Literature DB >> 24665131

Prediction of individualized therapeutic vulnerabilities in cancer from genomic profiles.

Bülent Arman Aksoy1, Emek Demir2, Özgün Babur2, Weiqing Wang2, Xiaohong Jing2, Nikolaus Schultz2, Chris Sander2.   

Abstract

MOTIVATION: Somatic homozygous deletions of chromosomal regions in cancer, while not necessarily oncogenic, may lead to therapeutic vulnerabilities specific to cancer cells compared with normal cells. A recently reported example is the loss of one of the two isoenzymes in glioblastoma cancer cells such that the use of a specific inhibitor selectively inhibited growth of the cancer cells, which had become fully dependent on the second isoenzyme. We have now made use of the unprecedented conjunction of large-scale cancer genomics profiling of tumor samples in The Cancer Genome Atlas (TCGA) and of tumor-derived cell lines in the Cancer Cell Line Encyclopedia, as well as the availability of integrated pathway information systems, such as Pathway Commons, to systematically search for a comprehensive set of such epistatic vulnerabilities.
RESULTS: Based on homozygous deletions affecting metabolic enzymes in 16 TCGA cancer studies and 972 cancer cell lines, we identified 4104 candidate metabolic vulnerabilities present in 1019 tumor samples and 482 cell lines. Up to 44% of these vulnerabilities can be targeted with at least one Food and Drug Administration-approved drug. We suggest focused experiments to test these vulnerabilities and clinical trials based on personalized genomic profiles of those that pass preclinical filters. We conclude that genomic profiling will in the future provide a promising basis for network pharmacology of epistatic vulnerabilities as a promising therapeutic strategy.
AVAILABILITY AND IMPLEMENTATION: A web-based tool for exploring all vulnerabilities and their details is available at http://cbio.mskcc.org/cancergenomics/statius/ along with supplemental data files.
© The Author 2014. Published by Oxford University Press.

Entities:  

Mesh:

Substances:

Year:  2014        PMID: 24665131      PMCID: PMC4080742          DOI: 10.1093/bioinformatics/btu164

Source DB:  PubMed          Journal:  Bioinformatics        ISSN: 1367-4803            Impact factor:   6.937


1 INTRODUCTION

Comprehensive cancer profiling studies, such as The Cancer Genome Atlas (TCGA) and other studies by the International Cancer Genome Consortium, have helped identify many genomic alterations in cancer genomes, including homozygous deletions that often result from genomic instability. Deletions that confer a proliferative advantage, such as the homozygous deletion of a tumor-suppressor gene, are selected in cancer cells via clonal expansion (Hanahan and Weinberg, 2011). Other deletions with relatively little effect on the tumor’s proliferative capabilities can be seen at low frequencies when they are, by chance, co-selected with other oncogenic events. Both types of deletions, however, result in the loss of a locus that often contains multiple genes. Such a deletion may not be lethal to a cell if one or more unaffected partner genes (e.g. an isoenzyme) can sufficiently carry the load of the deleted partner, but the loss of these passenger genes may create therapeutic vulnerabilities (Fig. 1). On loss of an initial gene, interference with the function of its partner gene(s) may result in cell death, a phenomenon known as synthetic lethality.
Fig. 1.

Deletions often result in the loss of a locus (horizontal bars) that often contains multiple genes. These deletions can sometimes cause loss of a metabolic gene as a passenger event. This type of alterations are not lethal to a cell if another gene can sufficiently carry the load of the deleted metabolic gene, but the loss of these passenger genes may create therapeutic vulnerabilities in tumors

Deletions often result in the loss of a locus (horizontal bars) that often contains multiple genes. These deletions can sometimes cause loss of a metabolic gene as a passenger event. This type of alterations are not lethal to a cell if another gene can sufficiently carry the load of the deleted metabolic gene, but the loss of these passenger genes may create therapeutic vulnerabilities in tumors Muller recently published a case study for synthetic lethality for glioblastoma. Enolase performs an essential function in cells, catalyzing the conversion of 2-phosphoglycerate and phosphoenolpyruvate in the glycolytic pathway. At least three known genes encode enolase isoenzymes: ENO1, ENO2 and ENO3. ENO1 has been shown to be homozygously deleted in certain glioblastomas, probably as a passenger event to the deletion of ERFFI1, but the tumor cells are able to survive because of the activity of other enolase encoding genes, in particular ENO2. Although the loss of ENO1 alone may not be lethal, cancer cells lacking ENO1 are selectively vulnerable to the loss of ENO2 (i.e. synthetic lethality), whereas non-cancer cells with intact ENO1 can tolerate a loss of ENO2. Most of the cancer genomics research focuses on identifying driver alterations by frequency or occurrence pattern and exploiting them to treat cancer (Ciriello ; Kim ; Mermel ; Taylor ). However, there is an opportunity to exploit synthetic lethalities specific to particular populations of cancer cells created by the homozygous loss of genes responsible for core cellular functions. These are rare patient-specific events, and there are no existing tools for identifying these vulnerabilities for a given patient. A system that can efficiently analyze genomic data from biological samples to identify particular therapeutic vulnerabilities in cancer cells specific to those samples based on potential synthetic lethal partner genes can identify personalized treatments to inhibit or kill those cancer cells. Here, we describe a computational method, Statius (named after the Roman poet, Publius Papinius Statius, who is known for his famous poems Achilleid and Thebaid), to systematically predict metabolic vulnerabilities in tumor samples from genomic profiles. We present results obtained from the analysis of 16 publicly available cancer studies (Fig. 2). Integrating data, in an automated manner, from multiple data resources—including several pathway databases, drug–target annotation resources and cancer genomics utilities—we were able to predict sample-specific metabolic vulnerabilities, which result from a homozygous deletion event in the corresponding sample, and list drugs that can help exploit each particular vulnerability. The complete list of the predicted vulnerabilities can be found at http://cbio.mskcc.org/cancergenomics/statius.
Fig. 2.

