{"id":20,"date":"2024-02-19T22:17:17","date_gmt":"2024-02-19T21:17:17","guid":{"rendered":"https:\/\/people.unil.ch\/mathiashumbert\/?page_id=20"},"modified":"2025-12-08T16:42:24","modified_gmt":"2025-12-08T15:42:24","slug":"publications","status":"publish","type":"page","link":"https:\/\/people.unil.ch\/mathiashumbert\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<title>List of publications<\/title>\n    <h3>2025<\/h3>\n<article>\n    <strong>Are cybersecurity firms different? Intra-sector and cross-industry comparisons of financial performance<\/strong><br>\n    <span>\n        <em>Mar\u00e9chal Lo\u00efc<\/em>, <em>Mermoud Alain<\/em>, <em>Percia David Dimitri<\/em>, <em>Humbert Mathias<\/em>, 2025, Journal of Cybersecurity, vol.11, issue 1<\/span><br><span>\n        <a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyaf032\" target=\"_blank\" rel=\"noopener\">DOI<\/a>\n    <\/span>\n    <br> <br>\n<\/article>\n<article>\n            <strong>Addressing the Address Books\u2019 (Interdependent) Privacy Issues<\/strong>\n            <br><span><em>Salehzadeh Niksirat Kavous<\/em>, <em>Velykoivanenko Lev<\/em>, <em>M\u00e4tzler Samuel<\/em>, <em>Mulders Stephan<\/em>, <em>Tam\u00f2-Larrieux Aurelia<\/em>, <em>Boldi Marc-Olivier<\/em>, <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2025, 34th USENIX Security Symposium (USENIX Security 25)<\/span><br>\n            <span><a href=\"https:\/\/iris.unil.ch\/handle\/iris\/264249\" target=\"_blank\" rel=\"noopener\">IRIS<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_2EB47972CFE9\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n    \n    <h3>2024<\/h3>\n        <article>\n            <strong>Link Stealing Attacks Against Inductive Graph Neural Networks<\/strong>\n            <br><span><em>Wu Yixin<\/em>, <em>He Xinlei<\/em>, <em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, <em>Backes Michael<\/em>, <em>Gong Neil Zhenqiang<\/em>, <em>Zhang Yang<\/em>, 2024, Proceedings on Privacy Enhancing Technologies (PoPETs)<\/span><br>\n            <span><a href=\"https:\/\/doi.org\/10.56553\/popets-2024-0143\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/iris.unil.ch\/handle\/iris\/187232\" target=\"_blank\" rel=\"noopener\">IRIS<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_748C8EFE1E2F\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n\n        <article>\n            <strong>Shadow Health-Related Data: Definition, Categorization, and User Perspectives<\/strong>\n            <br><span><em>El Zein Yamane<\/em>, <em>Salehzadeh Niksirat Kavous<\/em>, <em>Zufferey No\u00e9<\/em>,  <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2024, Proceedings of the European Symposium on Usable Security (EuroUSEC)<\/span><br>\n            <span><a href=\"https:\/\/doi.org\/10.1145\/3688459.3688462\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/iris.unil.ch\/handle\/iris\/169634\" target=\"_blank\" rel=\"noopener\">IRIS<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_703F3D2D6542\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n\n        <article>\n            <strong>Our Data, Our Solutions: A Participatory Approach for Enhancing Privacy in Wearable Activity Tracker Third-Party Apps<\/strong>\n            <br><span><em>Zufferey No\u00e9<\/em>, <em>Salehzadeh Niksirat Kavous<\/em>, <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2024, Proceedings on Privacy Enhancing Technologies (PoPETs)<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_66EBE0BBFC88\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Know their Customers: An Empirical Study of Online Account Enumeration Attacks<\/strong>\n            <br><span><em>Maceiras Ma\u00ebl<\/em>, <em>Salehzadeh Niksirat Kavous<\/em>, <em>Bernard Ga\u00ebl<\/em>, <em>Garbinato Benoit<\/em>, <em>Cherubini Mauro<\/em>, <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2024, ACM Transactions on the Web<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3664201\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_912816455634\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs<\/strong>\n            <br><span><em>Celeny Daniel<\/em>, <em>Mar\u00e9chal Lo\u00efc<\/em>, <em>Rousselot Evgueni<\/em>, <em>Mermoud Alain<\/em>, <em>Humbert Mathias<\/em>, 2024, 23rd Workshop on the Economics of Information Security<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_86F8470FCBDD\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Shorts vs. Regular Videos on YouTube: A Comparative Analysis of User Engagement and Content Creation Trends<\/strong>\n            <br><span><em>Violot Caroline<\/em>, <em>Elmas Tugrulcan<\/em>, <em>Bilogrevic Igor<\/em>, <em>Humbert Mathias<\/em>, 2024, Proceedings of the ACM Web Science