{"id":60,"date":"2016-11-24T16:43:24","date_gmt":"2016-11-24T15:43:24","guid":{"rendered":"http:\/\/people.unil.ch\/kevinhuguenin\/?page_id=60"},"modified":"2025-07-14T11:03:43","modified_gmt":"2025-07-14T09:03:43","slug":"projects","status":"publish","type":"page","link":"https:\/\/people.unil.ch\/kevinhuguenin\/research\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<h2>On-going projects<\/h2>\n<h3 style=\"margin-bottom: 0em\">Security and Privacy with Second-Hand Electronic Devices<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">Second-hand electronic storage devices, such as hard drives and USB sticks, are commonly sold on dedicated online platforms such as eBay and Ricardo (in Switzerland). Although second-hand devices are more affordable and more environment-friendly than new products, the remnant data that the electronic storage devices can contain (i.e., files that the users do not delete or that can still be recovered after being deleted) could create security and privacy risks, for instance if they include malware or personal data from a previous owner (e.g., intimate photos). In this project, we will conduct both a user-centric and a legal analysis of remnant data found on second-hand storage devices. This project is funded by <a href=\"https:\/\/e4s.center\/research\/\">E4S<\/a> and <a href=\"https:\/\/data.snf.ch\/grants\/grant\/\">SNSF<\/a>.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_2ndhand\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Interdependent privacy<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we study interdependent privacy risks, that is how some individuals can compromise the privacy of others (family members, friends, colleagues or even complete strangers), either directly \u2013 typically in the case where personal data involves multiple data subjects \u2013 or indirectly \u2013 typically when the personal data of individuals are correlated due to phenomena such as homophily or genetic inheritance. For the application domain, we focus mostly on (co-) location data, genomic data, photos, and address book data (i.e., contact information). By relying on statistical inference techniques, we analyze to which extent sensitive information about individuals can be inferred from the data of other individuals; we also study the interplay between individuals&#8217; decisions, in terms of information sharing and privacy behavior in general, by using game theory (<i class=\"fas fa-database\"><\/i>\u00a0<a href=\"https:\/\/people.unil.ch\/kevinhuguenin\/research\/datasets\/\">dataset<\/a>). We also design and build technical (e.g., encryption) and non-technical (e.g., negotiation and mediation) solutions for sharing multi-subject and interdependent data (typically group photos and genomic data to name a few;\u00a0<i class=\"fas fa-video\"><\/i>\u00a0<a href=\"https:\/\/isplab.unil.ch\/kevin\/research\/consenshare\/video_ConsenShare.mp4\">video<\/a>) consensually. In collaboration with jurists,\u00a0we assess the protective capacity of privacy and data protection laws (in particular <a href=\"https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rules_en\" target=\"_blank\" rel=\"noopener noreferrer\">EU GDPR<\/a>) for interdependent data. Finally, we develop an interactive tool for estimating kin genomic privacy: <i class=\"fas fa-tools\"><\/i>\u00a0try it out <a href=\"#kin-genomic-privacy-meter\">below<\/a> or on the original <a href=\"https:\/\/santeperso.unil.ch\/privacy\/?src=isplab\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a>! We also wrote a comprehensive survey and an encyclopedia entry on the topic.<\/p>\n<p><i class=\"far fa-newspaper\"><\/i> Coverage: <a href=\"https:\/\/wp.unil.ch\/hecimpact\/kept-in-the-picture-a-consent-based-system-for-sharing-data-online\/\">HEC Lausanne<\/a>, <a href=\"https:\/\/www.ictjournal.ch\/articles\/2018-10-08\/des-chercheurs-lausannois-inventent-un-systeme-empechant-la-publication-non\">ICTjournal<\/a>.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_interdependent_privacy\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Shadow Health-Related Data<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we define and study shadow health-related data, that is health-related data generated\/processed using general-purpose digital tools outside of a professional healthcare information system. Typical examples include health-related queries made by individuals on general-purpose search engines and on LLM-based chatbots, photos of skin conditions, medical appointments, and contact information of health professionals, all synced to the cloud. This project is partially funded by the Chuard-Schmid Foundation hosted at UNIL.