Overall process of identification of therapeutic vulnerabilities. Statius imports cancer genomics data provided by the cBioPortal (Cerami ; Gao ), along with pathway and drug annotations from a customizable list of external resources. It then produces a list of sample-specific vulnerabilities categorized by the cancer study as output. These potential vulnerabilities can be further tested in cell lines bearing the vulnerability of interest

Overall process of identification of therapeutic vulnerabilities. Statius imports cancer genomics data provided by the cBioPortal (Cerami ; Gao ), along with pathway and drug annotations from a customizable list of external resources. It then produces a list of sample-specific vulnerabilities categorized by the cancer study as output. These potential vulnerabilities can be further tested in cell lines bearing the vulnerability of interest

2 RESULTS

2.1 Data collection

2.1.1 Drug–target relationships

As a first step in our analysis, we collected information on available targeted drugs and their known targets. For this, we gathered drug–target data from multiple curated data resources including, but not limited to, DrugBank (Knox ) and KEGG Drug (Kanehisa ) using the PiHelper tool (Aksoy ). We further collected information from the National Cancer Institutes’ Online Cancer Resource (http://cancer.gov) to annotate whether a drug has been approved for cancer therapy. We were able to extract information for 7817 targeted drugs and 17 981 drug–target relationships corresponding to these drugs. To remove non-specific drugs, we excluded from our initial analysis drugs that have more than five known targets, leaving 7625 drugs and 15 210 drug targets covering 1674 genes.

2.1.2 Gene sets representing isoenzymes

We next created a list of all known metabolic isoenzymes as representatives of synthetic lethal gene groups. To accomplish this, we used curated human metabolic pathway information from Pathway Commons in BioPAX format (Cerami ; Demir ). We specifically collected metabolism pathways provided by Reactome and HumanCyc databases (Croft ; Romero ). Using these data resources, we extracted official gene symbols from protein entities that catalyze the same metabolic reaction and considered them as isoenzymes. In addition to these pathway databases, we also used metabolic enzyme information provided by the KEGG Enzyme database (Kanehisa ). For each enzyme, identified by a specific Enzyme Commission (EC) number, we extracted the corresponding human gene symbols and grouped them as isoenzyme gene sets. Combining data from these three resources, we were able to extract 1290 unique gene sets. We filtered out 1063 gene sets consisting of more than five genes, as our preliminary screen showed that gene sets with more than five genes do not increase the number of predicted vulnerabilities in a considerable manner, as well as those that consist of only non-targetable genes.

2.1.3 Cancer studies and genomic profiles

Next, we obtained genomic profiles, minimally somatic copy-number alteration (CNA) data, from publicly available cancer studies. To obtain information on multiple studies, we used the web service of the cBioPortal for Cancer Genomics (Cerami ; Gao ). We used categorical CNA information to identify whether a gene is homozygously deleted for a given sample. Whenever available, we also collected normalized gene expression levels for a homozygously deleted gene of interest to see whether the gene is underexpressed compared with the rest of the samples in the same cancer study. For this analysis, we used genomic profiles for 5971 samples (4999 tumor samples and 972 cell lines) from 16 different cancer studies that had publicly available CNA data (Table 1). All but two studies we included in our set had also the mRNA expression data available.
Table 1.

We screened 5971 samples from 16 different cancer studies

Cancer studyGenomic profiles
SourceSamplesCNAExp.Tissue
Acute myeloid leukemiaTCGA (The Cancer and Genome Atlas, 2013)191++Bone marrow
Adenoid cystic carcinomaMSKCC (Ho et al., 2013)60+
Bladder cancerMSKCC (Iyer et al., 2013)97++Bladder
Breast invasive carcinomaTCGA (Koboldt et al., 2012)913++
CCLENovartis/broad (Barretina et al., 2012)972++
Colon and rectum adenocarcinomaTCGA (Muzny et al., 2012)575++Colon
Glioblastoma multiformeTCGA (The Cancer and Genome Atlas, 2008)497++Brain
Head and neck squamous cell carcinomaTCGA306++
Kidney renal clear cell carcinomaTCGA (Creighton et al., 2013)436++
Lung adenocarcinomaBroad (Imielinski et al., 2012)182+Lung
Lung adenocarcinomaTCGA230++Lung
Lung squamous cell carcinomaTCGA (Hammerman et al., 2012)197++Lung
Ovarian serous cystadenocarcinomaTCGA (The Cancer and Genome Atlas, 2011)569++Ovary
Prostate adenocarcinomaMSKCC (Taylor et al., 2010)194++Prostate
SarcomaMSKCC/broad (Barretina et al., 2010)207++Soft tissue
Uterine corpus endometrioid carcinomaTCGA (Kandoth et al., 2013)363++Uterus
Total5971

Note: The majority of the cancer studies were from TCGA, and the others were from different individual institutions. We annotated each cancer study with its tissue of origin in accordance with the TiGER database (Liu ). TCGA: The Cancer Genome Atlas; MSKCC: Memorial Sloan-Kettering Cancer Center; Broad: Broad Institute; CNA: DNA copy-number alteration; Exp: mRNA expression; −: tissue annotation not available.

We screened 5971 samples from 16 different cancer studies Note: The majority of the cancer studies were from TCGA, and the others were from different individual institutions. We annotated each cancer study with its tissue of origin in accordance with the TiGER database (Liu ). TCGA: The Cancer Genome Atlas; MSKCC: Memorial Sloan-Kettering Cancer Center; Broad: Broad Institute; CNA: DNA copy-number alteration; Exp: mRNA expression; −: tissue annotation not available.

