[{"name":"Research Papers","count":507,"id":1},{"name":"学术论文","count":506,"id":2},{"name":"技术应用","count":225,"id":3},{"name":"Technical Applications","count":213,"id":4},{"name":"专家视点","count":89,"id":5},{"name":"Expert Viewpoint","count":88,"id":6},{"name":"Special Report","count":52,"id":7},{"name":"特别策划","count":52,"id":8},{"name":"5G安全专题","count":23,"id":9},{"name":"法律法规","count":22,"id":10},{"name":"Laws and Regulations","count":21,"id":11},{"name":"Special Issue on Industrial Internet Security","count":19,"id":12},{"name":"工业互联网安全专辑","count":19,"id":13},{"name":"网络空间治理专题","count":19,"id":14},{"name":"Issue on Security Risks and Privacy Protection Under Artificial Intelligence","count":15,"id":15},{"name":"人工智能的安全风险与隐私保护专题","count":15,"id":16},{"name":"Issue on Remote Office Security","count":14,"id":17},{"name":"Special Issue on Digital Authentication","count":14,"id":18},{"name":"数字认证专辑","count":14,"id":19},{"name":"远程办公安全专题","count":14,"id":20},{"name":"Issue Data Compliance Efficient Circulation Use","count":13,"id":21},{"name":"Issue on 5G Cyberseeurity","count":13,"id":22},{"name":"Issue on Cyberspace Governance","count":13,"id":23},{"name":"Issue on Data Security and Governance","count":13,"id":24},{"name":"Issue on Industrial Control Network Security","count":13,"id":25},{"name":"工业控制网络安全专题","count":13,"id":26},{"name":"数据合规高效流通使用专题","count":13,"id":27},{"name":"数据安全治理专题","count":13,"id":28},{"name":"Cultivation of Cyber Security Talents Issue","count":12,"id":29},{"name":"Issue Monitoring Warning and Situational Awareness","count":12,"id":30},{"name":"Issue of Contents Security and Artificial Intelligence","count":12,"id":31},{"name":"Issue of Quantum Information Security","count":12,"id":32},{"name":"Issue on Data Security and Privacy Computing","count":12,"id":33},{"name":"Technical Application","count":12,"id":34},{"name":"内容安全与人工智能专题","count":12,"id":35},{"name":"数据安全与隐私计算专题","count":12,"id":36},{"name":"监测预警与态势感知专题","count":12,"id":37},{"name":"网络安全与人才培养专题","count":12,"id":38},{"name":"量子信息安全专刊","count":12,"id":39},{"name":"Issue of Electronic Authentication","count":11,"id":40},{"name":"人工智能与金融信息安全专题","count":11,"id":41},{"name":"电子认证专辑","count":11,"id":42},{"name":"AI and Financial Information Security","count":10,"id":43},{"name":"Data Security","count":10,"id":44},{"name":"E-authentication","count":10,"id":45},{"name":"Issue on 5G Cybersecurity","count":10,"id":46},{"name":"Issue on Automated Vulnerability Mining and Attack Detection","count":10,"id":47},{"name":"Issue on Blockchain and Trusted Transaction","count":10,"id":48},{"name":"Issue on Cybersecurity Governance","count":10,"id":49},{"name":"Issue on Security of Deep Learning in Adversarial Settings","count":10,"id":50},{"name":"Risk Assessment Issue","count":10,"id":51},{"name":"区块链与可信交易专题","count":10,"id":52},{"name":"可信身份认证专题","count":10,"id":53},{"name":"数据安全专题","count":10,"id":54},{"name":"深度学习安全与对抗专题","count":10,"id":55},{"name":"电子认证专题","count":10,"id":56},{"name":"网络安全治理专题","count":10,"id":57},{"name":"自动化漏洞挖掘与攻击检测专题","count":10,"id":58},{"name":"风险评估专题","count":10,"id":59},{"name":"Independent and Controllable Infosec Assurance","count":9,"id":60},{"name":"Issue of Cryptography Application Security","count":9,"id":61},{"name":"Issue of Trusted Identity Authentication","count":9,"id":62},{"name":"Issue on Data Security and Assessment","count":9,"id":63},{"name":"Software Security & Reliability Issue","count":9,"id":64},{"name":"大数据专题","count":9,"id":65},{"name":"密码应用安全专题","count":9,"id":66},{"name":"数据安全与评估专题","count":9,"id":67},{"name":"自主可控专题","count":9,"id":68},{"name":"软件安全性可靠性专题","count":9,"id":69},{"name":"Big Data Theme","count":8,"id":70},{"name":"CFL认证研究专题","count":8,"id":71},{"name":"Issue of Digital Economy Security","count":8,"id":72},{"name":"Issue on Data Security and Privacy Protection of New Power Systems","count":8,"id":73},{"name":"Issue on Xinchuang Security","count":8,"id":74},{"name":"Special Topics Network Security Standardization","count":8,"id":75},{"name":"信创安全专题","count":8,"id":76},{"name":"信息安全法律法规专题","count":8,"id":77},{"name":"数字经济安全专题","count":8,"id":78},{"name":"新型电力系统数据安全与隐私保护专题","count":8,"id":79},{"name":"网络安全标准化专题","count":8,"id":80},{"name":"Issue of Big Data Security","count":7,"id":81},{"name":"Issue of Cyber Security Legislation","count":7,"id":82},{"name":"Issue of Cyber-Physical System","count":7,"id":83},{"name":"Issue of Cybersecurity Law","count":7,"id":84},{"name":"Issue of Policy and Lows","count":7,"id":85},{"name":"Issue of Secrecy Technology","count":7,"id":86},{"name":"Issue on Artificial Intelligence Security","count":7,"id":87},{"name":"Mobile Security Issue","count":7,"id":88},{"name":"Physical Space Information Security Theme","count":7,"id":89},{"name":"Special Topics on CFL Authentication Research","count":7,"id":90},{"name":"Special Topics on Electronic Data Forensic","count":7,"id":91},{"name":"人工智能安全专题","count":7,"id":92},{"name":"保密技术专题","count":7,"id":93},{"name":"大数据安全专题","count":7,"id":94},{"name":"政策法规专题","count":7,"id":95},{"name":"物理空间安全专题","count":7,"id":96},{"name":"电子数据取证专题","count":7,"id":97},{"name":"移动安全专题","count":7,"id":98},{"name":"网络安全立法专题","count":7,"id":99},{"name":"赛博物理系统(CPS)专题","count":7,"id":100},{"name":"Cyberspace Governance Issue","count":6,"id":101},{"name":"Issue on Personal Privacy Protection and CIA","count":6,"id":102},{"name":"Issue on Vulnerability Mining and Threat Detection","count":6,"id":103},{"name":"个人隐私保护与网络身份认证专题","count":6,"id":104},{"name":"密码算法专题","count":6,"id":105},{"name":"漏洞挖掘与威胁检测专题","count":6,"id":106},{"name":"Biometric Authentication Theme","count":5,"id":107},{"name":"Issue of Block Chain","count":5,"id":108},{"name":"Issue of Cryptographic Algorithm","count":5,"id":109},{"name":"区块链专题","count":5,"id":110},{"name":"微软中国专题","count":5,"id":111},{"name":"生物特征识别专题","count":5,"id":112},{"name":"Issue of Microsoft China","count":4,"id":113},{"name":"政策解读","count":2,"id":114},{"name":"Expert viewpoint","count":1,"id":115},{"name":"Law and Regulations","count":1,"id":116},{"name":"Observation and Ponderation","count":1,"id":117},{"name":"学术研究","count":1,"id":118},{"name":"观察思考","count":1,"id":119}]