[{"name":"人工智能","count":987,"id":1},{"name":"Artificial Intelligence","count":652,"id":2},{"name":"计算机网络","count":352,"id":3},{"name":"软件技术","count":320,"id":4},{"name":"图形与图像处理","count":317,"id":5},{"name":"网络与信息安全","count":303,"id":6},{"name":"信息安全","count":290,"id":7},{"name":"计算机网络与信息安全","count":277,"id":8},{"name":"体系结构","count":262,"id":9},{"name":"Information Security","count":230,"id":10},{"name":"Software Technology","count":203,"id":11},{"name":"Computer Network and Information Security","count":197,"id":12},{"name":"Computer Network","count":191,"id":13},{"name":"Computer Architecture","count":170,"id":14},{"name":"人工智能与模式识别","count":167,"id":15},{"name":"数据库技术","count":154,"id":16},{"name":"Network and Information Security","count":138,"id":17},{"name":"信息处理","count":118,"id":18},{"name":"综述","count":118,"id":19},{"name":"Artificial Intelligence and Pattern Recognition","count":112,"id":20},{"name":"网络技术","count":99,"id":21},{"name":"Database Technology","count":98,"id":22},{"name":"Computer Vision,Graphics,and Image Processing","count":87,"id":23},{"name":"Computer Vision, Graphics, and Image Processing","count":84,"id":24},{"name":"Network Technology","count":77,"id":25},{"name":"数据库","count":76,"id":26},{"name":"计算机应用","count":76,"id":27},{"name":"计算机软件","count":75,"id":28},{"name":"数据挖掘和知识发现","count":74,"id":29},{"name":"算法理论","count":68,"id":30},{"name":"Information Processing","count":57,"id":31},{"name":"优青专题","count":47,"id":32},{"name":"Security of Network and Communication","count":46,"id":33},{"name":"网络和通信安全","count":46,"id":34},{"name":"高性能计算","count":46,"id":35},{"name":"软件工程","count":43,"id":36},{"name":"Algorithm Theory","count":41,"id":37},{"name":"其他","count":39,"id":38},{"name":"存储技术","count":39,"id":39},{"name":"Cryptography","count":38,"id":40},{"name":"Demo System","count":38,"id":41},{"name":"Storage Technology","count":37,"id":42},{"name":"Data Mining and Knowledge Discovery","count":36,"id":43},{"name":"Others","count":35,"id":44},{"name":"XML和半结构化数据库系统","count":35,"id":45},{"name":"数据挖掘","count":35,"id":46},{"name":"图形、图像处理","count":33,"id":47},{"name":"Software Engineering","count":32,"id":48},{"name":"Survey","count":31,"id":49},{"name":"读者专栏","count":31,"id":50},{"name":"Data Mining","count":30,"id":51},{"name":"High Performance Computing","count":30,"id":52},{"name":"System Architecture","count":30,"id":53},{"name":"工作流、电子政务/商务、数据仓库、数据库应用","count":30,"id":54},{"name":"信息检索","count":29,"id":55},{"name":"学术活动","count":29,"id":56},{"name":"系统安全","count":29,"id":57},{"name":"系统结构","count":29,"id":58},{"name":"密码学","count":28,"id":59},{"name":"数据库安全性、数据库协同工作","count":27,"id":60},{"name":"操作系统","count":26,"id":61},{"name":"演示系统","count":26,"id":62},{"name":"社会网络","count":26,"id":63},{"name":"Database Pervasive Technology","count":25,"id":64},{"name":"数据库与信息检索、数据库实现技术","count":25,"id":65},{"name":"数据库普适化技术","count":25,"id":66},{"name":"Data Mining & Knowledge Discovery","count":24,"id":67},{"name":"Information Retrieval","count":24,"id":68},{"name":"System Security","count":24,"id":69},{"name":"隐私保护","count":24,"id":70},{"name":"Applications of Information Security","count":23,"id":71},{"name":"Clustering Technology","count":23,"id":72},{"name":"信息安全应用","count":23,"id":73},{"name":"聚类技术","count":23,"id":74},{"name":"Agent