{"id":129,"date":"2017-12-21T15:15:09","date_gmt":"2017-12-21T15:15:09","guid":{"rendered":"http:\/\/www.ieee-cyber.org\/2018\/?page_id=129"},"modified":"2017-12-21T15:15:09","modified_gmt":"2017-12-21T15:15:09","slug":"contact-us","status":"publish","type":"page","link":"http:\/\/www.ieee-cyber.org\/2018\/contact-us\/","title":{"rendered":"Contact us"},"content":{"rendered":"<h3><\/h3>\n<p>Should you have any questions, please contact Conference Secretary at<\/p>\n<p>Miss Tracy Tsoi<br \/>\nEmerging Technologies Institute<br \/>\nThe University of Hong Kong<br \/>\nEmail: etitracy@hku.hk<br \/>\n(Please mention the conference name at the email subject.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Should you have any questions, please contact Conference Secretary at Miss Tracy Tsoi Emerging Technologies Institute The University of Hong Kong Email: etitracy@hku.hk (Please mention the conference name at the email subject.)<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/pages\/129"}],"collection":[{"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":4,"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/pages\/129\/revisions"}],"predecessor-version":[{"id":242,"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/pages\/129\/revisions\/242"}],"wp:attachment":[{"href":"http:\/\/www.ieee-cyber.org\/2018\/wp-json\/wp\/v2\/media?parent=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}