{"id":4854,"name":"Feng Hao","url":"","description":"Reader in Security Engineering, School of Computing Science, Newcastle University","link":"https:\/\/blogs.ncl.ac.uk\/security\/author\/nfh19\/","slug":"nfh19","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/3ec2ae02dc79d137afea95b288352abb?s=24&d=identicon&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/3ec2ae02dc79d137afea95b288352abb?s=48&d=identicon&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/3ec2ae02dc79d137afea95b288352abb?s=96&d=identicon&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users\/4854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users"}]}}