[{"name":"研究论文与技术报告","count":2371,"id":1},{"name":"Papers and Reports","count":854,"id":2},{"name":"短文","count":446,"id":3},{"name":"研究论文","count":159,"id":4},{"name":"人工智能","count":92,"id":5},{"name":"信息安全","count":79,"id":6},{"name":"Brief Papers","count":71,"id":7},{"name":"数据科学与工程","count":68,"id":8},{"name":"Information Security","count":66,"id":9},{"name":"学术通信","count":64,"id":10},{"name":"综论","count":52,"id":11},{"name":"软件技术","count":44,"id":12},{"name":"Artificial Intelligence","count":43,"id":13},{"name":"Surveys","count":41,"id":14},{"name":"云计算","count":40,"id":15},{"name":"Internet of Things","count":39,"id":16},{"name":"物联网","count":39,"id":17},{"name":"研究简报","count":36,"id":18},{"name":"图形图像","count":35,"id":19},{"name":"Cloud Computing","count":34,"id":20},{"name":"社交网络","count":34,"id":21},{"name":"综述","count":33,"id":22},{"name":"软件工程","count":30,"id":23},{"name":"高性能计算","count":30,"id":24},{"name":"Computer Theory","count":29,"id":25},{"name":"网络空间安全","count":29,"id":26},{"name":"计算机理论","count":29,"id":27},{"name":"Big Data","count":27,"id":28},{"name":"Data Science and Engineering","count":27,"id":29},{"name":"Software Technologies","count":27,"id":30},{"name":"Special Topic on Internet of Things","count":27,"id":31},{"name":"大数据","count":27,"id":32},{"name":"学术活动","count":27,"id":33},{"name":"High Performance Computing","count":26,"id":34},{"name":"计算机网络新技术","count":24,"id":35},{"name":"《物联网关键理论与技术》专题","count":23,"id":36},{"name":"Social Networks","count":22,"id":37},{"name":"计算机辅助设计与图形学","count":21,"id":38},{"name":"Computer System Architecture","count":19,"id":39},{"name":"Computer Software and Theory","count":18,"id":40},{"name":"Graphics,Images and Virtual Reality","count":18,"id":41},{"name":"Social Computing","count":18,"id":42},{"name":"互联网技术","count":18,"id":43},{"name":"人工智能系统安全与攻防技术","count":18,"id":44},{"name":"图形图像与虚拟现实","count":18,"id":45},{"name":"社会计算","count":18,"id":46},{"name":"计算机软件与理论","count":18,"id":47},{"name":"边缘计算","count":18,"id":48},{"name":"网络技术","count":17,"id":49},{"name":"Computer Graphics","count":16,"id":50},{"name":"Software Engineering and System Software","count":16,"id":51},{"name":"Software Technology","count":16,"id":52},{"name":"图形学专辑","count":16,"id":53},{"name":"智能计算","count":16,"id":54},{"name":"科学与工程论坛","count":16,"id":55},{"name":"计算机理论与算法","count":16,"id":56},{"name":"软件工程与系统软件","count":16,"id":57},{"name":"Cloud Computing and Security","count":15,"id":58},{"name":"Computer Networks Technologies","count":15,"id":59},{"name":"Correspondences","count":15,"id":60},{"name":"Internet Technologies","count":15,"id":61},{"name":"Internet of Things and Cyber-Physical System","count":15,"id":62},{"name":"Quantum Computation,Computer Theory and Algorithms","count":15,"id":63},{"name":"Video Image and Graphics","count":15,"id":64},{"name":"云计算与安全","count":15,"id":65},{"name":"在线社会关系网络的挖掘与分析","count":15,"id":66},{"name":"数据库年会优秀论文","count":15,"id":67},{"name":"数据挖掘、机器学习与类脑智能","count":15,"id":68},{"name":"智能信息处理","count":15,"id":69},{"name":"物联网、车联网与信息物理系统","count":15,"id":70},{"name":"物联网与信息物理融合系统","count":15,"id":71},{"name":"虚拟现实与计算机视觉","count":15,"id":72},{"name":"视频图像与图形","count":15,"id":73},{"name":"量子计算、计算机理论与算法","count":15,"id":74},{"name":"Graphics and Images Processing","count":14,"id":75},{"name":"人工智能与安全","count":14,"id":76},{"name":"多媒体专辑","count":14,"id":77},{"name":"大数据分析","count":14,"id":78},{"name":"并行与分布计算体系结构","count":14,"id":79},{"name":"数据挖掘","count":14,"id":80},{"name":"计算机系统结构与高性能计算","count":14,"id":81},{"name":"Algorithm and Intelligence","count":13,"id":82},{"name":"Analytics and Mining of Social Media","count":13,"id":83},{"name":"Computer Architecture","count":13,"id":84},{"name":"Cyber Security","count":13,"id":85},{"name":"Cyberspace Security","count":13,"id":86},{"name":"Green Computing","count":13,"id":87},{"name":"Intelligent Services","count":13,"id":88},{"name":"Pervasive Computing and Human-Computer Interaction","count":13,"id":89},{"name":"Software Engineering","count":13,"id":90},{"name":"Trusted Cloud Computing","count":13,"id":91},{"name":"可信的云计算","count":13,"id":92},{"name":"容错","count":13,"id":93},{"name":"并行与分布计算软件","count":13,"id":94},{"name":"普适计算与人机交互","count":13,"id":95},{"name":"智能服务","count":13,"id":96},{"name":"社会媒体分析、挖掘","count":13,"id":97},{"name":"社会媒体分析和挖掘","count":13,"id":98},{"name":"科学理论与算法","count":13,"id":99},{"name":"算法与智能","count":13,"id":100},{"name":"绿色计算","count":13,"id":101},{"name":"自然语言处理与社交网络分析","count":13,"id":102},{"name":"计算机体系结构","count":13,"id":103},{"name":"计算机系统机构","count":13,"id":104},{"name":"软件技术与理论","count":13,"id":105},{"name":"Analysis