Sirpa restrains antitumor immunity by modulating the tumor immune microenvironment
Release date:
2022-02-22
Description:
By performing single-cell RNA sequencing (scRNA-seq) of tumor-infiltrating immune cells (TIICs) from colorectal cancer (CRC) patients, we found that macrophages and granulocytic myeloid-derived suppressor cells (gMDSCs) displaying the highest immune-inhibitory signatures were the most increased immunocytes in tumors compared to corresponding normal tissue. Tumor-infiltrating myeloid cells exhibited significantly increased expression of ITIM-bearing receptors such as SIRPA, CLEC4A and SIGLEC9. Intriguingly, Sirpa-/- mice but not Clec4a2-/- or Siglece-/- mice were more resistant to tumor progression than wild-type (WT) mice. These findings suggest that Sirpa deletion enhances innate and adaptive immune activation in the TIME; thus, Sirpa blockade could be a promising strategy to improve cancer immunotherapy.
For each controlled access study, there is a corresponding Data Access Committee(DAC) to determine the access permissions. Access to actual data files is not managed by NGDC.
You need to install the Aspera Connect plugin before uploading your files. If you dont have Aspera Connect plugin installed in your computer, please Download Aspera Connectand install it first.
[path/to/ascp]: Microsoft Windows: C:\Program Files\Aspera\Aspera Connect\bin\ascp.exe or
c:\users\[username]\AppData\Local\Programs\Aspera\Aspera Connect\bin\ascp.exe
Mac OS X: /Applications/Aspera/Connect.app/Contents/Resources/ascp (for admin's installation) or
/Users/[username]/Applications/Aspera/Connect.app/Contents/Resources/ascp (for non-admin's installation)
Linux: /opt/aspera/bin/ascp or
/home/[username]/aspera/connect/bin/ascp
[path/to/key/file] must be an absolute path, e.g.: /home/keys/aspera.openssh
[path/to/folder/containing/files] needs to specify the local folder that contains all the files to upload.