Conference<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_FD869BFBFBAF\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland<\/strong>\n            <br><span><em>Salehzadeh Niksirat Kavous<\/em>, <em>Korka Diana<\/em>, <em>Jacquemin Quentin<\/em>, <em>Vanini C\u00e9line<\/em>, <em>Humbert Mathias<\/em>, <em>Cherubini Mauro<\/em>, <em>M\u00e9tille Sylvain<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2024, Proc. of the Privacy Enhancing Technologies (PoPETs)<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.56553\/popets-2024-0057\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_B69A6B006D03\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Quantifying Privacy Risks of Prompts in Visual Prompt Learning<\/strong>\n            <br><span><em>Wu Yixin<\/em>, <em>Wen Rui<\/em>, <em>Backes Michael<\/em>, <em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, <em>Shen Yun<\/em>, <em>Zhang Yang<\/em>, 2024, 33rd USENIX Security Symposium (USENIX Security 24)<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_E408EF12DA5D\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Wearable Activity Trackers: A Survey on Utility, Privacy, and Security<\/strong>\n            <br><span><em>Salehzadeh Niksirat Kavous<\/em>, <em>Velykoivanenko Lev<\/em>, <em>Zufferey No\u00e9<\/em>, <em>Cherubini Mauro<\/em>, <em>Huguenin K\u00e9vin<\/em>, <em>Humbert Mathias<\/em>, 2024, ACM Computing Surveys<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3645091\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_8F566FED6FC6\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2023<\/h3>\n        <article>\n            <strong>Data Poisoning Attacks Against Multimodal Encoders<\/strong>\n            <br><span><em>Yang Ziqing<\/em>, <em>He Xinlei<\/em>, <em>Li Zheng<\/em>, <em>Backes Michael<\/em>, <em>Humbert Mathias<\/em>, <em>Berrang Pascal<\/em>, <em>Zhang Yang<\/em>, 2023, International Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_695B8E252CA8\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers<\/strong>\n            <br><span><em>Zufferey No\u00e9<\/em>, <em>Humbert Mathias<\/em>, <em>Tavenard Romain<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2023, Proceedings of the USENIX Security Symposium (USENIX Security)<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_4312C7E1B88F\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>\u201cRevoked just now!\u201d Users\u2019 Behaviors Toward Fitness-Data Sharing with Third-Party Applications<\/strong>\n            <br><span><em>Zufferey No\u00e9<\/em>, <em>Salehzadeh Niksirat Kavous<\/em>, <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2023, Proceedings on Privacy Enhancing Technologies<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.56553\/popets-2023-0004\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_1C9A39968549\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2022<\/h3>\n        <article>\n            <strong>Graph Unlearning<\/strong>\n            <br><span><em>Chen Min<\/em>, <em>Zhang Zhikun<\/em>, <em>Wang Tianhao<\/em>, <em>Backes Michael<\/em>, <em>Humbert Mathias<\/em>, <em>Zhang Yang<\/em>, 2022, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3548606.3559352\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_F0D8191B0A1D\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission<\/strong>\n            <br><span><em>Senol Asuman<\/em>, <em>Acar Gunes<\/em>, <em>Humbert Mathias<\/em>, <em>Borgesius Frederik Zuiderveen<\/em>, 2022, 31st USENIX Security Symposium (USENIX Security 22)<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_C640E9308C62\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection<\/strong>\n            <br><span><em>Cochard Victor<\/em>, <em>Pfammatter Damian<\/em>, <em>Duong Chi Thang<\/em>, <em>Humbert Mathias<\/em>, 2022, Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&amp;P)<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_36DEE8E777F9\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>KGP Meter: Communicating Kin Genomic Privacy to the Masses<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Dupertuis Didier<\/em>, <em>Cherubini Mauro<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2022, Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&amp;P)<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP53844.2022.00033\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_0D43E1BE4D8F\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Learning From the Past to Improve the Future : Value-Added Services as a Driver for Mass Adoption of Contact Tracing Apps<\/strong>\n            <br><span><em>Naous Dana<\/em>, <em>Bonner Manus<\/em>, <em>Humbert Mathias<\/em>, <em>Legner Christine<\/em>, 2022, Business and Information Systems