Gastrointestinal stromal tumor (GIST) is the most common mesenchymal tumor of the human gastrointestinal tract. In this study, we performed single‐cell RNA sequencing (RNA‐seq) on intra‐ and peri‐tumor tissues from GIST patients with the aim of discovering the heterogeneity of tumor cells in GIST and their interactions with other cells. We found four predominating cell types in GIST tumor tissue, including T cells, macrophages, tumor cells, and NK cells. Tumor cells could be clustered into two groups: one was highly proliferating and associated with high risk of metastasis, the other seemed “resting” and associated with low risk. Their clinical relevance and prognostic values were confirmed by RNA‐seq of 65 GIST samples. T cells were the largest cell type in our single‐cell data. Two groups of CD8+ effector memory (EM) cells were in the highest clonal expansion and performed the highest cytotoxicity but were also the most exhausted among all T cells. A group of macrophages were found polarized to possess both M1 and M2 signatures, and increased along with tumor progression. Cell‐to‐cell interaction analysis revealed that adipose endothelial cells had high interactions with tumor cells to facilitate their progression. Macrophages were at the center of the tumor microenvironment, recruiting immune cells to the tumor site and having most interactions with both tumor and nontumor cells. In conclusion, we obtained an overview of the GIST microenvironment and revealed the heterogeneity of each cell type and their relevance to risk classifications, which provided a novel theoretical basis for learning and curing GISTs.
Recently, as research on autonomous driving technology progresses, the supply of vehicles having various autonomous driving functions is increasing, and autonomous vehicles represented by V2V (Vehicle to Vehicle) and V2X (Vehicle to Everything) are emerging. For the era of autonomous driving, connectivity between vehicles and vehicles, vehicles and the surrounding environment is required based on information and communication technologies such as LTE, 5G, and WiFi. Advances in autonomous driving technology also face new challenges, with security emerging as a top concern as it can become a prime target for cyberattacks as the vehicle's external networks and connections increase. Therefore, it is necessary to derive the defense requirements in software to respond to such malicious attacks, and it is necessary to apply the verified security coding standard during software development. Recently, the ISO/SAE 21434 international standard replacing SAE J3061 has been established and published in relation to cyber security. In this paper, we propose criteria for cybersecurity and risk assessment methods. In addition, a case study confirms the suitability of the risk level determination according to the proposed evaluation factors and criteria.
Today automobile industry, many studies on autonomous driving are being conducted, and the distribution of vehicles with autonomous driving functions is increasing. For the era of fully autonomous vehicles, connectivity of vehicles such as intelligent transportation systems, V2V, and V2X is required based on communication technologies such as LTE, 5G, and WiFi. However, this increase in the connectivity of automobiles has become an opportunity to raise the need for vehicle cyber security, and recently, ISO 21434 international standard has been established and announced in relation to cyber security. In this paper, we propose a threat analysis and risk assessment guide for cybersecurity so that we can derive cybersecurity requirements and develop a controller that can be safe against cybersecurity attacks. It also shows that the proposed method conforms to the requirements of the ISO 21434 standard. Through the result of the case study, cybersecurity requirements were derived to a level applicable to controller development, and it was confirmed whether the risk assessment requirements suggested in the ISO 21434 cybersecurity engineering standard were satisfied.
With the development of intelligent connected vehicles, especially L3 level automatic driving technology, it is very important to identify and avoid the impact of malicious jamming signals on the communication of intelligent connected vehicles. In this paper, we classify and identify the five kinds of common intelligent connected vehicle communication jamming signals: single-tone jamming signal, multi-tone jamming signal, linear swept-frequency jamming signal, partial band jamming signal and noise frequency modulation jamming signal. Firstly, six kinds of features of communication jamming signals are extracted: frequency domain moment kurtosis coefficient, frequency domain moment skewness coefficient, single frequency encircled energy, average spectral flatness coefficient, frequency domain parameter and time domain moment kurtosis coefficient, and then classified and identified based on convolution neural network (CNN). The simulation results show that when the jamming-to-noise ratio (JNR) is higher than -7dB, the recognition rate is over 92%, which indicates that CNN has good classification and recognition performance for communication jamming signals.
ISO 26262, a standard for automobile safety, is a safety standard established by ISO to prevent accidents caused by errors in the E/E (Electric and Electronic) system mounted on vehicles. Recently, as the internet connectivity of automobiles increases, the standard methodology for securing security of the development stage is being presented as the cases of automobile hacking increase. Automobile cyber security has established and introduced ISO/SAE 21434 standard to eliminate threats caused by artificial penetration of hackers existing outside. The basic functional safety and cyber security standards should be reflected to improve the reliability of the E/E system of automobiles which is being developed as autonomous vehicles. In particular, systems engineering standards should be applied in consideration of requirements and constraints such as goals and system operation concepts of stakeholders, problem identification and definition, and solutions from the beginning of development to manage the development life cycle. In this paper, we propose a process integration development methodology based on the correlation analysis of the Harmony-SE model for the Harmonization Internationalization of automobile function safety, cyber security, and systems engineering.
With the increasing application of vehicle Ethernet in the intelligent networked vehicle network architecture, how to ensure the safety of Ethernet communication data between vehicle controllers has become an important research direction in the field of vehicle information security. Based on the Strongswan open source project, this paper has carried out the national security transformation of IPSec protocol, and implemented and verified it on the embedded development board with NXP I.MX8 as the core, proving that it can be applied to the Ethernet communication scenario between vehicle embedded controllers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.