Applications","count":22,"id":75},{"name":"Agent应用","count":22,"id":76},{"name":"Machine Learning and Data Mining","count":22,"id":77},{"name":"Steganography and Steganalysis","count":22,"id":78},{"name":"传感器网络","count":22,"id":79},{"name":"模式识别","count":22,"id":80},{"name":"隐密术与隐密分析","count":22,"id":81},{"name":"Algorithms:desin and Analysis","count":21,"id":82},{"name":"Data,Program and their Theory","count":21,"id":83},{"name":"Excellent Young Scholars","count":21,"id":84},{"name":"Social Network","count":21,"id":85},{"name":"Software,Network and Security","count":21,"id":86},{"name":"Truested Software","count":21,"id":87},{"name":"Wireless Sensor Networks Infrastructures","count":21,"id":88},{"name":"可信软件","count":21,"id":89},{"name":"密码安全","count":21,"id":90},{"name":"数据、程序及其理论","count":21,"id":91},{"name":"无线传感器网络的基础设施的理论和技术","count":21,"id":92},{"name":"算法:设计与分析","count":21,"id":93},{"name":"软件、网络与安全","count":21,"id":94},{"name":"Pattern Recognition","count":20,"id":95},{"name":"Big Data","count":19,"id":96},{"name":"Digital Watermark and Digital Copyright Management","count":19,"id":97},{"name":"Query Processing and Optimization","count":19,"id":98},{"name":"Summary Papers","count":19,"id":99},{"name":"Web与数据库","count":19,"id":100},{"name":"图形图像处理","count":19,"id":101},{"name":"数字水印与数字版权管理","count":19,"id":102},{"name":"查询处理与优化","count":19,"id":103},{"name":"研发动态","count":19,"id":104},{"name":"空间数据库、时态数据库、多媒体数据库","count":19,"id":105},{"name":"Internet of Things","count":18,"id":106},{"name":"Web Database","count":18,"id":107},{"name":"物联网","count":18,"id":108},{"name":"Advances in Data Mining","count":17,"id":109},{"name":"Database Security,Database Cooperative Work","count":17,"id":110},{"name":"Storage System","count":17,"id":111},{"name":"Workflow, e-Government/e-Business, Data Warehouse, Database Application","count":17,"id":112},{"name":"云计算与物联网数据管理","count":17,"id":113},{"name":"图形图像处理与模式识别","count":17,"id":114},{"name":"存储系统","count":17,"id":115},{"name":"数据挖掘前沿进展","count":17,"id":116},{"name":"编者专栏","count":17,"id":117},{"name":"计算机软件技术","count":17,"id":118},{"name":"Cryptographic Security","count":16,"id":119},{"name":"Database","count":16,"id":120},{"name":"Methods of Classification and Clustering in Application","count":16,"id":121},{"name":"分类与聚类应用","count":16,"id":122},{"name":"数据挖掘前沿技术专题","count":16,"id":123},{"name":"机器学习专题","count":16,"id":124},{"name":"计算技术","count":16,"id":125},{"name":"计算机网络与分布式处理","count":16,"id":126},{"name":"边缘计算专题","count":16,"id":127},{"name":"Communication Protocols for Wireless Sensor Networ","count":15,"id":128},{"name":"High Performance Computing & Application","count":15,"id":129},{"name":"Memory Technology","count":15,"id":130},{"name":"Special Issue on Edge Computing","count":15,"id":131},{"name":"人工智能前沿进展专题","count":15,"id":132},{"name":"数据挖掘与知识发现","count":15,"id":133},{"name":"无线传感器网络通信协议的理论和技术","count":15,"id":134},{"name":"模式识别与人工智能","count":15,"id":135},{"name":"高性能计算及应用","count":15,"id":136},{"name":"Architecture","count":14,"id":137},{"name":"Computer Software","count":14,"id":138},{"name":"Intelligent Privacy Preserving","count":14,"id":139},{"name":"Special Issue on Advances in Artificial