Engineering<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/s12599-022-00742-2\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_2D7C646ED110\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2021<\/h3>\n        <article>\n            <strong>When Machine Unlearning Jeopardizes Privacy<\/strong>\n            <br><span><em>Chen Min<\/em>, <em>Zhang Zhikun<\/em>, <em>Wang Tianhao<\/em>, <em>Backes Michael<\/em>, <em>Humbert Mathias<\/em>, <em>Zhang Yang<\/em>, 2021, CCS \u201921: 2021 ACM SIGSAC Conference on Computer and Communications Security<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3460120.3484756\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_E901AD8FB769\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Are Those Steps Worth Your Privacy? Fitness-Tracker Users&#8217; Perceptions of Privacy and Utility<\/strong>\n            <br><span><em>Velykoivanenko Lev<\/em>, <em>Salehzadeh Niksirat Kavous<\/em>, <em>Zufferey No\u00e9<\/em>, <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, <em>Cherubini Mauro<\/em>, 2021, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)} \/ ACM Conference on Ubiquitous Computing (UbiComp)<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3494960\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_117985B0DD0D\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Interdependent Privacy<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2021, Encyclopedia of Cryptography, Security and Privacy<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-27739-9_1544-1\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_891DBE98EFC1\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2020<\/h3>\n        <article>\n            <strong>Towards Mass Adoption of Contact Tracing Apps &#8211; Learning from Users\u2019 Preferences to Improve App Design<\/strong>\n            <br><span><em>Naous Dana<\/em>, <em>Bonner Manus<\/em>, <em>Humbert Mathias<\/em>, <em>Legner Christine<\/em>, 2020, <\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_34B012D3F539\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Towards Plausible Graph Anonymization<\/strong>\n            <br><span><em>Zhang Yang<\/em>, <em>Humbert Mathias<\/em>, <em>Surma Bartlomiej<\/em>, <em>Manoharan Praveen<\/em>, <em>Vreeken Jilles<\/em>, <em>Backes Michael<\/em>, 2020, 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_EDC29192D2BA\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models<\/strong>\n            <br><span><em>Salem Ahmed<\/em>, <em>Sautter Yannick<\/em>, <em>Backes Michael<\/em>, <em>Humbert Mathias<\/em>, <em>Zhang Yang<\/em>, 2020, <\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_72B9CC50208C\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data<\/strong>\n            <br><span><em>Raisaro Jean Louis<\/em>, <em>Troncoso-Pastoriza Juan Ram\u00f3n<\/em>, <em>El-Zein Yamane<\/em>, <em>Humbert Mathias<\/em>, <em>Troncoso Carmela<\/em>, <em>Fellay Jacques<\/em>, <em>Hubaux Jean-Pierre<\/em>, 2020, Digital Personalized Health and Medicine &#8211; Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28 &#8211; May 1, 2020<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.3233\/SHTI200158\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_D9BAC18E3C53\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Contact Tracing: An Overview of Technologies and Cyber Risks<\/strong>\n            <br><span><em>Legendre Franck<\/em>, <em>Humbert Mathias<\/em>, <em>Mermoud Alain<\/em>, <em>Lenders Vincent<\/em>, 2020, <\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_F1377E8117EE\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Membership Inference Against DNA Methylation Databases<\/strong>\n            <br><span><em>Hagestedt Inken<\/em>, <em>Humbert Mathias<\/em>, <em>Berrang Pascal<\/em>, <em>Lehmann Irina<\/em>, <em>Eils Roland<\/em>, <em>Backes Michael<\/em>, <em>Zhang Yang<\/em>, 2020, IEEE European Symposium on Security and Privacy, EuroS&amp;P 2020, Genoa, Italy, September 7-11, 2020<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP48549.2020.00039\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_737D68987C7E\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data.<\/strong>\n            <br><span><em>Raisaro J.L.<\/em>, <em>Troncoso-Pastoriza J.R.<\/em>, <em>El-Zein Y.<\/em>, <em>Humbert M.<\/em>, <em>Troncoso C.<\/em>, <em>Fellay J.<\/em>, <em>Hubaux J.P.