[{"name":"人工智能","count":2951,"id":1},{"name":"Artificial Intelligence","count":2422,"id":2},{"name":"计算机网络与信息技术","count":2080,"id":3},{"name":"信息安全","count":1417,"id":4},{"name":"Information Security","count":1393,"id":5},{"name":"软件工程","count":1137,"id":6},{"name":"人工智能及图像处理技术","count":938,"id":7},{"name":"Network & Communication","count":800,"id":8},{"name":"网络与通信","count":793,"id":9},{"name":"计算机网络与信息安全","count":743,"id":10},{"name":"Computer Network & Information Security","count":714,"id":11},{"name":"图形图像与模式识别","count":672,"id":12},{"name":"计算机图形学&多媒体","count":507,"id":13},{"name":"Computer Graphics & Multimedia","count":481,"id":14},{"name":"数据库&大数据&数据科学","count":481,"id":15},{"name":"Database & Big Data & Data Science","count":452,"id":16},{"name":"软件与数据库技术","count":423,"id":17},{"name":"Graphics,Image & Pattern Recognition","count":421,"id":18},{"name":"Software & Database Technology","count":396,"id":19},{"name":"Intelligent Computing","count":333,"id":20},{"name":"智能计算","count":315,"id":21},{"name":"模式识别与图像处理","count":306,"id":22},{"name":"计算机网络","count":285,"id":23},{"name":"Computer Network","count":277,"id":24},{"name":"Interdiscipline & Application","count":250,"id":25},{"name":"人工智能及图像处理","count":231,"id":26},{"name":"软件工程与数据库技术","count":225,"id":27},{"name":"图像处理&多媒体技术","count":215,"id":28},{"name":"Image Processing & Multimedia Technology","count":209,"id":29},{"name":"Software Engineering","count":195,"id":30},{"name":"Big Data & Data Science","count":192,"id":31},{"name":"数据库与数据挖掘","count":179,"id":32},{"name":"Software Engineering & Database Technology","count":176,"id":33},{"name":"图形图像","count":173,"id":34},{"name":"Graphics, Image & Pattern Recognition","count":170,"id":35},{"name":"人工智能与图像处理技术","count":170,"id":36},{"name":"Graphics & Image","count":164,"id":37},{"name":"Database & Data Mining","count":162,"id":38},{"name":"图形图像及体系结构","count":161,"id":39},{"name":"Wireless Network and Communication","count":146,"id":40},{"name":"无线网络与通信","count":146,"id":41},{"name":"Pattern Recognition and Image Processing","count":144,"id":42},{"name":"交叉&应用","count":144,"id":43},{"name":"综合、交叉与应用","count":129,"id":44},{"name":"大数据&数据科学","count":121,"id":45},{"name":"Interdiscipline & Frontier","count":112,"id":46},{"name":"大数据与数据挖掘","count":107,"id":47},{"name":"Pattern Recognition & Image Processing","count":103,"id":48},{"name":"体系结构","count":98,"id":49},{"name":"交叉与前沿","count":97,"id":50},{"name":"智能系统及应用","count":97,"id":51},{"name":"Graphics, Image and Architecture","count":90,"id":52},{"name":"Computer Software","count":87,"id":53},{"name":"计算机软件","count":87,"id":54},{"name":"Big Data & Data Mining","count":86,"id":55},{"name":"综述","count":85,"id":56},{"name":"Architecture","count":84,"id":57},{"name":"Surveys","count":78,"id":58},{"name":"高性能计算","count":75,"id":59},{"name":"Artificial Intelligence & Image Processing","count":71,"id":60},{"name":"Data Mining","count":71,"id":61},{"name":"Graphics,Image and Architecture","count":71,"id":62},{"name":"大数据与数据科学","count":71,"id":63},{"name":"数据挖掘","count":71,"id":64},{"name":"计算机网络与信息技","count":65,"id":65},{"name":"Computer Network & Information Technology","count":64,"id":66},{"name":"人工智能与图像处理","count":62,"id":67},{"name":"High Performance Computing","count":61,"id":68},{"name":"Intelligent