[{"name":"学术论文","count":476,"id":1},{"name":"Papers","count":471,"id":2},{"name":"综述","count":80,"id":3},{"name":"论文","count":46,"id":4},{"name":"Comprehensive Review","count":32,"id":5},{"name":"Comprehensive Reviews","count":30,"id":6},{"name":"视角","count":19,"id":7},{"name":"Special Column: Blockchain Technology","count":10,"id":8},{"name":"专栏:区块链技术","count":10,"id":9},{"name":"Perspective","count":9,"id":10},{"name":"Special Column: Network Application and Protection Technology","count":7,"id":11},{"name":"Topic:Integrated Circuit Hardware Security","count":7,"id":12},{"name":"专栏:网络应用与防护技术","count":7,"id":13},{"name":"专题:集成电路硬件安全","count":7,"id":14},{"name":"教育与教学","count":7,"id":15},{"name":"Special Column: Technology Research and Application Exploration on Attack and Defense of Cryptology","count":6,"id":16},{"name":"Topic Ⅰ:Network Security:Attack and Defense","count":6,"id":17},{"name":"Topic: Blockchain System, Smart Contract and Application Security","count":6,"id":18},{"name":"Topic: Cybersecurity-一一Attack and Defense Technologies","count":6,"id":19},{"name":"Topic: Multimedia Content Security","count":6,"id":20},{"name":"Topic: Security Awareness and Detection Method","count":6,"id":21},{"name":"专栏:区块链系统、智能合约与应用安全","count":6,"id":22},{"name":"专栏:多媒体内容安全","count":6,"id":23},{"name":"专栏:安全感知与检测方法","count":6,"id":24},{"name":"专栏:密码攻防技术研究及应用探索","count":6,"id":25},{"name":"专栏:网络攻击与防御技术","count":6,"id":26},{"name":"专栏Ⅰ:网络攻防技术","count":6,"id":27},{"name":"Education and Teaching","count":5,"id":28},{"name":"Security data visualization","count":5,"id":29},{"name":"Special Column: Application Exploration on Multi-party Trusted Cooperation based on Blockchain","count":5,"id":30},{"name":"Special Column:Researches on Key Technologies of Privacy Protection and Its Innovative Applications","count":5,"id":31},{"name":"Special Column:Routing Technology in Complex Network Environment","count":5,"id":32},{"name":"Topic Ⅰ:Novel Network Technology and Security","count":5,"id":33},{"name":"Topic Ⅱ:Technology and Application of Cryptology","count":5,"id":34},{"name":"Topic: Techniques and applications of cryptography","count":5,"id":35},{"name":"专栏:基于区块链的多方可信协作应用探索","count":5,"id":36},{"name":"专栏:复杂网络环境下的路由技术","count":5,"id":37},{"name":"专栏:隐私保护关键技术及其新型应用模式探索","count":5,"id":38},{"name":"专栏Ⅰ:新型网络技术及安全","count":5,"id":39},{"name":"专栏Ⅱ:密码技术与应用","count":5,"id":40},{"name":"专题:密码学技术与应用","count":5,"id":41},{"name":"安全数据可视化","count":5,"id":42},{"name":"Special Column:New Technology Exploration on Privacy Protection","count":4,"id":43},{"name":"Topic Ⅰ:Application of neural network technology","count":4,"id":44},{"name":"Topic Ⅰ:Security Architecture Applications of Novel Network","count":4,"id":45},{"name":"Topic Ⅰ:Voice Image and Audio-Video Processing","count":4,"id":46},{"name":"Topic Ⅱ:Blockchain Security","count":4,"id":47},{"name":"Topic Ⅱ:Blockchain Technology","count":4,"id":48},{"name":"Topic Ⅱ:Machine Learning and Security Application","count":4,"id":49},{"name":"Topic Ⅱ:SDN and cloud computing security","count":4,"id":50},{"name":"Topic: Big Data and Artifical Intelligence Security","count":4,"id":51},{"name":"专栏:隐私保护新技术探索","count":4,"id":52},{"name":"专栏Ⅰ:神经网络技术应用","count":4,"id":53},{"name":"专栏Ⅰ:语音图像与音视频处理","count":4,"id":54},{"name":"专栏Ⅱ:SDN与云计算安全","count":4,"id":55},{"name":"专栏Ⅱ:区块链技术","count":4,"id":56},{"name":"专栏Ⅱ:机器学习及安全应用","count":4,"id":57},{"name":"专题:大数据与人工智能安全","count":4,"id":58},{"name":"专题Ⅰ:新型网络安全架构与应用","count":4,"id":59},{"name":"专题Ⅱ:区块链安全","count":4,"id":60},{"name":"Perspectives","count":3,"id":61},{"name":"Education and teaching","count":2,"id":62},{"name":"更正","count":1,"id":63},{"name":"网络空间安全人才培养专刊","count":1,"id":64}]