{"id":45130,"date":"2024-03-11T11:29:23","date_gmt":"2024-03-11T11:29:23","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=45130"},"modified":"2024-09-04T20:23:28","modified_gmt":"2024-09-04T19:23:28","slug":"protecting-quantum-computers-adversarial-attacks","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/","title":{"rendered":"Protecting quantum computers from adversarial attacks"},"content":{"rendered":"

A team of researchers from the University of Texas at Dallas has developed an approach with an industry collaborator to give quantum computers a layer of protection against adversarial attacks.<\/h2>\n

The solution, Quantum Noise Injection for Adversarial Defence (QNAD), counteracts the impact of adversarial attacks designed to disrupt the interference of quantum computers. This is AI\u2019s<\/a> ability to make decisions or solve tasks.<\/p>\n

\u201cAdversarial attacks designed to disrupt AI inference have the potential for serious consequences,\u201d said Dr Kanad Basu, assistant professor of electrical and computer engineering at the Erik Jonsson School of Engineering and Computer Science.<\/p>\n

The work will be presented at the IEEE International Symposium on Hardware Oriented Security and Trust<\/a> on 6-9 May in Washington, DC.<\/p>\n

Benefits of quantum computers<\/h3>\n

Quantum computers can solve several complex problems exponentially faster than classical computers. The emerging technology uses quantum mechanics and is expected to improve AI applications and solve complex computational problems.<\/p>\n

Qubits represent the fundamental unit of information in quantum computers, like bits in traditional computers.<\/p>\n

In classical computers, bits represent 1 or 0. However, qubits take advantage of the principle of superposition and can, therefore, be in a state of 0 and 1. By representing two states, quantum computers have greater speed compared to traditional computers.<\/p>\n

For example, quantum computers have the potential to break highly secure encryption systems due to their computer power.<\/p>\n

Challenges of quantum computers<\/h3>\n

Despite their advantages, quantum computers are vulnerable to adversarial attacks.<\/p>\n

Due to factors such as temperature fluctuations, magnetic fields, and imperfections in hardware components, quantum computers are susceptible to noise or interference.<\/p>\n

Quantum computers are also prone to unintended interactions between qubits.<\/p>\n

These challenges can cause computing errors.<\/p>\n

Leveraging quantum noise<\/h3>\n

The researchers leveraged intrinsic quantum noise and crosstalk to counteract adversarial attacks.<\/p>\n

The method introduced crosstalk into the quantum neural network. This is a form of Machine Learning where datasets train computers to perform tasks. This includes detecting objects like stop signs or other computer vision responsibilities.<\/p>\n

\u201cThe noisy behaviour of quantum computers actually reduces the impact of attacks,\u201d said Basu, who is senior author of the study. \u201cWe believe this is a first-of-its-kind approach that can supplement other defences against adversarial attacks.\u201d<\/p>\n

AI application 268% more accurate with QNAD<\/h3>\n

The researchers revealed that during an adversarial attack, the AI application was 268% more accurate with QNAD than without it.<\/p>\n

The approach is designed to supplement other techniques to protect quantum computer security.<\/p>\n

\u201cIn case of a crash, if we do not wear the seat belt, the impact of the accident is much greater,\u201d Shamik Kundu, a computer engineering doctoral student and a first co-author, said.<\/p>\n

\u201cOn the other hand, if we wear the seat belt, even if there is an accident, the impact of the crash is lessened. The QNAD framework operates akin to a seat belt, diminishing the impact of adversarial attacks, which symbolise the accident, for a QNN model.\u201d<\/p>\n

The research was funded by the National Science Foundation.<\/p>\n","protected":false},"excerpt":{"rendered":"

A team of researchers from the University of Texas at Dallas has developed an approach with an industry collaborator to give quantum computers a layer of protection against adversarial attacks.<\/p>\n","protected":false},"author":18,"featured_media":45138,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[24615],"tags":[793],"acf":[],"yoast_head":"\nProtecting quantum computers from adversarial attacks<\/title>\n<meta name=\"description\" content=\"Researchers have developed an approach to give quantum computers a layer of protection against adversarial attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting quantum computers from adversarial attacks\" \/>\n<meta property=\"og:description\" content=\"Researchers have developed an approach to give quantum computers a layer of protection against adversarial attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T11:29:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-04T19:23:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322-1024x576.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Potts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Potts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\"},\"author\":{\"name\":\"Emily Potts\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\"},\"headline\":\"Protecting quantum computers from adversarial attacks\",\"datePublished\":\"2024-03-11T11:29:23+00:00\",\"dateModified\":\"2024-09-04T19:23:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\"},\"wordCount\":494,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg\",\"keywords\":[\"Quantum Computing\"],\"articleSection\":[\"Quantum\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#respond\"]}],\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\",\"name\":\"Protecting quantum computers from adversarial attacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg\",\"datePublished\":\"2024-03-11T11:29:23+00:00\",\"dateModified\":\"2024-09-04T19:23:28+00:00\",\"description\":\"Researchers have developed an approach to give quantum computers a layer of protection against adversarial attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 shutterstock\/BeeBright\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting quantum computers from adversarial attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\",\"name\":\"Emily Potts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"caption\":\"Emily Potts\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/\"}]}<\/script>\n","yoast_head_json":{"title":"Protecting quantum computers from adversarial attacks","description":"Researchers have developed an approach to give quantum computers a layer of protection against adversarial attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/","og_locale":"en_GB","og_type":"article","og_title":"Protecting quantum computers from adversarial attacks","og_description":"Researchers have developed an approach to give quantum computers a layer of protection against adversarial attacks.","og_url":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2024-03-11T11:29:23+00:00","article_modified_time":"2024-09-04T19:23:28+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322-1024x576.jpg","type":"image\/jpeg"}],"author":"Emily Potts","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Emily Potts","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/"},"author":{"name":"Emily Potts","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef"},"headline":"Protecting quantum computers from adversarial attacks","datePublished":"2024-03-11T11:29:23+00:00","dateModified":"2024-09-04T19:23:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/"},"wordCount":494,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg","keywords":["Quantum Computing"],"articleSection":["Quantum"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#respond"]}],"copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/","url":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/","name":"Protecting quantum computers from adversarial attacks","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg","datePublished":"2024-03-11T11:29:23+00:00","dateModified":"2024-09-04T19:23:28+00:00","description":"Researchers have developed an approach to give quantum computers a layer of protection against adversarial attacks.","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/03\/shutterstock_BeeBright_565329322.jpg","width":1920,"height":1080,"caption":"\u00a9 shutterstock\/BeeBright"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/protecting-quantum-computers-adversarial-attacks\/45130\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"Protecting quantum computers from adversarial attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef","name":"Emily Potts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","caption":"Emily Potts"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-03-06 09:17:28","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/45130"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=45130"}],"version-history":[{"count":2,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/45130\/revisions"}],"predecessor-version":[{"id":45139,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/45130\/revisions\/45139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/45138"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=45130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=45130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=45130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}