2.1.4 Additional gene annotations

Most of the isoenzymes show tissue-specific expression patterns where the expression of an isoenzyme is restricted to a single or multiple tissues. We wanted to use this context-specific background information in our analysis and take the tissue associated with a cancer study, when trying to find vulnerabilities. It is also known that some genes are essential for the viability of a cell, and therefore, targeting such a gene causes some level of toxicity to all cells in a non-selective manner, making these genes unpreferred targets for an ideal therapy. Therefore, we annotated the genes to recognize tissue-specific expression patterns and also essentiality. Using Tissue-specific Gene Expression and Regulation (TiGER) database, we first extracted tissue-specific genes. We also, when possible, annotated the cancer studies with a tissue in accordance with the TiGER terminology (Liu ). These data allowed us to query for a given sample, associated with a cancer study and thus a tissue, whether a gene of interest is expected to be expressed. We next used data provided by Database of Essential Genes (DEG) to annotate whether a gene of interest is essential for the organism (Zhang ). Using this dataset, we mark a human gene as essential if its homologue in any of the well-known model organisms is known to be essential for the viability of that particular organism.

2.2 Identification of vulnerabilities

2.2.1 Sample-specific vulnerabilities

Putting all these information together, we then analyzed each sample in our dataset—in the context of the cancer study it belongs to—to identify potential metabolic vulnerabilities. To accomplish this, for a given cancer study, a tumor or cell line sample and an isoenzyme gene set, we looked for cases where (i) one or more isoenzymes are lost because of homozygous deletion, (ii) and the other expressed isoenzymes can be selectively targeted by at least one drug. Once we found the vulnerabilities in this selective manner, we also included all possible drugs, selective or not, in our final results.

2.2.2 Vulnerability scores

To sort all predicted vulnerabilities based on their internal consistency and annotations, we assigned a score over 4.0 to each sample-specific vulnerability. For this, we checked whether a given sample-specific vulnerability satisfied any of the following criteria: (i) the homozygously deleted gene is also underexpressed (or not expressed), (ii) there are any Food and Drug Administration (FDA)-approved drugs in the suggested drug list, (iii) there are any ‘cancer’ drugs in the suggested drug list, where a cancer drug means a drug that is currently FDA-approved and being used in cancer treatment and (iv) the target of the suggested drug is not an essential gene in any of the model organisms.

2.2.3 Vulnerabilities in tumor samples and matching cell lines

We ran our analysis on 5971 cancer samples covering 16 distinct cancer studies and identified 4104 metabolic vulnerabilities in 1019 tumor samples and 482 cancer cell lines (Figs 3a and b). In all, 146 of 4104 (4%) vulnerabilities had a score of 3, whereas 31, 51 and 14% vulnerabilities had a score of 2, 1 and 0, respectively. Overall, we were able to identify 263 distinct homozygous deletions that cause a predicted vulnerability (Table 2; Supplementary Data for complete results); we found that 220 of 263 homozygous deletions were present in tumor samples and 71% of these had at least one matching cell line (Fig. 3c). We also found that 1833 (44%) of the vulnerabilities can potentially be targeted with at least one FDA-approved drug, but in a less-selective manner (Fig. 3d). One such example to this less-selective targeting is the potential use of methotrexate when either DHFR or DHFRL1 is deleted in the sample, although the drug targets both genes in this isoenzyme pair (Table 3). Furthermore, we found that in 1695 of 4104 (41%) vulnerabilities that we identified, intervention with drugs will involve targeting at least one essential enzyme (Supplementary Fig. S1).
Fig. 3.

Systematic screening of cancer samples revealed metabolic vulnerabilities that are of therapeutic interest in a uniform way across different cancer types. (a) Across 16 cancer studies, we identified 4101 vulnerabilities. (b) We screened 5971 samples (972 cell lines and 4999 tumor samples) and found 1019 tumor samples and 482 cancer cell lines to have possible metabolic vulnerabilities (red). (c) All vulnerabilities were attributable to 263 distinct homozygous deletion events; 156 (60%) of these deletions were shared between at least one cell line and one tumor sample. (d) Forty-four percent of all identified vulnerabilities can potentially be targeted with an FDA-approved drug (green) and furthermore 8% with an FDA-approved drug that is currently known to be used in cancer therapy (orange)

Table 2.

The 20 most common candidate therapeutic vulnerabilities detected in the analysis of 5971 cancer samples from 16 different studies

