[{"name":"人工智能","count":2608,"id":1},{"name":"Artificial Intelligence","count":2138,"id":2},{"name":"计算机网络与信息技术","count":1851,"id":3},{"name":"信息安全","count":1246,"id":4},{"name":"Information Security","count":1224,"id":5},{"name":"软件工程","count":1027,"id":6},{"name":"人工智能及图像处理技术","count":836,"id":7},{"name":"Network & Communication","count":727,"id":8},{"name":"网络与通信","count":716,"id":9},{"name":"计算机网络与信息安全","count":668,"id":10},{"name":"Computer Network & Information Security","count":639,"id":11},{"name":"图形图像与模式识别","count":601,"id":12},{"name":"计算机图形学&多媒体","count":447,"id":13},{"name":"数据库&大数据&数据科学","count":428,"id":14},{"name":"Computer Graphics & Multimedia","count":423,"id":15},{"name":"Database & Big Data & Data Science","count":402,"id":16},{"name":"软件与数据库技术","count":386,"id":17},{"name":"Graphics,Image & Pattern Recognition","count":384,"id":18},{"name":"Software & Database Technology","count":361,"id":19},{"name":"Intelligent Computing","count":291,"id":20},{"name":"智能计算","count":276,"id":21},{"name":"模式识别与图像处理","count":269,"id":22},{"name":"计算机网络","count":241,"id":23},{"name":"Computer Network","count":236,"id":24},{"name":"Interdiscipline & Application","count":218,"id":25},{"name":"人工智能及图像处理","count":205,"id":26},{"name":"软件工程与数据库技术","count":201,"id":27},{"name":"图像处理&多媒体技术","count":192,"id":28},{"name":"Image Processing & Multimedia Technology","count":186,"id":29},{"name":"Software Engineering","count":178,"id":30},{"name":"Big Data & Data Science","count":175,"id":31},{"name":"图形图像","count":164,"id":32},{"name":"Graphics & Image","count":155,"id":33},{"name":"Software Engineering & Database Technology","count":155,"id":34},{"name":"数据库与数据挖掘","count":155,"id":35},{"name":"人工智能与图像处理技术","count":151,"id":36},{"name":"Graphics, Image & Pattern Recognition","count":150,"id":37},{"name":"图形图像及体系结构","count":146,"id":38},{"name":"Database & Data Mining","count":141,"id":39},{"name":"Wireless Network and Communication","count":130,"id":40},{"name":"交叉&应用","count":130,"id":41},{"name":"无线网络与通信","count":130,"id":42},{"name":"Pattern Recognition and Image Processing","count":126,"id":43},{"name":"大数据&数据科学","count":111,"id":44},{"name":"综合、交叉与应用","count":110,"id":45},{"name":"Interdiscipline & Frontier","count":99,"id":46},{"name":"大数据与数据挖掘","count":97,"id":47},{"name":"Pattern Recognition & Image Processing","count":91,"id":48},{"name":"体系结构","count":89,"id":49},{"name":"智能系统及应用","count":85,"id":50},{"name":"交叉与前沿","count":83,"id":51},{"name":"Graphics, Image and Architecture","count":82,"id":52},{"name":"Big Data & Data Mining","count":80,"id":53},{"name":"Architecture","count":75,"id":54},{"name":"综述","count":75,"id":55},{"name":"Computer Software","count":71,"id":56},{"name":"计算机软件","count":71,"id":57},{"name":"Surveys","count":69,"id":58},{"name":"Data Mining","count":66,"id":59},{"name":"数据挖掘","count":66,"id":60},{"name":"Graphics,Image and Architecture","count":64,"id":61},{"name":"大数据与数据科学","count":64,"id":62},{"name":"Artificial Intelligence & Image Processing","count":62,"id":63},{"name":"计算机网络与信息技","count":61,"id":64},{"name":"人工智能与图像处理","count":59,"id":65},{"name":"Computer Network & Information Technology","count":57,"id":66},{"name":"高性能计算","count":57,"id":67},{"name":"Software Engineering and