on Secure Network Behavior","count":12,"id":106},{"name":"Blockchain and ePayment Security","count":12,"id":107},{"name":"Image Processing","count":12,"id":108},{"name":"Natural Language and Data Processing","count":12,"id":109},{"name":"Novel Computer Networks","count":12,"id":110},{"name":"Paper and Report","count":12,"id":111},{"name":"人工智能与信息安全","count":12,"id":112},{"name":"人工智能与社会计算","count":12,"id":113},{"name":"区块链与电子支付安全","count":12,"id":114},{"name":"图像处理","count":12,"id":115},{"name":"安全","count":12,"id":116},{"name":"机器学习","count":12,"id":117},{"name":"网络安全行为分析","count":12,"id":118},{"name":"自然语言与数据处理","count":12,"id":119},{"name":"Artificial Intelligence and Software","count":11,"id":120},{"name":"Image Processing and Computer Vision","count":11,"id":121},{"name":"Intelligent Image Processing","count":11,"id":122},{"name":"人工智能与软件","count":11,"id":123},{"name":"分类","count":11,"id":124},{"name":"图像处理与计算机视觉","count":11,"id":125},{"name":"安全、隐私、区块链与信息隐藏","count":11,"id":126},{"name":"智能图像处理","count":11,"id":127},{"name":"计算机教育","count":11,"id":128},{"name":"软件理论与技术","count":11,"id":129},{"name":"需求工程","count":11,"id":130},{"name":"Internet","count":10,"id":131},{"name":"Mobile Networks","count":10,"id":132},{"name":"Science and Engineering Forum","count":10,"id":133},{"name":"System Software and Algorithm","count":10,"id":134},{"name":"互联网","count":10,"id":135},{"name":"区块链","count":10,"id":136},{"name":"大数据与智能图象处理","count":10,"id":137},{"name":"移动网络","count":10,"id":138},{"name":"系统软件与算法","count":10,"id":139},{"name":"Mobile Internet","count":9,"id":140},{"name":"先进计算","count":9,"id":141},{"name":"数据库","count":9,"id":142},{"name":"移动互联网","count":9,"id":143},{"name":"网络与内容信息安全","count":9,"id":144},{"name":"网络信任与认证授权","count":9,"id":145},{"name":"Cloud Computing and Service Computing","count":8,"id":146},{"name":"Social Networks and IoT","count":8,"id":147},{"name":"云计算与服务计算","count":8,"id":148},{"name":"密码学与安全协议","count":8,"id":149},{"name":"并行与分布计算应用","count":8,"id":150},{"name":"物联网关键理论与技术","count":8,"id":151},{"name":"社交网络与物联网","count":8,"id":152},{"name":"Breif Papers","count":7,"id":153},{"name":"Database,Data Stream and Data Warehouse","count":7,"id":154},{"name":"人工智能与视觉信息处理","count":7,"id":155},{"name":"入侵检测","count":7,"id":156},{"name":"攻击检测与蠕虫","count":7,"id":157},{"name":"数据库、数据流和数据仓库","count":7,"id":158},{"name":"服务组合","count":7,"id":159},{"name":"服务组合、业务过程管理和应用集成","count":7,"id":160},{"name":"机器学习与多模态计算","count":7,"id":161},{"name":"聚类","count":7,"id":162},{"name":"计算机网络与结构","count":7,"id":163},{"name":"隐私保护","count":7,"id":164},{"name":"Bigdata and Cloud Services","count":6,"id":165},{"name":"Cloud and Services","count":6,"id":166},{"name":"Computer Networks","count":6,"id":167},{"name":"Image and Multimedia","count":6,"id":168},{"name":"Internet of Vehicles","count":6,"id":169},{"name":"Mobile Internet and Intelligent Terminal","count":6,"id":170},{"name":"Social Media Data Analytics","count":6,"id":171},{"name":"云服务","count":6,"id":172},{"name":"图像与多媒体","count":6,"id":173},{"name":"大数据与云服务","count":6,"id":174},{"name":"安全协议","count":6,"id":175},{"name":"密码学基础、密码算法和密钥管理","count":6,"id":176},{"name":"密码算法分析与安全威胁分析","count":6,"id":177},{"name":"社交媒体数据分析","count":6,"id":178},{"name":"移动互联网与智能终端","count":6,"id":179},{"name":"群智协同","count":6,"id":180},{"name":"计算机科学理论","count":6,"id":181},{"name":"计算机系统体系结构","count":6,"id":182},{"name":"计算机网络","count":6,"id":183},{"name":"车联网","count":6,"id":184},{"name":"面向服务的新型体系结构","count":6,"id":185},{"name":"Cloud Computing and Computer Networks","count":5,"id":186},{"name":"Green Nteworks and Computing","count":5,"id":187},{"name":"Information Retrieval","count":5,"id":188},{"name":"Privacy Protection","count":5,"id":189},{"name":"Special Topic on Green Networks and Computing","count":5,"id":190},{"name":"XML and Unstructured Data","count":5,"id":191},{"name":"XML与非结构化数据","count":5,"id":192},{"name":"《绿色网络与计算》专题","count":5,"id":193},{"name":"云计算与计算机网络","count":5,"id":194},{"name":"信息检索","count":5,"id":195},{"name":"先进计算系统","count":5,"id":196},{"name":"安全信誉可靠性","count":5,"id":197},{"name":"客户端定制与最终用户编程","count":5,"id":198},{"name":"密码算法设计与数字签名","count":5,"id":199},{"name":"性能和服务质量","count":5,"id":200}]