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_SHRD\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Privacy\/utility trade-off in location-based and wearable-based services<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we study the location-privacy implications of location-based and wearable-based services, in particular when auxiliary information is available (e.g., semantic information about the visited places: for instance \u201chotel\u201d, and co-locations of users: for instance Alice and Bob appear together on a photo or have the same IP address). In addition, we study the effect of privacy protection mechanisms, including generalization (e.g., replacing the exact coordinates of a location with the street name or replacing the precise semantic information of a location with a less precise version: for instance \u201chotel\u201d becomes \u201ctravel place\u201d), on the users&#8217; privacy and perceived utility. To do so, we rely on statistical inference and machine learning techniques, which we apply to data collected through guided surveys and data collection campaigns involving real users (<i class=\"fas fa-database\"><\/i>\u00a0<a href=\"https:\/\/people.unil.ch\/kevinhuguenin\/research\/datasets\/\">dataset<\/a>). The ultimate goal of this project is to build accurate privacy and utility models (which depend on the accuracy of the disclosed information) for exploring and optimizing the privacy\/utility trade-off in location based systems. Recently, we started investigating the utility and privacy implications of the use of wearable devices (typically wristbands) (funded by <a href=\"https:\/\/data.snf.ch\/grants\/grant\/178978\" target=\"_blank\" rel=\"noopener\">SNSF<\/a>\u00a0and armasuisse&#8217;s <a href=\"https:\/\/www.ar.admin.ch\/en\/armasuisse-wissenschaft-und-technologie-w-t\/cyber-defence_campus.html\" target=\"_blank\" rel=\"noopener\">cyber-defence campus<\/a>) and in particular to which extent users of such devices can be (psychologically) profiled.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_privacy_utility\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Genomic privacy<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we study to which extent genomic databases can be de-anonymized, by exploiting knowledge about phenotypic traits of the users whose genomes appear in the database (e.g., blood type, eye and hair color) and statistical relationships between genomic and phenotypic information (e.g., the probability that an individual has blue eyes given that the value of SNP <a href=\"https:\/\/snpedia.com\/index.php\/rs1800407\" target=\"_blank\" rel=\"noopener noreferrer\">rs1800407<\/a> in her genome is GG). To do so, we design and implement a de-anonymization attack by relying on a standard maximum-weight matching algorithm executed on the genotypes-phenotypes compatibility (bi-partite) graph, and we evaluate it on a large dataset from the <a href=\"https:\/\/opensnp.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">OpenSNP<\/a> platform. We also study possible countermeasures. We develop an interactive tool for estimating kin genomic privacy based only on the family tree of the target individual and on the list of relatives whose genomes are know (e.g., because they used a direct-to-consumer genetic testing service such as 23andme): <i class=\"fas fa-tools\"><\/i>\u00a0try it out <a href=\"#kin-genomic-privacy-meter\">below<\/a> or on the original <a href=\"https:\/\/santeperso.unil.ch\/privacy\/?src=isplab\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a>! \u00a0This last project is funded by the <a href=\"https:\/\/www.leenaards.ch\" target=\"_blank\" rel=\"noopener\">Leenaards Foundation<\/a>.<\/p>\n<p style=\"text-align: justify\"><strong>Estimate your kin genomic privacy!<\/strong>\u00a0<strong>(1)<\/strong> <i class=\"fas fa-user-plus\"><\/i> build your\/a family tree, <strong>(2)<\/strong>\u00a0<i class=\"fas fa-dna\"><\/i><i class=\"fas fa-plus fa-xs\"><\/i>\u00a0indicate the individuals whose genomes might have used a genetic-testing service (e.g., 23andMe), <strong>(3)<\/strong>\u00a0<i class=\"fas fa-crosshairs\"><\/i>\u00a0indicate the \u201ctarget\u201d, you or any other family member, whose genomic privacy you want to estimate, and <strong>(4)<\/strong>\u00a0<i class=\"fas fa-tachometer-alt\"><\/i>\u00a0observe the target\u2019s genomic privacy score indicated in the bar on the right.