<\/em>, 2020, Studies in health technology and informatics<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.3233\/SHTI200158\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/www.webofscience.com\/wos\/woscc\/full-record\/WOS:000625278800048\" target=\"_blank\" rel=\"noopener\">WoS<\/a> | <a href=\"https:\/\/pubmed.ncbi.nlm.nih.gov\/32570382\" target=\"_blank\" rel=\"noopener\">Pmid<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_E4D4CB80455C\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>A Study on the Use of Checksums for Integrity Verification of Web Downloads<\/strong>\n            <br><span><em>Meylan Alexandre<\/em>, <em>Cherubini Mauro<\/em>, <em>Chapuis Bertil<\/em>, <em>Humbert Mathias<\/em>, <em>Bilogrevic Igor<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2020, ACM Transactions on Privacy and Security<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3410154\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_970B9AA5408B\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources<\/strong>\n            <br><span><em>Chapuis Bertil<\/em>, <em>Omolola Olamide<\/em>, <em>Cherubini Mauro<\/em>, <em>Humbert Mathias<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2020, Proceedings of the Web Conference (WWW)<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3366423.3380092\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_641044F40080\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2019<\/h3>\n        <article>\n            <strong>ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models<\/strong>\n            <br><span><em>Salem Ahmed<\/em>, <em>Zhang Yang<\/em>, <em>Humbert Mathias<\/em>, <em>Berrang Pascal<\/em>, <em>Fritz Mario<\/em>, <em>Backes Michael<\/em>, 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_84C51526C92A\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Privacy-Preserving Similar Patient Queries for Combined Biomedical Data<\/strong>\n            <br><span><em>Salem Ahmed<\/em>, <em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, <em>Backes Michael<\/em>, 2019, Proc. Priv. Enhancing Technol.<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.2478\/popets-2019-0004\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_45F47599C330\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>MBeacon: Privacy-Preserving Beacons for DNA Methylation Data<\/strong>\n            <br><span><em>Hagestedt Inken<\/em>, <em>Zhang Yang<\/em>, <em>Humbert Mathias<\/em>, <em>Berrang Pascal<\/em>, <em>Tang Haixu<\/em>, <em>Wang XiaoFeng<\/em>, <em>Backes Michael<\/em>, 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_B645B2D431B0\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>On (The Lack Of) Location Privacy in Crowdsourcing Applications<\/strong>\n            <br><span><em>Boukoros Spyros<\/em>, <em>Humbert Mathias<\/em>, <em>Katzenbeisser Stefan<\/em>, <em>Troncoso Carmela<\/em>, 2019, 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_1E317C3CB6EC\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>A Survey on Interdependent Privacy<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Trubert Benjamin<\/em>, <em>Huguenin K\u00e9vin<\/em>, 2019, ACM Computing Surveys<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3360498\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_D0763210E87D\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>The (Co-)Location Sharing Game: Benefits and Privacy Implications of (Co)-Location Sharing with Interdependences<\/strong>\n            <br><span><em>Olteanu A.-M.<\/em>, <em>Humbert M.<\/em>, <em>Huguenin K.<\/em>, <em>Hubaux J.-P.<\/em>, 2019, Proceedings on Privacy Enhancing Technologies<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.2478\/popets-2019-0017\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_2A6E03A65E35\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2018<\/h3>\n        <article>\n            <strong>Tagvisor: A Privacy Advisor for Sharing Hashtags<\/strong>\n            <br><span><em>Zhang Yang<\/em>, <em>Humbert Mathias<\/em>, <em>Rahman Tahleen A.<\/em>, <em>Li Cheng-Te<\/em>, <em>Pang Jun<\/em>, <em>Backes Michael<\/em>, 2018, Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3178876.3186095\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_232593F0B367\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Anonymisierungsverfahren f\u00fcr genetische Daten<\/strong>\n            <br><span><em>Marnau Ninja<\/em>, <em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, 2018, Datenschutz und Datensicherheit<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/s11623-018-0899-z\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_BD374E864A7D\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Dissecting Privacy Risks in Biomedical Data<\/strong>\n            <br><span><em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, <em>Zhang Yang<\/em>, <em>Lehmann Irina<\/em>, <em>Eils Roland<\/em>, <em>Backes Michael<\/em>, 2018, 2018 IEEE European Symposium on Security and Privacy, EuroS&amp;P 2018, London, United Kingdom, April 24-26, 2018<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP.2018.00013\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_899DBD9D6AB9\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Simulating the Large-Scale Erosion of Genomic Privacy Over Time<\/strong>\n            <br><span><em>Backes Michael<\/em>, <em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, <em>Shen Xiaoyu<\/em>, <em>Wolf Verena<\/em>, 2018, IEEE ACM Trans. Comput. Biol. Bioinform.