: Thickness dependence of magnetotransport properties of tungsten ditelluride
Thickness dependence of magnetotransport properties of tungsten ditelluride Open
We investigate the electronic structure of tungsten ditelluride (WTe$_2$) flakes with different thicknesses in magneto-transport studies. The temperature-dependent resistance and magnetoresistance (MR) measurements both confirm the breakin…
View article: Thickness Dependence of Magneto-transport Properties in Tungsten\n Ditelluride
Thickness Dependence of Magneto-transport Properties in Tungsten\n Ditelluride Open
We investigate the electronic structure of tungsten ditelluride (WTe$_2$)\nflakes with different thicknesses in magneto-transport studies. The\ntemperature-dependent resistance and magnetoresistance (MR) measurements both\nconfirm the brea…
View article: MERMAID: Metaphor Generation with Symbolism and Discriminative Decoding
MERMAID: Metaphor Generation with Symbolism and Discriminative Decoding Open
Generating metaphors is a challenging task as it requires a proper understanding of abstract concepts, making connections between unrelated concepts, and deviating from the literal meaning. In this paper, we aim to generate a metaphoric se…
View article: MERMAID: Metaphor Generation with Symbolism and Discriminative Decoding
MERMAID: Metaphor Generation with Symbolism and Discriminative Decoding Open
Tuhin Chakrabarty, Xurui Zhang, Smaranda Muresan, Nanyun Peng. Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2021.
View article: Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer Open
Adversarial attacks and backdoor attacks are two common security threats that hang over deep learning. Both of them harness task-irrelevant features of data in their implementation. Text style is a feature that is naturally irrelevant to m…
View article: Crossover between weak antilocalization and weak localization in few-layer <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi mathvariant="normal">W</mml:mi><mml:msub><mml:mi>Te</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math>: Role of electron-electron interactions
Crossover between weak antilocalization and weak localization in few-layer : Role of electron-electron interactions Open
We report electron transport studies in an encapsulated few-layer WTe2 at low temperatures and high magnetic fields. The magnetoconductance reveals a temperature-induced crossover between weak antilocalization and weak localizat…
View article: Try to Substitute: An Unsupervised Chinese Word Sense Disambiguation Method Based on HowNet
Try to Substitute: An Unsupervised Chinese Word Sense Disambiguation Method Based on HowNet Open
Word sense disambiguation (WSD) is a fundamental natural language processing task. Unsupervised knowledge-based WSD only relies on a lexical knowledge base as the sense inventory and has wider practical use than supervised WSD that require…
View article: Motion Capture Research: 3D Human Pose Recovery Based on RGB Video Sequences
Motion Capture Research: 3D Human Pose Recovery Based on RGB Video Sequences Open
Using video sequences to restore 3D human poses is of great significance in the field of motion capture. This paper proposes a novel approach to estimate 3D human action via end-to-end learning of deep convolutional neural network to calcu…
View article: DROP IMPACT ONTO A CANTILEVER BEAM: BEHAVIOR OF THE LAMELLA AND FORCE MEASUREMENT
DROP IMPACT ONTO A CANTILEVER BEAM: BEHAVIOR OF THE LAMELLA AND FORCE MEASUREMENT Open
In this work, the process of drop impact onto an elastic surface (a cantilever beam) was studied. Different from previous studies which typically focused on the behavior of the elastic surface (e.g., deformation and oscillation), the focus…
View article: Study of thin liquid film drainage in bubble-liquid-solid systems using integrated thin liquid film force apparatus (ITLFFA)
Study of thin liquid film drainage in bubble-liquid-solid systems using integrated thin liquid film force apparatus (ITLFFA) Open
Interactions involving deformable surfaces reveal a number of distinct physicochemical characteristics that do not exist in interactions between rigid solid surfaces. The main focus of this thesis is to develop a unique fully custom-design…
View article: Both Complexity and Location of DNA Damage Contribute to Cellular Senescence Induced by Ionizing Radiation
Both Complexity and Location of DNA Damage Contribute to Cellular Senescence Induced by Ionizing Radiation Open
Persistent DNA damage is considered as a main cause of cellular senescence induced by ionizing radiation. However, the molecular bases of the DNA damage and their contribution to cellular senescence are not completely clear. In this study,…
View article: Exosome-mediated microRNA transfer plays a role in radiation-induced bystander effect
Exosome-mediated microRNA transfer plays a role in radiation-induced bystander effect Open
Bystander effects can be induced through cellular communication between irradiated cells and non-irradiated cells. The signals that mediate this cellular communication, such as cytokines, reactive oxygen species, nitric oxide and even micr…