Serial numberIsoenzyme setDeleted geneVulnerable samples
Metabolic reactionDrugs
TumorsCell lines
1EXTL2, EXTL3EXTL317347Glucuronyl-galactosyl-proteoglycan 4-alpha-N-acetylglucosaminyltransferaseUridine-diphosphate-N-acetylglucosamine
2PAPSS1, PAPSS2PAPSS29717Adenylyl-sulfate kinaseAdenosine-5′-phosphosulfate
3CPT1C, CPT1B, CPT2, CPT1ACPT1B9010Carnitine O-palmitoyltransferaseL-carnitine
4A2M, BMP1BMP1682High-density lipoprotein–mediated lipid transportBecaplermin
5GOT1, GOT2, GOT1L1GOT1L16527Aspartate degradation IIMaleic acid, 4′-deoxy-4′-acetylyamino-pyridoxal-5′-phosphate
6GYG1, GYG2GYG2580Glycogenin glucosyltransferaseUDP-D-galactose
7ATP2C1, ATP2C2ATP2C25720Calcium transport IDesflurane/halothane
8ADA, ADAT3ADAT35313Adenine and adenosine salvage IIIPentostatin
9SAT1, SAT2SAT24844Diamine N-acetyltransferaseDiminazene
10FNTA, PGGT1BPGGT1B4715Protein geranylgeranyltransferase type ITipifarnib
11DHFR, DHFRL1DHFR475Dihydrofolate reductase5-chloryl-2,4,6-quinazolinetriamine
12AKR1B10, AKR1B1, CYP2E1CYP2E14233Methylglyoxal degradation IIITolrestat
13TK1, TK2TK2428Thymidine kinaseDithioerythritol
14ACAT1, ACAT2ACAT23923Acetyl-CoA C-acetyltransferaseSulfasalazine
15ENO1, ENO2, ENO3ENO13718Phosphopyruvate hydratase2-phosphoglycolic acid
16ACAT1, ACAT2ACAT13622Acetyl-CoA C-acetyltransferasePyripyropene A
17MTHFD1, MTHFD1LMTHFD1L3424Formate—tetrahydrofolate ligaseLY374571/LY249543
18ALDH2, ALDH3A2ALDH3A23028Putrescine degradation IIIDaidzin
19TRYP1, CATTYRP11271Ethanol degradation IVFomepizole
20AMY1A/B/C, AMY2A, AMY2BAMY1A/B/C161Alpha-amylaseAcarbose

Note: Our analysis revealed 263 candidate vulnerabilities. Each of these vulnerabilities is associated with a gene set that represents isoenzymes that catalyze a metabolic reaction, and deletion of one or more partner genes results in a vulnerability if there are targeted drug(s) that can selectively inhibit the other enzymes in the gene set. The majority of the vulnerabilities in tumors were also present in at least one cell line (see Supplementary Table S1 for an extended version of this table).

Table 3.

Vulnerabilities that can potentially be exploited with a cancer drug—a drug that is approved by FDA for use in cancer therapy

Serial numberIsoenzyme setCasesMetabolic reactionDrug(s) of interest
1TOP2B*, TOP2A*70DNA topoisomerase (ATP)-hydrolysingDaunorubicin, Epirubicin, Doxorubicin, Etoposide, Dexrazoxane
2DHFR*, DHFRL1*68dihydrofolate reductaseMethotrexate, Pemetrexed, Pralatrexate
3IKBKE*, TBK1*, IKBKB, CHUK*46IkappaB kinaseArsenic trioxide
4LIG1, LIG3, LIG4*43DNA ligase (ATP)Bleomycin
5P4HB*, MTTP*34Chylomicron-mediated lipid transportVandetanib, Nilotinib, Imatinib, Bosutinib, Dasatinib
6RRM1*, RRM2*33Synthesis and interconversion of nucleotide di- and triphosphatesClofarabine, Fludarabine, Gemcitabine
7CMPK1, CMPK2*20Deoxycytidylate kinaseGemcitabine
8GGPS1*, FDPS*7DimethylallyltranstransferaseZoledronate
9PTGS2, PTGS1*3Taglandin-endoperoxide synthaseThalidomide, Lenalidomide
10TXNRD1, TXNRD2*, TXNRD35Thioredoxin-disulfide reductaseArsenic trioxide
11TOP1, TOP3A*, TOP1MT, TOP3B4IrinotecanTopotecan

Note: In some cases, deletion of either of partner genes can result in a therapeutic vulnerability. For example, TOP2A and TOP2B are isoenzymes that function as ATP-hydrolyzing DNA topoisomerases. Of 5971 cases (tumor or cell line samples), 70 have either TOP2B- or TOP2A-deletion (*). Either of these deletions creates vulnerabilities that can be exploited with drugs, such as Doxorubicin or Etoposide, that selectively inhibit these isoenzymes.

Systematic screening of cancer samples revealed metabolic vulnerabilities that are of therapeutic interest in a uniform way across different cancer types. (a) Across 16 cancer studies, we identified 4101 vulnerabilities. (b) We screened 5971 samples (972 cell lines and 4999 tumor samples) and found 1019 tumor samples and 482 cancer cell lines to have possible metabolic vulnerabilities (red). (c) All vulnerabilities were attributable to 263 distinct homozygous deletion events; 156 (60%) of these deletions were shared between at least one cell line and one tumor sample. (d) Forty-four percent of all identified vulnerabilities can potentially be targeted with an FDA-approved drug (green) and furthermore 8% with an FDA-approved drug that is currently known to be used in cancer therapy (orange) The 20 most common candidate therapeutic vulnerabilities detected in the analysis of 5971 cancer samples from 16 different studies Note: Our analysis revealed 263 candidate vulnerabilities. Each of these vulnerabilities is associated with a gene set that represents isoenzymes that catalyze a metabolic reaction, and deletion of one or more partner genes results in a vulnerability if there are targeted drug(s) that can selectively inhibit the other enzymes in the gene set. The majority of the vulnerabilities in tumors were also present in at least one cell line (see Supplementary Table S1 for an extended version of this table). Vulnerabilities that can potentially be exploited with a cancer drug—a drug that is approved by FDA for use in cancer therapy Note: In some cases, deletion of either of partner genes can result in a therapeutic vulnerability. For example, TOP2A and TOP2B are isoenzymes that function as ATP-hydrolyzing DNA topoisomerases. Of 5971 cases (tumor or cell line samples), 70 have either TOP2B- or TOP2A-deletion (*). Either of these deletions creates vulnerabilities that can be exploited with drugs, such as Doxorubicin or Etoposide, that selectively inhibit these isoenzymes. To allow better investigation of these vulnerability results, we developed a web user interface accessible at http://cbio.mskcc.org/cancergenomics/statius. The interface allows users to browse vulnerabilities either through a cancer study or gene set-based views, and for each predicted vulnerability, it provides additional context annotations and information with external links (Fig. 4).
Fig. 4.