System and Application","count":59,"id":69},{"name":"Software Engineering and Database Technology","count":59,"id":70},{"name":"Computer Graphics&Multimedia","count":51,"id":71},{"name":"Review","count":50,"id":72},{"name":"云计算与信息服务","count":50,"id":73},{"name":"综述研究","count":50,"id":74},{"name":"计算机网络语信息安全","count":45,"id":75},{"name":"Digital Information Processing","count":44,"id":76},{"name":"数字信息处理","count":44,"id":77},{"name":"Graphics ,Image & Pattern Recognition","count":43,"id":78},{"name":"Rough集理论及其应用","count":43,"id":79},{"name":"网络&通信","count":43,"id":80},{"name":"网络与信息","count":42,"id":81},{"name":"Artifical Intelligence & Image Processing","count":41,"id":82},{"name":"Intelligent Systems and Applications","count":38,"id":83},{"name":"NASAC 2015","count":38,"id":84},{"name":"NASAC2014","count":36,"id":85},{"name":"信息安全与虚拟现实","count":36,"id":86},{"name":"第十三届全国软件与应用学术会议","count":36,"id":87},{"name":"CCML 2013","count":34,"id":88},{"name":"Network&Communication","count":32,"id":89},{"name":"2013'HHME","count":30,"id":90},{"name":"2013'和谐人机环境联合学术会议","count":30,"id":91},{"name":"分布式系统与Web技术","count":30,"id":92},{"name":"网络与嵌入式技术","count":30,"id":93},{"name":"Computer network & Information Security","count":29,"id":94},{"name":"Pattern Recognition&Image Processing","count":29,"id":95},{"name":"区块链技术","count":28,"id":96},{"name":"2013'NASAC","count":27,"id":97},{"name":"2013'全国软件与应用学术会议","count":27,"id":98},{"name":"2016年全国软件与应用学术会议","count":27,"id":99},{"name":"Blockchain Technology","count":27,"id":100},{"name":"Data Storage and Mining","count":27,"id":101},{"name":"Database&Big Data&Data Science","count":27,"id":102},{"name":"NASAC 2016","count":27,"id":103},{"name":"人工智能与图像处理技","count":27,"id":104},{"name":"数据存储与挖掘","count":27,"id":105},{"name":"计算机体系结构","count":26,"id":106},{"name":"2012'HPC Special Column","count":25,"id":107},{"name":"2012'HPC专栏","count":25,"id":108},{"name":"2013'Petri Net","count":25,"id":109},{"name":"2013'Petri网","count":25,"id":110},{"name":"Pattem Recognition & Image Processing","count":25,"id":111},{"name":"2014'全国理论计算机科学年会","count":24,"id":112},{"name":"NCTCS2014","count":24,"id":113},{"name":"网络与信息技术","count":24,"id":114},{"name":"2013'NCTCS","count":23,"id":115},{"name":"2013年全国理论计算机科学学术年会","count":23,"id":116},{"name":"Computer Network & Information security","count":23,"id":117},{"name":"Intelligent Control and Optimization","count":23,"id":118},{"name":"Interdiscipline&Application","count":23,"id":119},{"name":"智能控制与优化","count":23,"id":120},{"name":"2013'Intelligent Information Processing","count":22,"id":121},{"name":"2013'智能信息处理","count":22,"id":122},{"name":"Computer Neteork & Information Security","count":22,"id":123},{"name":"Information Storage and Mining","count":22,"id":124},{"name":"信息存储与挖掘","count":22,"id":125},{"name":"计算机网络与心系技术","count":22,"id":126},{"name":"2013’CCF Conference on Artificial Intelligence","count":21,"id":127},{"name":"2013’CCF人工智能会议","count":21,"id":128},{"name":"Big Data&Data Mining","count":21,"id":129},{"name":"2014'中国粗糙集与软计算、中国网络智能与中国粒计算?","count":20,"id":130},{"name":"CRSSC-CWI-CGrC2014","count":20,"id":131},{"name":"Computer Architecture","count":20,"id":132},{"name":"Technology and Application of Intelligent