RDF/XMLNTriplesTurtleShow queryShare
SubjectPredicateObject
http://purl.uniprot.org/citations/25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#typehttp://purl.uniprot.org/core/Journal_Citation
http://purl.uniprot.org/citations/25646416http://www.w3.org/2000/01/rdf-schema#comment"Vaccines eliciting immunity against influenza A viruses (IAVs) are currently antibody-based with hemagglutinin-directed antibody titer the only universally accepted immune correlate of protection. To investigate the disconnection between observed CD8 T-cell responses and immunity to IAV, we used a Poisson liquid chromatography data-independent acquisition MS method to physically detect PR8/34 (H1N1), X31 (H3N2), and Victoria/75 (H3N2) epitopes bound to HLA-A*02:01 on human epithelial cells following in vitro infection. Among 32 PR8 peptides (8-10mers) with predicted IC50 < 60 nM, 9 were present, whereas 23 were absent. At 18 h postinfection, epitope copies per cell varied from a low of 0.5 for M13-11 to a high of >500 for M1(58-66) with PA, HA, PB1, PB2, and NA epitopes also detected. However, aside from M1(58-66), natural CD8 memory responses against conserved presented epitopes were either absent or only weakly observed by blood Elispot. Moreover, the functional avidities of the immunodominant M1(58-66)/HLA-A*02:01-specific T cells were so poor as to be unable to effectively recognize infected human epithelium. Analysis of T-cell responses to primary PR8 infection in HLA-A*02:01 transgenic B6 mice underscores the poor avidity of T cells recognizing M1(58-66). By maintaining high levels of surface expression of this epitope on epithelial and dendritic cells, the virus exploits the combination of immunodominance and functional inadequacy to evade HLA-A*02:01-restricted T-cell immunity. A rational approach to CD8 vaccines must characterize processing and presentation of pathogen-derived epitopes as well as resultant immune responses. Correspondingly, vaccines may be directed against "stealth" epitopes, overriding viral chicanery."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.org/dc/terms/identifier"doi:10.1073/pnas.1423482112"xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/author"Reinhold B.B."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/author"Reinherz E.L."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/author"Ivanov A.R."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/author"Karger B.L."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/author"Keskin D.B."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/author"Zhang G.L."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/date"2015"xsd:gYear
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/name"Proc Natl Acad Sci U S A"xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/pages"2151-2156"xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/title"Physical detection of influenza A epitopes identifies a stealth subset on human lung epithelium evading natural CD8 immunity."xsd:string
http://purl.uniprot.org/citations/25646416http://purl.uniprot.org/core/volume"112"xsd:string
http://purl.uniprot.org/citations/25646416http://www.w3.org/2004/02/skos/core#exactMatchhttp://purl.uniprot.org/pubmed/25646416
http://purl.uniprot.org/citations/25646416http://xmlns.com/foaf/0.1/primaryTopicOfhttps://pubmed.ncbi.nlm.nih.gov/25646416
http://purl.uniprot.org/uniprot/#_E9PX19-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/#_G3UWE9-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/#_F6Q8J5-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/#_F6QJ89-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/#_Q3UGB7-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/#_Q3UGD2-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/#_Q7TT79-mappedCitation-25646416http://www.w3.org/1999/02/22-rdf-syntax-ns#objecthttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/E9PX19http://purl.uniprot.org/core/mappedCitationhttp://purl.uniprot.org/citations/25646416
http://purl.uniprot.org/uniprot/F6Q8J5http://purl.uniprot.org/core/mappedCitationhttp://purl.uniprot.org/citations/25646416