Intelligence","count":14,"id":140},{"name":"Storage System Architecture","count":14,"id":141},{"name":"XML & Semi-Structured Database System","count":14,"id":142},{"name":"云计算","count":14,"id":143},{"name":"存储器体系结构技术","count":14,"id":144},{"name":"智能隐私保护","count":14,"id":145},{"name":"系统技术","count":14,"id":146},{"name":"面向大数据的人工智能技术专题","count":14,"id":147},{"name":"Article Review","count":13,"id":148},{"name":"Classification Technology","count":13,"id":149},{"name":"Database & Information Retrieval,Database System I","count":13,"id":150},{"name":"Excellent Young Scientists","count":13,"id":151},{"name":"Privacy Protection","count":13,"id":152},{"name":"Storage Optimization Techniques","count":13,"id":153},{"name":"Trusted Architecture","count":13,"id":154},{"name":"Workflow,e-Government/e-Business,Data Warehouse,Da","count":13,"id":155},{"name":"专题:存储技术","count":13,"id":156},{"name":"分布式处理","count":13,"id":157},{"name":"分类技术","count":13,"id":158},{"name":"可信体系结构","count":13,"id":159},{"name":"大数据","count":13,"id":160},{"name":"存储优化技术","count":13,"id":161},{"name":"工业互联网安全技术专题","count":13,"id":162},{"name":"并行与分布处理","count":13,"id":163},{"name":"应用","count":13,"id":164},{"name":"物联网安全专题","count":13,"id":165},{"name":"Computer Software Technology","count":12,"id":166},{"name":"Data Minning and Knowledge Discovery","count":12,"id":167},{"name":"Database & Information Retrieval, Database System Implementation","count":12,"id":168},{"name":"Distributed Storage System and Parallel I/O Proces","count":12,"id":169},{"name":"Grid Computing and Cloud Computing","count":12,"id":170},{"name":"Mobile Agent","count":12,"id":171},{"name":"Operating System","count":12,"id":172},{"name":"Spatial Database, Temporal Database, Multimedia Da","count":12,"id":173},{"name":"Special Issue for NSFC Excellent Young Scientists","count":12,"id":174},{"name":"Special Issue on Industrial Internet Security Technology","count":12,"id":175},{"name":"Special Issue on Security of the Internet of Things","count":12,"id":176},{"name":"Storage Management and Virtualization","count":12,"id":177},{"name":"Theory and Architecture of Storage System","count":12,"id":178},{"name":"Virtual Reality","count":12,"id":179},{"name":"“Internet+” Oriented Future Network Theory, Arch","count":12,"id":180},{"name":"专题:网格计算与云计算","count":12,"id":181},{"name":"信息存储","count":12,"id":182},{"name":"分布式系统(广域、网格、P2P)及并行I/O技术","count":12,"id":183},{"name":"存储器件技术","count":12,"id":184},{"name":"存储理论与架构","count":12,"id":185},{"name":"存储管理与虚拟化","count":12,"id":186},{"name":"移动Agent","count":12,"id":187},{"name":"空间和时态数据库系统","count":12,"id":188},{"name":"系统演示","count":12,"id":189},{"name":"虚假信息检测专题","count":12,"id":190},{"name":"虚拟现实","count":12,"id":191},{"name":"面向“互联网+”的未来网络理论、体系结构与应用专题","count":12,"id":192},{"name":"面向开放场景的可信人工智能前沿进展专题","count":12,"id":193},{"name":"Backup and Management Technology of Storage System","count":11,"id":194},{"name":"Computer Nework and Information Security","count":11,"id":195},{"name":"Graphics and Image","count":11,"id":196},{"name":"Information Retrieval and Database","count":11,"id":197},{"name":"Information Storage","count":11,"id":198},{"name":"Review","count":11,"id":199},{"name":"Special Issue on False Information Detection","count":11,"id":200}]