[{"name":"COMPUTERS AND MICROELECTRONICS","count":397,"id":1},{"name":"SIGNAL PROCESSING","count":299,"id":2},{"name":"TELECOMMUNICATIONS","count":171,"id":3},{"name":"MICROWAVE AND ELECTRONIC SYSTEM ENGINEERING","count":87,"id":4},{"name":"ARTIFICIAL INTELLIGENCE","count":65,"id":5},{"name":"INFORMATION SECURITY AND CRYPTOLOGY","count":56,"id":6},{"name":"CIRCUITS AND SYSTEMS","count":35,"id":7},{"name":"ELECTROMAGNETICS AND MICROWAVE","count":30,"id":8},{"name":"COMMUNICATIONS AND NETWORKING","count":28,"id":9},{"name":"COMPUTER AND MICROELECTRONICS","count":26,"id":10},{"name":"ARTICLES","count":21,"id":11},{"name":"ZK","count":21,"id":12},{"name":"REVIEW","count":20,"id":13},{"name":"IMAGE AND SIGNAL PROCESSING","count":18,"id":14},{"name":"TELECOMMUNICATION","count":17,"id":15},{"name":"COMMUNICATIONS","count":12,"id":16},{"name":"Cybersecurity","count":10,"id":17},{"name":"Electronic Devices and Circuits","count":10,"id":18},{"name":"30TH ANNIVERSARY SPECIAL ISSUE","count":9,"id":19},{"name":"SPECIAL FOCUS: QUANTUM COMMUNICATION","count":9,"id":20},{"name":"SPECIAL FOCUS: THEORY OF CHARACTERISTIC MODES AND NEW APPLICATIONS IN ELECTROMAGNETICS","count":9,"id":21},{"name":"SPECIAL FOCUS: VISUAL ANALYTICS","count":9,"id":22},{"name":"BIOMEDICAL AND HEALTH INFORMATICS","count":8,"id":23},{"name":"Multimedia, Computer Vision, Graphics, and Artificial Intelligence","count":8,"id":24},{"name":"SIGNAL PROCESSING AND BIOINFOMATICS","count":8,"id":25},{"name":"Special Focus: Recipient of CIE Outstanding Doctoral Dissertation","count":8,"id":26},{"name":"MICROELECTRONICS AND ANTENNAS","count":7,"id":27},{"name":"Networking, Computing, and Data Science","count":7,"id":28},{"name":"Research Paper","count":7,"id":29},{"name":"SPECIAL FOCUS: ARTIFICIAL INTELLIGENCE EMPOWERED TECHNOLOGIES IN RAILWAY SYSTEMS","count":7,"id":30},{"name":"SPECIAL FOCUS: ENABLING TECHNOLOGIES FOR VEHICLE-TO-EVERYTHING COMMUNICATIONS TOWARDS 6G ERA","count":7,"id":31},{"name":"AUTOMATION AND CONTROL SYSTEMS","count":6,"id":32},{"name":"COMPUTER NETWORKS AND ARTIFICIAL INTELLIGENCE","count":6,"id":33},{"name":"Communication Theory and Technologies","count":6,"id":34},{"name":"IMAGE PROCESSING","count":6,"id":35},{"name":"SPECIAL FOCUS: ARTIFICIAL INTELLIGENCE AND ROBOT SYSTEMS","count":6,"id":36},{"name":"SPECIAL FOCUS: ELECTROMAGNETIC PROTECTION & GNSS FOR RAILWAY APPLICATIONS","count":6,"id":37},{"name":"SPECIAL FOCUS: UNMANNED AERIAL VEHICLES (UAVS) COMMUNICATION NETWORKS","count":6,"id":38},{"name":"Signal Processing: Theory, Methods, and Applications","count":6,"id":39},{"name":"COMPUTER HARDWARE AND SOFTWARE","count":5,"id":40},{"name":"COMPUTING SCIENCE AND SOFTWARE ENGINEERING","count":5,"id":41},{"name":"Review","count":5,"id":42},{"name":"SPECIAL FOCUS: DATA-DRIVEN INDUSTRIAL INTELLIGENCE","count":5,"id":43},{"name":"SPECIAL FOCUS: MULTI-DIMENSIONAL QOS PROVISION OF INTELLIGENT EDGE COMPUTING FOR IOT","count":5,"id":44},{"name":"SPECIAL FOCUS: NEURAL COGNITIVE COMPUTATION AND CYBORG INTELLIGENT SYSTEMS","count":5,"id":45},{"name":"SPECIAL FOCUS: NEXT GENERATION OF DEEP LEARNING","count":5,"id":46},{"name":"Electromagnetic Field Theory and Technologies","count":4,"id":47},{"name":"INFOMATION SECURITY","count":4,"id":48},{"name":"INTERNET OF THINGS AND AUTOMATIC CONTROL","count":4,"id":49},{"name":"INTERNET OF THINGS AND SOFTWARE ENGINEERING","count":4,"id":50},{"name":"SPECIAL FOCUS: BIOINFORMATICS AND HEALTH INFORMATICS","count":4,"id":51},{"name":"SPECIAL FOCUS: EXPLAINABILITY, ROBUSTNESS, AND SECURITY IN AI SYSTEMS","count":4,"id":52},{"name":"原6 ZK","count":4,"id":53},{"name":"原4 ZK","count":3,"id":54},{"name":"LYM","count":2,"id":55},{"name":"INFORMATION SECURITY","count":1,"id":56},{"name":"PERSPECTIVE","count":1,"id":57},{"name":"PREFACE","count":1,"id":58},{"name":"ZK 原6 | 物联网","count":1,"id":59}]