[{"name":"工程与应用","count":7263,"id":1},{"name":"博士论坛","count":4562,"id":2},{"name":"学术探讨","count":4532,"id":3},{"name":"网络、通信与安全","count":3887,"id":4},{"name":"网络、通信、安全","count":2414,"id":5},{"name":"图形图像处理","count":2260,"id":6},{"name":"图形、图像、模式识别","count":1856,"id":7},{"name":"模式识别与人工智能","count":1774,"id":8},{"name":"数据库与信息处理","count":1571,"id":9},{"name":"数据库、信号与信息处理","count":1380,"id":10},{"name":"开发设计","count":1085,"id":11},{"name":"热点与综述","count":1022,"id":12},{"name":"研究、探讨","count":967,"id":13},{"name":"Pattern Recognition and Artificial Intelligence","count":840,"id":14},{"name":"理论与研发","count":832,"id":15},{"name":"Graphics and Image Processing","count":665,"id":16},{"name":"Engineering and Applications","count":651,"id":17},{"name":"研发、设计、测试","count":621,"id":18},{"name":"产品、研发、测试","count":607,"id":19},{"name":"Research Hotspots and Reviews","count":502,"id":20},{"name":"理论研究、研发设计","count":461,"id":21},{"name":"大数据与云计算","count":455,"id":22},{"name":"数据库、数据挖掘、机器学习","count":358,"id":23},{"name":"理论研究","count":332,"id":24},{"name":"信号处理","count":264,"id":25},{"name":"Theory, Research and Development","count":221,"id":26},{"name":"Network, Communication and Security","count":200,"id":27},{"name":"Big Data and Cloud Computing","count":103,"id":28},{"name":"数据库、信息处理","count":99,"id":29},{"name":"网络与通信","count":92,"id":30},{"name":"数据库","count":81,"id":31},{"name":"工程应用","count":77,"id":32},{"name":"网络通信与安全","count":53,"id":33},{"name":"产品研发与设计","count":49,"id":34},{"name":"图形、图象、模式识别","count":46,"id":35},{"name":"信息与信号处理","count":44,"id":36},{"name":"博士论文","count":44,"id":37},{"name":"会议论文精选","count":37,"id":38},{"name":"研发、测试","count":37,"id":39},{"name":"机器学习","count":36,"id":40},{"name":"图形、图像处理","count":30,"id":41},{"name":"理论科学研究","count":24,"id":42},{"name":"Network,Communication and Security","count":23,"id":43},{"name":"目标检测专题","count":22,"id":44},{"name":"研究探讨","count":21,"id":45},{"name":"图形图像、模式识别","count":20,"id":46},{"name":"网络、通讯、安全","count":19,"id":47},{"name":"图形、图像、模大识别","count":17,"id":48},{"name":"研发、通信、安全","count":16,"id":49},{"name":"图形、图像、欧式识别","count":15,"id":50},{"name":"Special Issue on YOLOv8 Improvements and Applications","count":14,"id":51},{"name":"YOLOv8改进及应用专题","count":14,"id":52},{"name":"图形、图形、模式识别","count":14,"id":53},{"name":"网络、通与安全","count":14,"id":54},{"name":"数据库、信号与信号处理","count":13,"id":55},{"name":"研究·探讨","count":13,"id":56},{"name":"网络、通信息安全","count":13,"id":57},{"name":"Special Issue on Object Detection","count":12,"id":58},{"name":"开放式集群计算、网络计算、Web服务与中间件技术","count":12,"id":59},{"name":"·图形图像处理·","count":11,"id":60},{"name":"Theory,Research and Development","count":10,"id":61},{"name":"工程一与应用","count":10,"id":62},{"name":"探讨研究","count":10,"id":63},{"name":"研究、设计、测试","count":10,"id":64},{"name":"软件工程管理和系统软件","count":10,"id":65},{"name":"过程工程和UML技术","count":10,"id":66},{"name":"·工程与应用·","count":9,"id":67},{"name":"·理论与研发·","count":9,"id":68},{"name":"·网络、通信与安全·","count":9,"id":69},{"name":"下一代开放式网络、信息安全、服务管理技术","count":9,"id":70},{"name":"软件产品测试度量评价","count":9,"id":71},{"name":"博士论坛—微处理器设计专辑","count":8,"id":72},{"name":"数码相机研究与开发专栏","count":8,"id":73},{"name":"网络·通信·安全","count":8,"id":74},{"name":"Improvement and Application of YOLO","count":7,"id":75},{"name":"YOLO的改进及应用专题","count":7,"id":76},{"name":"·模式识别与人工智能·","count":7,"id":77},{"name":"企业之声","count":7,"id":78},{"name":"图形、图像、模式识","count":7,"id":79},{"name":"研发·设计·测试","count":7,"id":80},{"name":"Special Issue on YOLO Improvements and Applications","count":6,"id":81},{"name":"YOLO系列改进及应用专题","count":6,"id":82},{"name":"·大数据与云计算·","count":6,"id":83},{"name":"数据库与集息处理","count":6,"id":84},{"name":"目录里无--委员会","count":6,"id":85},{"name":"Generative Adversarial Networks","count":5,"id":86},{"name":"Object Detection","count":5,"id":87},{"name":"Target Detection","count":5,"id":88},{"name":"产品、研发、测度","count":5,"id":89},{"name":"开放式分布与并行计算模型、算法与体系结构","count":5,"id":90},{"name":"理论与研究","count":5,"id":91},{"name":"生成对抗网络专题","count":5,"id":92},{"name":"目录里无--订阅","count":5,"id":93},{"name":"分布式人工智能与多代理技术","count":4,"id":94},{"name":"移动计算和自组网技术","count":3,"id":95},{"name":"图形·图像、模式识别","count":2,"id":96},{"name":"计算机科教博览","count":2,"id":97},{"name":"`","count":1,"id":98},{"name":"欢迎订阅","count":1,"id":99},{"name":"目录里无-编委会","count":1,"id":100},{"name":"目录里无-订阅","count":1,"id":101},{"name":"网络、通信与安全测试","count":1,"id":102}]