Database Technology","count":55,"id":68},{"name":"Computer Graphics&Multimedia","count":49,"id":69},{"name":"Intelligent System and Application","count":49,"id":70},{"name":"云计算与信息服务","count":47,"id":71},{"name":"High Performance Computing","count":45,"id":72},{"name":"Review","count":45,"id":73},{"name":"综述研究","count":45,"id":74},{"name":"网络&通信","count":41,"id":75},{"name":"Rough集理论及其应用","count":39,"id":76},{"name":"Artifical Intelligence & Image Processing","count":37,"id":77},{"name":"NASAC 2015","count":37,"id":78},{"name":"计算机网络语信息安全","count":37,"id":79},{"name":"Digital Information Processing","count":36,"id":80},{"name":"Intelligent Systems and Applications","count":36,"id":81},{"name":"数字信息处理","count":36,"id":82},{"name":"网络与信息","count":36,"id":83},{"name":"Graphics ,Image & Pattern Recognition","count":34,"id":84},{"name":"信息安全与虚拟现实","count":34,"id":85},{"name":"CCML 2013","count":32,"id":86},{"name":"NASAC2014","count":32,"id":87},{"name":"第十三届全国软件与应用学术会议","count":32,"id":88},{"name":"Network&Communication","count":28,"id":89},{"name":"分布式系统与Web技术","count":28,"id":90},{"name":"区块链技术","count":28,"id":91},{"name":"2013'NASAC","count":27,"id":92},{"name":"2013'全国软件与应用学术会议","count":27,"id":93},{"name":"Blockchain Technology","count":27,"id":94},{"name":"Pattern Recognition&Image Processing","count":27,"id":95},{"name":"Data Storage and Mining","count":26,"id":96},{"name":"人工智能与图像处理技","count":26,"id":97},{"name":"数据存储与挖掘","count":26,"id":98},{"name":"2013'HHME","count":25,"id":99},{"name":"2013'和谐人机环境联合学术会议","count":25,"id":100},{"name":"2016年全国软件与应用学术会议","count":25,"id":101},{"name":"Database&Big Data&Data Science","count":25,"id":102},{"name":"NASAC 2016","count":25,"id":103},{"name":"网络与嵌入式技术","count":25,"id":104},{"name":"计算机体系结构","count":25,"id":105},{"name":"Computer network & Information Security","count":24,"id":106},{"name":"2012'HPC Special Column","count":23,"id":107},{"name":"2012'HPC专栏","count":23,"id":108},{"name":"2014'全国理论计算机科学年会","count":23,"id":109},{"name":"NCTCS2014","count":23,"id":110},{"name":"网络与信息技术","count":23,"id":111},{"name":"2013'Petri Net","count":22,"id":112},{"name":"2013'Petri网","count":22,"id":113},{"name":"Computer Network & Information security","count":22,"id":114},{"name":"Interdiscipline&Application","count":22,"id":115},{"name":"计算机网络与心系技术","count":22,"id":116},{"name":"2013'Intelligent Information Processing","count":21,"id":117},{"name":"2013'智能信息处理","count":21,"id":118},{"name":"Information Storage and Mining","count":21,"id":119},{"name":"信息存储与挖掘","count":21,"id":120},{"name":"2013'NCTCS","count":20,"id":121},{"name":"2013年全国理论计算机科学学术年会","count":20,"id":122},{"name":"2014'中国粗糙集与软计算、中国网络智能与中国粒计算?","count":20,"id":123},{"name":"CRSSC-CWI-CGrC2014","count":20,"id":124},{"name":"Computer Architecture","count":20,"id":125},{"name":"Computer Neteork & Information Security","count":20,"id":126},{"name":"Pattem Recognition & Image Processing","count":20,"id":127},{"name":"2014'数据挖掘会议","count":19,"id":128},{"name":"CCDM2014","count":19,"id":129},{"name":"2013’CCF Conference on Artificial Intelligence","count":18,"id":130},{"name":"2013’CCF人工智能会议","count":18,"id":131},{"name":"Graphics,Image&Pattern Recognition","count":18,"id":132},{"name":"Intelligent Control and