<\/p>\n<div id=\"kin-genomic-privacy-meter\" data-kgpmeter-api-url=\"https:\/\/santeperso.unil.ch\/integration\/\" data-kgpmeter-lng=\"en\" data-kgpmeter-max-height=\"1000\"><\/div>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_deanonymization_genomic\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h2 style=\"text-align: center\">***<\/h2>\n<h2>Past projects (most recent)<\/h2>\n<h3 id=\"web_downloads\" style=\"margin-bottom: 0em\">Interdependent security for Web resources<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we study the interdependent security risks that arise when a website relies on resources (e.g., scripts, downloads) stored on external servers (e.g., mirror, content delivery networks). More specifically, we study the security behavior of Internet users \u00a0when downloading files from the Web and we develop automated tools to help them. We study the usability and effectiveness of one common integrity-verification mechanism: checksums. To do so, we conduct large-scale surveys and <em>in situ<\/em> experiments with eye tracking. We also develop a browser extension for Chrome to make checksum verifications automatic; <i class=\"fas fa-tools\"><\/i>\u00a0<a href=\"https:\/\/github.com\/checksum-lab\/checksum-lab.github.io\/raw\/master\/extension.zip\" target=\"_blank\" rel=\"noopener noreferrer\">try it out<\/a>! (<i class=\"fas fa-video\"><\/i>\u00a0<a href=\"https:\/\/raw.githubusercontent.com\/isplab-unil\/checksum-lab.github.io\/master\/demo.mp4\" target=\"_blank\" rel=\"noopener noreferrer\">demo<\/a>, <i class=\"fas fa-globe\"><\/i>\u00a0<a href=\"https:\/\/github.com\/isplab-unil\/download-checksum\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a>). We conduct an experiment to study users&#8217; download behaviors and their exposition\/reaction to checksums \u201cin the wild\u201d. Finally, we focus on another integrity-verification mechanism (for scripts and stylesheets): subresource integrity (<a href=\"https:\/\/www.w3.org\/TR\/SRI\/\" target=\"_blank\" rel=\"noopener noreferrer\">SRI<\/a>), a recommendation from the <a href=\"https:\/\/www.w3.org\" target=\"_blank\" rel=\"noopener noreferrer\">W3C<\/a> and adopted in most browsers. We perform a large-scale longitudinal analysis of the Web (based on the <a href=\"https:\/\/commoncrawl.org\" target=\"_blank\" rel=\"noopener noreferrer\">CommonCrawl<\/a> dataset) to measure its adoption and its usage. We also conduct a survey of web developers to assess their knowledge and understanding of SRI and of the issues it addresses. This last project is funded by the <a href=\"https:\/\/haslerstiftung.ch\/en\/welcome-to-the-hasler-foundation\/\" target=\"_blank\" rel=\"noopener\">Hasler Foundation<\/a>.<\/p>\n<p><i class=\"far fa-newspaper\"><\/i>\u00a0Coverage: <a href=\"https:\/\/blog.acolyer.org\/2018\/11\/28\/towards-usable-checksums-automating-the-integrity-verification-of-web-downloads-for-the-masses\/\">The morning paper<\/a>.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_web_download_security\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Privacy and security of trajectory-based online services<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we design and build a system that enables mobile users to prove to a third party certain aggregated properties about the routes they take (e.g., covered distance) without disclosing the routes themselves. Our system relies on existing Wi-Fi access point infrastructures and involves cryptographic techniques; it has direct applications in activity-based social networks (e.g., GarminConnect, RunKeeper) and location-based activity-tracking that is performed by health insurance companies (<a href=\"https:\/\/www.forbes.com\/sites\/parmyolson\/2014\/06\/19\/wearable-tech-health-insurance\" target=\"_blank\" rel=\"noopener noreferrer\">link<\/a>) as a user can prove she covered a given distance and a given elevation gain without disclosing where she carried out her physical activity. We evaluate our system by using large <a href=\"https:\/\/people.unil.ch\/kevinhuguenin\/research\/datasets\/\">datasets<\/a> of Wi-Fi access point locations and location-based activities GPS traces. We also design and build private and secure ridehailing\/ridesharing systems; <i class=\"fab fa-github\"><\/i>\u00a0<a href=\"https:\/\/github.com\/lca1\/ORide\" target=\"_blank\" rel=\"noopener noreferrer\">check it out<\/a>!<\/p>\n<p><i class=\"far fa-newspaper\"><\/i> Coverage: <a href=\"https:\/\/www.wired.com\/story\/oride-encrypted-rideshare\/\">Wired<\/a>.