<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/TCBB.2018.2859380\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_BE53486CD324\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses<\/strong>\n            <br><span><em>Cherubini M.<\/em>, <em>Meylan A.<\/em>, <em>Chapuis B.<\/em>, <em>Humbert M.<\/em>, <em>Bilogrevic I.<\/em>, <em>Huguenin K.<\/em>, 2018, Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS)<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3243734.3243746\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_9BD511E5C0D0\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2017<\/h3>\n        <article>\n            <strong>FairTest: Discovering Unwarranted Associations in Data-Driven Applications<\/strong>\n            <br><span><em>Tram\u00e8r Florian<\/em>, <em>Atlidakis Vaggelis<\/em>, <em>Geambasu Roxana<\/em>, <em>Hsu Daniel J.<\/em>, <em>Hubaux Jean-Pierre<\/em>, <em>Humbert Mathias<\/em>, <em>Juels Ari<\/em>, <em>Lin Huang<\/em>, 2017, 2017 IEEE European Symposium on Security and Privacy, EuroS&amp;P 2017, Paris, France, April 26-28, 2017<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP.2017.29\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_330C98D62848\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Quantifying Interdependent Risks in Genomic Privacy<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Ayday Erman<\/em>, <em>Hubaux Jean-Pierre<\/em>, <em>Telenti Amalio<\/em>, 2017, ACM Trans. Priv. Secur.<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3035538\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_FA22A3573291\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>walk2friends: Inferring Social Links from Mobility Profiles<\/strong>\n            <br><span><em>Backes Michael<\/em>, <em>Humbert Mathias<\/em>, <em>Pang Jun<\/em>, <em>Zhang Yang<\/em>, 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/3133956.3133972\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_D0CE84FF0283\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Identifying Personal DNA Methylation Profiles by Genotype Inference<\/strong>\n            <br><span><em>Backes Michael<\/em>, <em>Berrang Pascal<\/em>, <em>Bieg Matthias<\/em>, <em>Eils Roland<\/em>, <em>Herrmann Carl<\/em>, <em>Humbert Mathias<\/em>, <em>Lehmann Irina<\/em>, 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/SP.2017.21\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_1BBC08FDFECD\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Inference Attacks against Kin Genomic Privacy<\/strong>\n            <br><span><em>Ayday Erman<\/em>, <em>Humbert Mathias<\/em>, 2017, IEEE Secur. Priv.<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/MSP.2017.3681052\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_3FFAE177D2B0\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Quantifying Interdependent Privacy Risks with Location Data<\/strong>\n            <br><span><em>Olteanu A.-M.<\/em>, <em>Huguenin K.<\/em>, <em>Shokri R.<\/em>, <em>Humbert M.<\/em>, <em>Hubaux J.-P.<\/em>, 2017, IEEE Transactions on Mobile Computing<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/TMC.2016.2561281\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_9154ADDB1A1A\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2016<\/h3>\n        <article>\n            <strong>Membership Privacy in MicroRNA-based Studies<\/strong>\n            <br><span><em>Backes Michael<\/em>, <em>Berrang Pascal<\/em>, <em>Humbert Mathias<\/em>, <em>Manoharan Praveen<\/em>, 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/2976749.2978355\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_81BDEF836CF1\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles<\/strong>\n            <br><span><em>Backes Michael<\/em>, <em>Berrang Pascal<\/em>, <em>Hecksteden Anna<\/em>, <em>Humbert Mathias<\/em>, <em>Keller Andreas<\/em>, <em>Meyer Tim<\/em>, 2016, 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016<\/span><br>\n            <span><a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_4C87990CC05F\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2015<\/h3>\n        <article>\n            <strong>On Non-cooperative Genomic Privacy<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Ayday Erman<\/em>, <em>Hubaux Jean-Pierre<\/em>, <em>Telenti Amalio<\/em>, 2015, Financial Cryptography and Data Security &#8211; 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-662-47854-7_24\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_F34643355CBE\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>De-anonymizing Genomic Databases Using Phenotypic Traits<\/strong>\n            <br><span><em>Humbert M.