Four vulnerabilities, with different contexts, identified in the ovarian serous cystadenocarcinoma (TCGA) cancer study. Each vulnerability is associated with a sample and a metabolic context. Furthermore, for each vulnerability, the gene sets are annotated to provide information whether a gene is homozygously deleted (red; HomDel), essential (black; E/G), not expressed (orange; N/E), shows tissue-specific expression (green; TS/E) or is known to be selectively targeted by a drug (gray; drugs: N). For gene sets extracted from Pathway Commons, the metabolic reaction of interest is visualized as an image that was produced by ChiBE (Babur )

Four vulnerabilities, with different contexts, identified in the ovarian serous cystadenocarcinoma (TCGA) cancer study. Each vulnerability is associated with a sample and a metabolic context. Furthermore, for each vulnerability, the gene sets are annotated to provide information whether a gene is homozygously deleted (red; HomDel), essential (black; E/G), not expressed (orange; N/E), shows tissue-specific expression (green; TS/E) or is known to be selectively targeted by a drug (gray; drugs: N). For gene sets extracted from Pathway Commons, the metabolic reaction of interest is visualized as an image that was produced by ChiBE (Babur )

3 METHODS

3.1 Obtaining information on isoenzymes

3.1.1 From pathway resources: Reactome and HumanCyc

We obtained biological pathway information from both Reactome and HumanCyc (Croft ; Romero ). We used entity-level normalized BioPAX Level 3 outputs for both data resources. The normalization was accomplished through Pathway Commons 2 and cPath 2 software to standardize external references of entities in these pathway datasets (Cerami ). We then parsed these BioPAX Level 3 pathway data using Paxtools library and extracted isoenzyme gene sets using the following procedure [(Demir , 2013); http://biopax.org/paxtools.php]: we first iterated for all BiochemicalReactions that have at least one Controller to it. For a given BiochemicalReaction, we then iterated for all Controller entities of the reaction and obtained corresponding Xrefs (external references). Using Xrefs that map an entity to HGNC (HUGO Gene Nomenclature Committee), we collect HGNC gene symbols of corresponding controllers and treat them as isoenzyme groups. For each isoenzyme group, we keep the name of the reaction, the pathway it belongs to and an image of the corresponding reaction associated with that particular group for later visualization features. All reaction images were generated with ChiBE (Babur ). For the described procedure, we used the whole HumanCyc dataset, but for Reactome, we only used the reactions that belong to the Metabolism pathway (Resource Description Framework identification: http://www.reactome.org/biopax/48887Pathway991).

3.1.2 From KEGG enzyme

We also extracted metabolic isoenzyme information from KEGG Enzyme database using the provider’s Representational-state-transfer (REST)-based web service. For this, we first obtained all metabolic enzymes, identified by their corresponding EC numbers, registered in KEGG Enzyme (http://rest.kegg.jp/list/ec). Then, for each enzyme, we obtained all human genes that are associated with the enzyme and created groups of isoenzymes using their gene symbols. For later reference, we keep the primary name of the enzyme and the text-based description of the reaction associated with the corresponding isoenzyme group.

3.1.3 Combining isoenzyme data form multiple resources and filtering

After collecting isoenzyme groups, we pooled isoenzyme groups from these multiple resources. For isoenzyme gene sets that came from different resources but had the exact gene composition, we used the following priority for the data resources to decide which copy to keep in the final analysis: (i) KEGG Enzyme, (ii) Reactome (Croft ) and (iii) HumanCyc (Romero ).

3.2 Collecting drug–target data

To collect drug–target data from multiple resources, we used PiHelper and aggregated data from all data resource it supports by default: (i) DrugBank (Knox ), (ii) KEGG Drug (Kanehisa ), (iii) Rask-Andersen , (iv) Genomics of Drug Sensitivity in Cancer (Yang ), (v) Garnett and (vi) Cancer.gov (http://cancer.gov). We ran PiHelper with the default parameters and exported all aggregated drug–target data in TSV (tab-separated values) format as previously described (Aksoy ). This provided us with a list of genes that can be targeted with a drug, and we used this information to annotate all genes in our isoenzyme gene sets.

3.3 Labeling genes using additional annotations

3.3.1 Annotating tissue-specific expression patterns

For tissue-specific gene expression annotation, we used data produced by TiGER (Liu ). We downloaded raw file containing tissue-specific UniGene lists and mapped this information, i.e. whether the expression of a gene is restricted to a single tissue, using gene symbol to UniGene maps from the same provider. We also adopted the tissue terminology used by TiGER and annotated cancer studies we used in our study in accordance with this terminology (Table 1).

3.3.2 Annotating essential genes

To annotate genes that are known to be essential in a model organism, we used data provided by DEG (Zhang ). For this, we downloaded the whole database and used gene symbol-based annotations for only eukaryotes. We annotate all human genes in the database as essential in our analysis. For non-human essential genes, we used homology-group datasets provided by the HomoloGene (http://www.ncbi.nlm.nih.gov/homologene) to map these genes to their human homologues. When annotating a gene as essential, we always include the species information as part of the annotation for future reference. We collected annotations from the following model organisms: (i) Homo sapiens, (ii) Mus musculus, (iii) Drosophila melanogaster, (iv) Saccharomyces cerevisiae, (v) Caenorhabditis elegans, (vi) Danio rerio and (vii) Arabidopsis thaliana.

