Search Results - "Reinstadler, Bryn"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Combinatorial GxGxE CRISPR screen identifies SLC25A39 in mitochondrial glutathione transport linking iron homeostasis to OXPHOS by Shi, Xiaojian, Reinstadler, Bryn, Shah, Hardik, To, Tsz-Leung, Byrne, Katie, Summer, Luanna, Calvo, Sarah E., Goldberger, Olga, Doench, John G., Mootha, Vamsi K., Shen, Hongying

    Published in Nature communications (05-05-2022)
    “…The SLC25 carrier family consists of 53 transporters that shuttle nutrients and co-factors across mitochondrial membranes. The family is highly redundant and…”
    Get full text
    Journal Article
  2. 2

    Epstein-Barr-Virus-Induced One-Carbon Metabolism Drives B Cell Transformation by Wang, Liang Wei, Shen, Hongying, Nobre, Luis, Ersing, Ina, Paulo, Joao A., Trudeau, Stephen, Wang, Zhonghao, Smith, Nicholas A., Ma, Yijie, Reinstadler, Bryn, Nomburg, Jason, Sommermann, Thomas, Cahir-McFarland, Ellen, Gygi, Steven P., Mootha, Vamsi K., Weekes, Michael P., Gewurz, Benjamin E.

    Published in Cell metabolism (03-09-2019)
    “…Epstein-Barr virus (EBV) causes Burkitt, Hodgkin, and post-transplant B cell lymphomas. How EBV remodels metabolic pathways to support rapid B cell outgrowth…”
    Get full text
    Journal Article
  3. 3
  4. 4
  5. 5

    STRATA: Simple, Gradient-Free Attacks for Models of Code by Springer, Jacob M, Reinstadler, Bryn Marie, O'Reilly, Una-May

    Published 28-09-2020
    “…Neural networks are well-known to be vulnerable to imperceptible perturbations in the input, called adversarial examples, that result in misclassification…”
    Get full text
    Journal Article
  6. 6

    Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting by Hemberg, Erik, Kelly, Jonathan, Shlapentokh-Rothman, Michal, Reinstadler, Bryn, Xu, Katherine, Rutar, Nick, O'Reilly, Una-May

    Published 01-10-2020
    “…Many public sources of cyber threat and vulnerability information exist to help defend cyber systems. This paper links MITRE's ATT&CK MATRIX of Tactics and…”
    Get full text
    Journal Article