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_privacy_activity\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Automatic and dynamic information sharing<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we study the factors that influence how mobile users to share information, such as their locations, with their friends and with service providers (through mobile apps, for instance). Through targeted user-surveys and field experiments, we collect data about users&#8217; sharing decisions (grant, deny, obfuscate\u2013i.e., share a less precise version of the information) to gain insights into the users&#8217; decision process. We also evaluate the potential of (semi-)automatic decision making for information sharing using machine-learning techniques. We design and implement a system to predict users&#8217; decisions, based on a number of contextual features including location and time; if the system is sufficiently confident, it makes the decision on behalf of the users, otherwise, the user is asked to manually make the decision, thus the system is dynamically trained. We apply our approach to instant messaging and <a href=\"https:\/\/spism.epfl.ch\" target=\"_blank\" rel=\"noopener noreferrer\">permissions for mobile apps<\/a>. We ran a <a href=\"https:\/\/spism.epfl.ch\/smarper.html\" target=\"_blank\" rel=\"noopener noreferrer\">field experiment<\/a> for our new permission system for Android (<i class=\"fas fa-database\"><\/i>\u00a0<a href=\"https:\/\/people.unil.ch\/kevinhuguenin\/research\/datasets\/\">dataset<\/a>, <i class=\"fas fa-globe\"><\/i>\u00a0<a href=\"https:\/\/spism.epfl.ch\/\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a>); <i class=\"fab fa-github\"><\/i> <a href=\"https:\/\/github.com\/lca1\/smarper\" target=\"_blank\" rel=\"noopener noreferrer\">check it out<\/a>!<\/p>\n<p style=\"text-align: justify\"><i class=\"far fa-newspaper\"><\/i> Coverage: [fr] magazine of the <a href=\"https:\/\/www.frc.ch\/articles\/happes-par-nos-apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">f\u00e9d\u00e9ration romande des consommateurs<\/a> (frc, consumer association).<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_information_sharing\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Mobile app privacy<\/h3>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we study the privacy threats related to the access to the list of installed app on mobile devices. We also design and implement HideMyApp (HMA), an effective and practical solution for hiding the presence of (sensitive) mobile apps from nosy apps. HMA relies on a combination of virtualization and obfuscation techniques based on container apps. (<i class=\"fas fa-video\"><\/i>\u00a0<a href=\"https:\/\/isplab.unil.ch\/kevin\/research\/hma\/demo_HMA.mp4\" target=\"_blank\" rel=\"noopener noreferrer\">demo<\/a>, <i class=\"fas fa-globe\"><\/i> <a href=\"https:\/\/hma.epfl.ch\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a>). <i class=\"fab fa-github\"><\/i>\u00a0<a href=\"https:\/\/github.com\/lca1\/HideMyApp\" target=\"_blank\" rel=\"noopener noreferrer\">check it out<\/a>!<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_mobile_app_privacy\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Efficient and Transparent Wi-Fi Offloading<\/h3>\n<p><em>with\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/erwan-le-merrer-171a07102\/\" target=\"_blank\" rel=\"noopener noreferrer\">Erwan Le Merrer<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/nicolas-le-scouarnec-6a1673105\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nicolas Le Scouarnec<\/a> and\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/gilles-straub-10741b6\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gilles Straub<\/a> (Technicolor).<\/em><\/p>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we design and build a system that enables mobile users to offload their upload tasks (e.g., photos and videos to be uploaded on Facebook while on the go) on Wi-Fi access points at full speed, that is at the speed of the Wi-Fi communication, not that of the broadband connection of the access point that often constitutes a bottleneck. To do so, our system relies on the storage and processing capabilities of common devices located on the access point LAN (e.g., NAS, set-top boxes, gateways). Our system operates seamlessly on HTTP(S) POSTs, making it highly generic and widely applicable; also, it requires only limited software changes on the access points and on the target web servers, and none to existing protocols or browsers. We evaluate our system by using a large <a href=\"https:\/\/people.unil.ch\/kevinhuguenin\/research\/datasets\/\">dataset<\/a> of Wi-Fi access point locations.