3.4 Handling cancer studies and genomic profiles

We accessed public data for cancer studies listed in Table 1 using cBioPortal’s web service [(Cerami ; Gao ); http://cbioportal.org]. For each study, (i) we first collected all case IDs, (ii) we then obtained categorized gene-centric CNA data (when possible, we used data generated through either GISTIC or RAE algorithms: −2: homozygous deletion; −1: heterozygous deletion; 0: diploid; 1: gain; 2: amplification) (Mermel ; Taylor ), (iii) when available, we used normalized Z-scores for gene-centric mRNA expression and treated values <−2 as underexpressed for a particular sample and (iv) manually assigned tissues based on the type of the cancer. One exception to these general rules was the Cancer Cell Line Encyclopedia (CCLE), where normalized mRNA expression data was missing. For this study, we used median-normalized gene-centric probe levels and treated log2 values <5, which corresponds to upper limit of the lower quartile of all expression data, as underexpressed. A list of genomic profile IDs that were used for this analysis can be found within the Supplementary Material. Further details for each genomic profile can be accessed from the cBioPortal Web site: http://cbioportal.org.

4 DISCUSSION

Cancer cell contains many somatic genomic alterations, some of which may result in therapeutic vulnerabilities. Therapeutic approaches targeting such vulnerabilities are promising because they are expected to be lethal to cancer cells but not to healthy (e.g. non-cancer) cells, thus reducing the potential for toxic side effects. Here we present a systematic approach to identify a subset of such vulnerabilities, involving metabolic pathways, by taking advantage of publicly available data resources. As a proof of concept, we ran our analysis on 16 cancer studies available via the cBioPortal for Cancer Genomics and predicted 4104 metabolic vulnerabilities. We included the CCLE in our analysis as a separate cancer study, and this allowed us to match vulnerabilities in tumor samples with those in cell lines. Overall, we found 2706 vulnerabilities resulting from 220 distinct homozygous deletion events in 1019 tumor samples. In all, 71% of these vulnerability-causing homozygous deletions were also present in at least one cell line, therefore, opening the possibility of testing a majority of these predicted vulnerabilities in vitro. Reassuringly, using this systematic method, we were able to detect a previously verified metabolic vulnerability, which is due to a homozygous deletion affecting an enolase isoenzyme (Muller ) (Supplementary Fig. S2). Unlike other studies that have previously predicted metabolic vulnerabilities using a theoretical model of cancer metabolism, here we interpreted all datasets in a sample-specific manner (Folger ). This helped us capture many vulnerabilities that were not reported previously (Table 2) (Folger ; Muller ). Furthermore, we based our analysis on homozygous deletions in cancer samples with a particular focus on metabolic pathways, but our method can easily be extended to signaling pathways and also to any disabling genomic or epigenomic event, such as mutations and hyper-methylation events. We restricted our analysis to consider only homozygous deletions because at the time of the study, the number of samples that have a copy-number profile was considerably higher compared with the number of samples that have either mutation or methylation profile. Moreover, we only used metabolic pathways because details of metabolic reactions are provided at a better level of granularity in many of the pathway data resources. This allowed us to infer potentially synthetic lethal gene sets from the pathway resources with higher confidence. For many signaling pathways, this type of inference is considerably harder to accomplish because they are not as well characterized and well curated as metabolic pathways yet. The quality of our vulnerability predictions highly depends on the quality of the homozygous deletion calls made for each metabolic gene. A false-positive homozygous deletion call, for example, will also lead to a false-positive vulnerability prediction in our analysis. To overcome this problem, we assign a higher score to vulnerabilities when the homozygously deleted gene is also underexpressed in a specific sample. Another likely source of false-positive predictions is our assumption that all metabolic reactions are essential for cell viability, and therefore, genes catalyzing the same reaction form a synthetic lethal group. These types of issues, however, can be easily addressed by testing a predicted vulnerability in vitro using one of the cell lines that has the vulnerability of interest. To better prioritize the vulnerabilities in terms of their applicability to the clinic and their reliability, we assigned a score (over 4.0) to each individual vulnerability we identified based on the following criteria. First, to emphasize the likelihood of homozygous deletion being true, we checked whether transcripts of homozygously deleted genes are also expressed relatively at low levels compared with the diploid samples. Next, we looked whether the suggested drug to exploit a vulnerability is either FDA-approved or already being used in cancer therapy, where satisfying either criteria indicates not only better availability of the drug for validation experiments but also relatively easier translation to clinical trials. Finally, we checked whether targeting the vulnerability will inhibit an essential gene, hence increasing the possibility of a toxic effect for the host. These criteria reflect a subjective view of a reliable vulnerability prediction and can be expanded by incorporating more annotation and supportive datasets to the analysis. For example, various drug screen studies and small hairpin RNA knockdown assays provide relative sensitivities of cell lines toward inhibition of various cellular species as public datasets (Barretina ; Cheung ), and this information can be further used in the context of vulnerabilities, where sensitivities that can be explained by a predicted vulnerability are given an extra score. Another possible extension to our scoring scheme is to give extra scores to vulnerabilities for which suggested drugs are currently being tested in clinical trials for the tumor type that matches the patient’s. Our analysis identifies only vulnerabilities for which the target gene can selectively be inhibited by a compound, but for each vulnerability prediction, we also report drugs that are less selective and yet potentially interesting for exploiting a vulnerability. Considering both selective and non-selective drugs, our results show that 44% of the identified vulnerabilities can potentially be targeted with an FDA-approved drug; moreover, a smaller fraction, 8%, of all vulnerabilities seems to be targetable with drugs that are both FDA-approved and already being used in cancer therapy (Table 3). Opportunities to exploit these vulnerabilities have previously been overlooked because genomic alterations that cause such vulnerabilities are relatively less frequent within each cancer study. We show that with the help of a systematic method that can efficiently combine data from diverse resources, it is possible to identify vulnerabilities that cover a considerable number of patients when aggregated across different cancer studies. We believe this type of systematic and patient-specific treatment suggestion will prove essential especially in designing ‘basket trials’ that will investigate the effects of a targeted agent against a specific genetic alteration (Fig. 5).
Fig. 5.