Optimization","count":18,"id":133},{"name":"智能控制与优化","count":18,"id":134},{"name":"有工智能及图像处理技术","count":18,"id":135},{"name":"2014年全国高性能计算学术年会","count":17,"id":136},{"name":"Big Data&Data Mining","count":17,"id":137},{"name":"Computer Science Theory","count":17,"id":138},{"name":"Data Science","count":17,"id":139},{"name":"HPC2014","count":17,"id":140},{"name":"交叉&前沿","count":17,"id":141},{"name":"数据科学","count":17,"id":142},{"name":"计算机科学理论","count":17,"id":143},{"name":"2015年中国计算机学会人工智能会议","count":16,"id":144},{"name":"2015年第三届CCF大数据学术会议","count":16,"id":145},{"name":"CCF BigData 2015","count":16,"id":146},{"name":"CCFAI2015","count":16,"id":147},{"name":"Granular Computing & Knowledge Discovery","count":16,"id":148},{"name":"Intelligent Software Engineering","count":16,"id":149},{"name":"人工智能与图象处理","count":16,"id":150},{"name":"数据挖掘与机器学习","count":16,"id":151},{"name":"智能软件工程","count":16,"id":152},{"name":"粒计算与知识发现","count":16,"id":153},{"name":"计算机视觉:理论与应用","count":16,"id":154},{"name":"2013年全国高性能计算学术年会","count":15,"id":155},{"name":"2015第十五届全国Petri网理论与应用学术会议","count":15,"id":156},{"name":"Computer Vision : Theory and Application","count":15,"id":157},{"name":"Formalized Methods and Network Application","count":15,"id":158},{"name":"HPC China 2013","count":15,"id":159},{"name":"Intelligent Control and Architecture","count":15,"id":160},{"name":"Network & Information Security","count":15,"id":161},{"name":"Petri 2015","count":15,"id":162},{"name":"Wireless Network and Communication Technology","count":15,"id":163},{"name":"只能计算","count":15,"id":164},{"name":"形式化与网络应用","count":15,"id":165},{"name":"无线网络与通信技术","count":15,"id":166},{"name":"智能控制与体系结构","count":15,"id":167},{"name":"服务化科研成果","count":15,"id":168},{"name":"网络与信息安全","count":15,"id":169},{"name":"2013'Rough Set","count":14,"id":170},{"name":"2013'粗糙集","count":14,"id":171},{"name":"2015全国高性能计算学术年会","count":14,"id":172},{"name":"2016第六届中国数据挖掘会议","count":14,"id":173},{"name":"Arcbitecture","count":14,"id":174},{"name":"CCDM 2016","count":14,"id":175},{"name":"HPC China 2015","count":14,"id":176},{"name":"Intelligent Data Governance Technologies and Systems","count":14,"id":177},{"name":"Software & Interdiscipline","count":14,"id":178},{"name":"Software&Database Technology","count":14,"id":179},{"name":"分布并行处理技术","count":14,"id":180},{"name":"智能数据治理技术与系统","count":14,"id":181},{"name":"软件&交叉","count":14,"id":182},{"name":"软件工程及其他","count":14,"id":183},{"name":"2018中国多媒体大会","count":13,"id":184},{"name":"CRSSC-CWI-CGrC 2016","count":13,"id":185},{"name":"CRSSC-CWI-CGrC-3WD 2017","count":13,"id":186},{"name":"ChinaMM2018","count":13,"id":187},{"name":"Intelligent Control","count":13,"id":188},{"name":"Intelligent Edge Computing","count":13,"id":189},{"name":"Model Recognition","count":13,"id":190},{"name":"Software Engineering & Requirements Engineering for Complex Systems","count":13,"id":191},{"name":"复杂系统的软件工程和需求工程","count":13,"id":192},{"name":"智能化边缘计算","count":13,"id":193},{"name":"智能控制","count":13,"id":194},{"name":"模式识别","count":13,"id":195},{"name":"网络与通讯","count":13,"id":196},{"name":"计算机图形&多媒体","count":13,"id":197},{"name":"计算机图形学& 多媒体","count":13,"id":198},{"name":"软件工程、分布式并行处理技术","count":13,"id":199},{"name":"2013'Servitization Software","count":12,"id":200}]