<\/em>, <em>Huguenin K.<\/em>, <em>Hugonot J.<\/em>, <em>Ayday E.<\/em>, <em>Hubaux J.-P.<\/em>, 2015, Proceedings on Privacy Enhancing Technologies<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1515\/popets-2015-0020\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_5879B5CC82C2\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2014<\/h3>\n        <article>\n            <strong>Reconciling Utility with Privacy in Genomics<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Ayday Erman<\/em>, <em>Hubaux Jean-Pierre<\/em>, <em>Telenti Amalio<\/em>, 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/2665943.2665945\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_1948105106BC\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2013<\/h3>\n        <article>\n            <strong>Nowhere to Hide: Navigating around Privacy in Online Social Networks<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Studer Th\u00e9ophile<\/em>, <em>Grossglauser Matthias<\/em>, <em>Hubaux Jean-Pierre<\/em>, 2013, Computer Security &#8211; ESORICS 2013 &#8211; 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-40203-6_38\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_889CDA16385A\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>Addressing the concerns of the lacks family: quantification of kin genomic privacy<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Ayday Erman<\/em>, <em>Hubaux Jean-Pierre<\/em>, <em>Telenti Amalio<\/em>, 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201913, Berlin, Germany, November 4-8, 2013<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1145\/2508859.2516707\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_A26D2A794FF4\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2011<\/h3>\n        <article>\n            <strong>Collaborative Location Privacy with Rational Users<\/strong>\n            <br><span><em>Santos Francisco<\/em>, <em>Humbert Mathias<\/em>, <em>Shokri Reza<\/em>, <em>Hubaux Jean-Pierre<\/em>, 2011, Decision and Game Theory for Security &#8211; Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-25280-8_14\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_BC2FFBAA5476\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        \n        <article>\n            <strong>One-to-n scrip systems for cooperative privacy-enhancing technologies<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Manshaei Mohammad Hossein<\/em>, <em>Hubaux Jean-Pierre<\/em>, 2011, 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park &amp; Retreat Center, Monticello, IL, USA, 28-30 September, 2011<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1109\/Allerton.2011.6120234\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_ED0CAF9AB6DD\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n        <h3>2010<\/h3>\n        <article>\n            <strong>Tracking Games in Mobile Networks<\/strong>\n            <br><span><em>Humbert Mathias<\/em>, <em>Manshaei Mohammad Hossein<\/em>, <em>Freudiger Julien<\/em>, <em>Hubaux Jean-Pierre<\/em>, 2010, Decision and Game Theory for Security &#8211; First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings<\/span><br>\n            <span><a href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-17197-0_3\" target=\"_blank\" rel=\"noopener\">DOI<\/a> | <a href=\"https:\/\/serval.unil.ch\/notice\/serval:BIB_777AE1FCCE4B\" target=\"_blank\" rel=\"noopener\">SERVAL<\/a><\/span><br> <br>\n        <\/article>\n","protected":false},"excerpt":{"rendered":"<p>List of publications 2025 Are cybersecurity firms different? Intra-sector and cross-industry comparisons of financial performance Mar\u00e9chal Lo\u00efc, Mermoud Alain, Percia David Dimitri, Humbert Mathias, 2025, Journal of Cybersecurity,&hellip;<\/p>\n","protected":false},"author":1001164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-full-width.php","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-20","page","type-page","status-publish","has-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/pages\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/users\/1001164"}],"replies":[{"embeddable":true,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":5,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":628,"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/pages\/20\/revisions\/628"}],"wp:attachment":[{"href":"https:\/\/people.unil.ch\/mathiashumbert\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}