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_wifi_offloading\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Social-Aware Data Replication for Geo-Distributed Social Networks<\/h3>\n<p><em>with\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/vijayerramilli\/\" target=\"_blank\" rel=\"noopener noreferrer\">Vijay Erramilli<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/nikolaoslaoutaris\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nikos Laoutaris<\/a>,\u00a0<a href=\"https:\/\/ai.google\/research\/people\/105042\" target=\"_blank\" rel=\"noopener noreferrer\">Dina Papagiannaki<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/stefanotraverso\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stefano Traverso<\/a> and\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/ionuttrestian\/\">Ionut Trestian<\/a> (Telef\u00f3nica).<\/em><\/p>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we design and build a system that flattens the replication traffic (hence the traffic costs as traffic is usually charged based on peak use, i.e., so-called <em>burstable billing<\/em>) between the geo-distributed datacenters operated by a social network provider, and it minimizes the inconsistency perceived by the users. To do so, our systems exploits information about the social ties between the social-network users and the information about user time-zones and user-activity patterns in order to delay the replication of updates that are not likely to be read in the coming hours (e.g., the replication\u2013to a datacenter in Europe\u2013of an update from a user who has no or very few friends in Europe, the replication of an update to a datacenter in Europe at 3am, as most European users are not connected to the social network at this time of the day). We evaluate our system by using a large dataset from Twitter.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_social_replication\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n<h3 style=\"margin-bottom: 0em\">Trajectory Prediction in Multi-Player Online Games<\/h3>\n<p><em>with\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/bettina-kemme-63115b47\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bettina Kemme<\/a> and\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/yahyavi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amir Yahyavi<\/a> (McGill University).<\/em><\/p>\n<p style=\"text-align: justify;margin-top: 1em\">In this project, we build a method for predicting short-term trajectories of avatars in multi-player online games (incl. role-playing games and first-person shooter games). Such prediction techniques are key in multiplayer online games as they allow to reduce the position-update traffic; this is particularly important in decentralized peer-to-peer architectures. Our method incorporates, through a physics-inspired force model, semantic information about the game environment, such as neighboring items and points of interest, and the states of the avatars (e.g., health points). We evaluate our method by using datasets of avatar trajectories from Quake III and World of Warcraft.<\/p>\n<p><strong>Publications<\/strong><\/p>\n<div id=\"publications_mmog_mobility\" class=\"docs\">Retrieving publications <i class=\"fas fa-spinner fa-spin\"><\/i><\/div>\n","protected":false},"excerpt":{"rendered":"<p>On-going projects Security and Privacy with Second-Hand Electronic Devices Second-hand electronic storage devices, such as hard drives and USB sticks, are commonly sold on dedicated online platforms such as eBay and Ricardo (in Switzerland). Although second-hand devices are more affordable and more environment-friendly than new products, the remnant data that the electronic storage devices can &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/people.unil.ch\/kevinhuguenin\/research\/projects\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Projects&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1001071,"featured_media":0,"parent":108,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-60","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/pages\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/users\/1001071"}],"replies":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":3,"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":1319,"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/pages\/60\/revisions\/1319"}],"up":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/pages\/108"}],"wp:attachment":[{"href":"https:\/\/people.unil.ch\/kevinhuguenin\/wp-json\/wp\/v2\/media?parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}