Education","count":20,"id":133},{"name":"数据挖掘与机器学习","count":20,"id":134},{"name":"智能教育技术及应用","count":20,"id":135},{"name":"2014'数据挖掘会议","count":19,"id":136},{"name":"2015年中国计算机学会人工智能会议","count":19,"id":137},{"name":"CCDM2014","count":19,"id":138},{"name":"CCFAI2015","count":19,"id":139},{"name":"Computer Science Theory","count":19,"id":140},{"name":"有工智能及图像处理技术","count":19,"id":141},{"name":"计算机科学理论","count":19,"id":142},{"name":"2014年全国高性能计算学术年会","count":18,"id":143},{"name":"2015年第三届CCF大数据学术会议","count":18,"id":144},{"name":"CCF BigData 2015","count":18,"id":145},{"name":"Data Science","count":18,"id":146},{"name":"Graphics,Image&Pattern Recognition","count":18,"id":147},{"name":"HPC2014","count":18,"id":148},{"name":"交叉&前沿","count":18,"id":149},{"name":"只能计算","count":18,"id":150},{"name":"数据科学","count":18,"id":151},{"name":"软件工程及其他","count":18,"id":152},{"name":"Intelligent Software Engineering","count":17,"id":153},{"name":"Network & Information Security","count":17,"id":154},{"name":"智能软件工程","count":17,"id":155},{"name":"网络与信息安全","count":17,"id":156},{"name":"2013年全国高性能计算学术年会","count":16,"id":157},{"name":"2015第十五届全国Petri网理论与应用学术会议","count":16,"id":158},{"name":"CRSSC-CWI-CGrC 2016","count":16,"id":159},{"name":"CRSSC-CWI-CGrC-3WD 2017","count":16,"id":160},{"name":"Formalized Methods and Network Application","count":16,"id":161},{"name":"Granular Computing & Knowledge Discovery","count":16,"id":162},{"name":"HPC China 2013","count":16,"id":163},{"name":"Intelligent Control and Architecture","count":16,"id":164},{"name":"Petri 2015","count":16,"id":165},{"name":"Software & Interdiscipline","count":16,"id":166},{"name":"Software&Database Technology","count":16,"id":167},{"name":"Wireless Network and Communication Technology","count":16,"id":168},{"name":"人工智能与图象处理","count":16,"id":169},{"name":"形式化与网络应用","count":16,"id":170},{"name":"无线网络与通信技术","count":16,"id":171},{"name":"智能控制与体系结构","count":16,"id":172},{"name":"服务化科研成果","count":16,"id":173},{"name":"粒计算与知识发现","count":16,"id":174},{"name":"计算机视觉:理论与应用","count":16,"id":175},{"name":"软件&交叉","count":16,"id":176},{"name":"2013'Rough Set","count":15,"id":177},{"name":"2013'粗糙集","count":15,"id":178},{"name":"2015全国高性能计算学术年会","count":15,"id":179},{"name":"2016第六届中国数据挖掘会议","count":15,"id":180},{"name":"CCDM 2016","count":15,"id":181},{"name":"Computer Vision : Theory and Application","count":15,"id":182},{"name":"HPC China 2015","count":15,"id":183},{"name":"神经网络,进化计算与支撑向量机","count":15,"id":184},{"name":"2014'江苏省人工智能学术会议","count":14,"id":185},{"name":"2018中国多媒体大会","count":14,"id":186},{"name":"2018年第七届中国数据挖掘会议","count":14,"id":187},{"name":"Arcbitecture","count":14,"id":188},{"name":"CCDM2018","count":14,"id":189},{"name":"CRSSC-CWI-CGrC2015","count":14,"id":190},{"name":"ChinaMM2018","count":14,"id":191},{"name":"Graphics, Image& Pattern Recognition","count":14,"id":192},{"name":"HHME2014","count":14,"id":193},{"name":"Intelligent Control","count":14,"id":194},{"name":"Intelligent Data Governance Technologies and Systems","count":14,"id":195},{"name":"Intelligent Edge Computing","count":14,"id":196},{"name":"JSAI2014","count":14,"id":197},{"name":"Model Recognition","count":14,"id":198},{"name":"Software Engineering & Requirements Engineering for Complex Systems","count":14,"id":199},{"name":"Web应用框架和体系结构","count":14,"id":200}]