Potential applications to personalized and/or precision cancer therapy. Our method can easily be extended to identify vulnerabilities from the genomic profile of a recently diagnosed cancer patient. The candidate vulnerabilities for this patient can then be tested on primary cell cultures or xenograft models (established from patient’s tumor sample) with drugs of interest as suggested by our analysis. Once the vulnerability is verified, ‘basket’ clinical trials can be designed to test the efficacy of the drug on patients who are predicted to have this particular vulnerability

Potential applications to personalized and/or precision cancer therapy. Our method can easily be extended to identify vulnerabilities from the genomic profile of a recently diagnosed cancer patient. The candidate vulnerabilities for this patient can then be tested on primary cell cultures or xenograft models (established from patient’s tumor sample) with drugs of interest as suggested by our analysis. Once the vulnerability is verified, ‘basket’ clinical trials can be designed to test the efficacy of the drug on patients who are predicted to have this particular vulnerability
  38 in total

1.  Integrative analysis of complex cancer genomics and clinical profiles using the cBioPortal.

Authors:  Jianjiong Gao; Bülent Arman Aksoy; Ugur Dogrusoz; Gideon Dresdner; Benjamin Gross; S Onur Sumer; Yichao Sun; Anders Jacobsen; Rileen Sinha; Erik Larsson; Ethan Cerami; Chris Sander; Nikolaus Schultz
Journal:  Sci Signal       Date:  2013-04-02       Impact factor: 8.192

2.  Mapping the hallmarks of lung adenocarcinoma with massively parallel sequencing.

Authors:  Marcin Imielinski; Alice H Berger; Peter S Hammerman; Bryan Hernandez; Trevor J Pugh; Eran Hodis; Jeonghee Cho; James Suh; Marzia Capelletti; Andrey Sivachenko; Carrie Sougnez; Daniel Auclair; Michael S Lawrence; Petar Stojanov; Kristian Cibulskis; Kyusam Choi; Luc de Waal; Tanaz Sharifnia; Angela Brooks; Heidi Greulich; Shantanu Banerji; Thomas Zander; Danila Seidel; Frauke Leenders; Sascha Ansén; Corinna Ludwig; Walburga Engel-Riedel; Erich Stoelben; Jürgen Wolf; Chandra Goparju; Kristin Thompson; Wendy Winckler; David Kwiatkowski; Bruce E Johnson; Pasi A Jänne; Vincent A Miller; William Pao; William D Travis; Harvey I Pass; Stacey B Gabriel; Eric S Lander; Roman K Thomas; Levi A Garraway; Gad Getz; Matthew Meyerson
Journal:  Cell       Date:  2012-09-14       Impact factor: 41.582

3.  Genomic and epigenomic landscapes of adult de novo acute myeloid leukemia.

Authors:  Timothy J Ley; Christopher Miller; Li Ding; Benjamin J Raphael; Andrew J Mungall; A Gordon Robertson; Katherine Hoadley; Timothy J Triche; Peter W Laird; Jack D Baty; Lucinda L Fulton; Robert Fulton; Sharon E Heath; Joelle Kalicki-Veizer; Cyriac Kandoth; Jeffery M Klco; Daniel C Koboldt; Krishna-Latha Kanchi; Shashikant Kulkarni; Tamara L Lamprecht; David E Larson; Ling Lin; Charles Lu; Michael D McLellan; Joshua F McMichael; Jacqueline Payton; Heather Schmidt; David H Spencer; Michael H Tomasson; John W Wallis; Lukas D Wartman; Mark A Watson; John Welch; Michael C Wendl; Adrian Ally; Miruna Balasundaram; Inanc Birol; Yaron Butterfield; Readman Chiu; Andy Chu; Eric Chuah; Hye-Jung Chun; Richard Corbett; Noreen Dhalla; Ranabir Guin; An He; Carrie Hirst; Martin Hirst; Robert A Holt; Steven Jones; Aly Karsan; Darlene Lee; Haiyan I Li; Marco A Marra; Michael Mayo; Richard A Moore; Karen Mungall; Jeremy Parker; Erin Pleasance; Patrick Plettner; Jacquie Schein; Dominik Stoll; Lucas Swanson; Angela Tam; Nina Thiessen; Richard Varhol; Natasja Wye; Yongjun Zhao; Stacey Gabriel; Gad Getz; Carrie Sougnez; Lihua Zou; Mark D M Leiserson; Fabio Vandin; Hsin-Ta Wu; Frederick Applebaum; Stephen B Baylin; Rehan Akbani; Bradley M Broom; Ken Chen; Thomas C Motter; Khanh Nguyen; John N Weinstein; Nianziang Zhang; Martin L Ferguson; Christopher Adams; Aaron Black; Jay Bowen; Julie Gastier-Foster; Thomas Grossman; Tara Lichtenberg; Lisa Wise; Tanja Davidsen; John A Demchok; Kenna R Mills Shaw; Margi Sheth; Heidi J Sofia; Liming Yang; James R Downing; Greg Eley
Journal:  N Engl J Med       Date:  2013-05-01       Impact factor: 91.245

4.  The cBio cancer genomics portal: an open platform for exploring multidimensional cancer genomics data.

Authors:  Ethan Cerami; Jianjiong Gao; Ugur Dogrusoz; Benjamin E Gross; Selcuk Onur Sumer; Bülent Arman Aksoy; Anders Jacobsen; Caitlin J Byrne; Michael L Heuer; Erik Larsson; Yevgeniy Antipin; Boris Reva; Arthur P Goldberg; Chris Sander; Nikolaus Schultz
Journal:  Cancer Discov       Date:  2012-05       Impact factor: 39.397

5.  Comprehensive molecular characterization of human colon and rectal cancer.

Authors: 
Journal:  Nature       Date:  2012-07-18       Impact factor: 49.962

6.  Comprehensive molecular portraits of human breast tumours.

Authors: 
Journal:  Nature       Date:  2012-09-23       Impact factor: 49.962

7.  Functional genomic analysis of chromosomal aberrations in a compendium of 8000 cancer genomes.

Authors:  Tae-Min Kim; Ruibin Xi; Lovelace J Luquette; Richard W Park; Mark D Johnson; Peter J Park
Journal:  Genome Res       Date:  2012-11-06       Impact factor: 9.043

8.  Genomics of Drug Sensitivity in Cancer (GDSC): a resource for therapeutic biomarker discovery in cancer cells.

Authors:  Wanjuan Yang; Jorge Soares; Patricia Greninger; Elena J Edelman; Howard Lightfoot; Simon Forbes; Nidhi Bindal; Dave Beare; James A Smith; I Richard Thompson; Sridhar Ramaswamy; P Andrew Futreal; Daniel A Haber; Michael R Stratton; Cyril Benes; Ultan McDermott; Mathew J Garnett
Journal:  Nucleic Acids Res       Date:  2012-11-23       Impact factor: 16.971

9.  Comprehensive genomic characterization of squamous cell lung cancers.

Authors: 
Journal:  Nature       Date:  2012-09-09       Impact factor: 49.962

10.  Integrated genomic characterization of endometrial carcinoma.

Authors:  Cyriac Kandoth; Nikolaus Schultz; Andrew D Cherniack; Rehan Akbani; Yuexin Liu; Hui Shen; A Gordon Robertson; Itai Pashtan; Ronglai Shen; Christopher C Benz; Christina Yau; Peter W Laird; Li Ding; Wei Zhang; Gordon B Mills; Raju Kucherlapati; Elaine R Mardis; Douglas A Levine
Journal:  Nature       Date:  2013-05-02       Impact factor: 49.962

View more
  19 in total

1.  Collateral Lethality: A new therapeutic strategy in oncology.

Authors:  Florian L Muller; Elisa A Aquilanti; Ronald A DePinho
Journal:  Trends Cancer       Date:  2015-11-01

2.  Defining a Cancer Dependency Map.

Authors:  Aviad Tsherniak; Francisca Vazquez; Phil G Montgomery; Barbara A Weir; Gregory Kryukov; Glenn S Cowley; Stanley Gill; William F Harrington; Sasha Pantel; John M Krill-Burger; Robin M Meyers; Levi Ali; Amy Goodale; Yenarae Lee; Guozhi Jiang; Jessica Hsiao; William F J Gerath; Sara Howell; Erin Merkel; Mahmoud Ghandi; Levi A Garraway; David E Root; Todd R Golub; Jesse S Boehm; William C Hahn
Journal:  Cell       Date:  2017-07-27       Impact factor: 41.582

Review 3.  Using drug response data to identify molecular effectors, and molecular "omic" data to identify candidate drugs in cancer.

Authors:  William C Reinhold; Sudhir Varma; Vinodh N Rajapakse; Augustin Luna; Fabricio Garmus Sousa; Kurt W Kohn; Yves G Pommier
Journal:  Hum Genet       Date:  2014-09-12       Impact factor: 4.132

4.  Large-scale automated machine reading discovers new cancer-driving mechanisms.

Authors:  Marco A Valenzuela-Escárcega; Özgün Babur; Gus Hahn-Powell; Dane Bell; Thomas Hicks; Enrique Noriega-Atala; Xia Wang; Mihai Surdeanu; Emek Demir; Clayton T Morrison
Journal:  Database (Oxford)       Date:  2018-01-01       Impact factor: 3.451

5.  Current dichotomy between traditional molecular biological and omic research in cancer biology and pharmacology.

Authors:  William C Reinhold
Journal:  World J Clin Oncol       Date:  2015-12-10

6.  Hypermutation takes the driver's seat.

Authors:  Matthias Schlesner; Roland Eils
Journal:  Genome Med       Date:  2015-03-28       Impact factor: 11.117

7.  ccmGDB: a database for cancer cell metabolism genes.

Authors:  Pora Kim; Feixiong Cheng; Junfei Zhao; Zhongming Zhao
Journal:  Nucleic Acids Res       Date:  2015-10-30       Impact factor: 16.971

Review 8.  Public data and open source tools for multi-assay genomic investigation of disease.

Authors:  Lavanya Kannan; Marcel Ramos; Angela Re; Nehme El-Hachem; Zhaleh Safikhani; Deena M A Gendoo; Sean Davis; David Gomez-Cabrero; Robert Castelo; Kasper D Hansen; Vincent J Carey; Martin Morgan; Aedín C Culhane; Benjamin Haibe-Kains; Levi Waldron
Journal:  Brief Bioinform       Date:  2015-10-12       Impact factor: 11.622

Review 9.  Prediction of Genetic Interactions Using Machine Learning and Network Properties.

Authors:  Neel S Madhukar; Olivier Elemento; Gaurav Pandey
Journal:  Front Bioeng Biotechnol       Date:  2015-10-26

10.  Prioritization of anticancer drugs against a cancer using genomic features of cancer cells: A step towards personalized medicine.

Authors:  Sudheer Gupta; Kumardeep Chaudhary; Rahul Kumar; Ankur Gautam; Jagpreet Singh Nanda; Sandeep Kumar Dhanda; Samir Kumar Brahmachari; Gajendra P S Raghava
Journal:  Sci Rep       Date:  2016-03-31       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.