[{"name":"算法研究探讨","count":4955,"id":1},{"name":"图形图像技术","count":2630,"id":2},{"name":"Algorithm Research & Explore","count":2369,"id":3},{"name":"网络与通信技术","count":2075,"id":4},{"name":"信息安全技术","count":2020,"id":5},{"name":"研究探讨","count":1922,"id":6},{"name":"Algorithm Research & Explorer","count":1740,"id":7},{"name":"系统应用开发","count":1461,"id":8},{"name":"Technology of Graphic & Image","count":1450,"id":9},{"name":"System Development & Application","count":1218,"id":10},{"name":"Technology of Information Security","count":1087,"id":11},{"name":"Technology of Network & Communication","count":1078,"id":12},{"name":"综述评论","count":1042,"id":13},{"name":"软件技术研究","count":819,"id":14},{"name":"Survey","count":714,"id":15},{"name":"Software Technology Research","count":710,"id":16},{"name":"Network & Communication Technology","count":703,"id":17},{"name":"开发应用","count":679,"id":18},{"name":"Information Security Technology","count":655,"id":19},{"name":"信息安全","count":653,"id":20},{"name":"Graphics & Image Technology","count":601,"id":21},{"name":"应用与开发","count":594,"id":22},{"name":"图形图像","count":445,"id":23},{"name":"网络通信","count":415,"id":24},{"name":"开发与应用","count":405,"id":25},{"name":"RESEARCH & EXPLORER","count":307,"id":26},{"name":"Research & Explorer","count":266,"id":27},{"name":"DEVELOPMENT & APPLICATION","count":256,"id":28},{"name":"Development & Application","count":247,"id":29},{"name":"网络与通信","count":226,"id":30},{"name":"网络技术及应用","count":192,"id":31},{"name":"Graphic & Image","count":159,"id":32},{"name":"INFORMATION SECURITY","count":157,"id":33},{"name":"Information Security","count":156,"id":34},{"name":"Network & Communication","count":135,"id":35},{"name":"NETWORK & COMMUNICATION","count":125,"id":36},{"name":"GRAPHIC & IMAGE","count":124,"id":37},{"name":"Graphic & Image Technology","count":122,"id":38},{"name":"图形与图像","count":119,"id":39},{"name":"Algorithm Research&Explorer","count":110,"id":40},{"name":"Algorithm Research& Explore","count":107,"id":41},{"name":"区块链技术","count":106,"id":42},{"name":"Technology of Blockchain","count":100,"id":43},{"name":"Algorithm Research&Explore","count":95,"id":44},{"name":"网络技术","count":95,"id":45},{"name":"Technology of Graphic&Image","count":87,"id":46},{"name":"安全性研究","count":83,"id":47},{"name":"应用开发","count":78,"id":48},{"name":"Technology of Network&Communication","count":67,"id":49},{"name":"数据库技术","count":65,"id":50},{"name":"网络通信技术","count":63,"id":51},{"name":"经验技巧","count":56,"id":52},{"name":"算法研究与探讨","count":52,"id":53},{"name":"图形、图像技术","count":50,"id":54},{"name":"SURVEY","count":49,"id":55},{"name":"System Development&Application","count":48,"id":56},{"name":"软件技术","count":48,"id":57},{"name":"Algorithm research & Explorer","count":40,"id":58},{"name":"研究与探讨","count":35,"id":59},{"name":"Algorithm research & explorer","count":33,"id":60},{"name":"信息集萃","count":30,"id":61},{"name":"算法研究讨论","count":29,"id":62},{"name":"Graphics&Image Technology","count":27,"id":63},{"name":"网络技术应用","count":27,"id":64},{"name":"Algorithmic Research & Explorer","count":26,"id":65},{"name":"网络及网管技术","count":26,"id":66},{"name":"Algorthm Research & Explorer","count":25,"id":67},{"name":"A1gorithm Research & Explore","count":24,"id":68},{"name":"INFORMATION & SECURITY","count":23,"id":69},{"name":"Research & Explore","count":22,"id":70},{"name":"System Development& Application","count":22,"id":71},{"name":"通信技术","count":22,"id":72},{"name":"研究研讨","count":21,"id":73},{"name":"算法研究与建模","count":21,"id":74},{"name":"网络技术与安全性","count":20,"id":75},{"name":"Network&Communication Technology","count":19,"id":76},{"name":"System Develoment & Application","count":19,"id":77},{"name":"Technology Information Security","count":19,"id":78},{"name":"Technology of Graphic& Image","count":19,"id":79},{"name":"Techno1ogy of inormation Secnrity","count":18,"id":80},{"name":"Network & Commnnication Technology","count":16,"id":81},{"name":"APPLICATION & DEVELOPMENT","count":14,"id":82},{"name":"NETWORK TECHNOLOGY APPLICATION","count":14,"id":83},{"name":"系统应用技术","count":14,"id":84},{"name":"网络语通信技术","count":14,"id":85},{"name":"GIS技术","count":13,"id":86},{"name":"Graphics & Inage Technology","count":13,"id":87},{"name":"网络和数据库技术","count":13,"id":88},{"name":"Sygtem Development & Application","count":12,"id":89},{"name":"Software Ttechnology Research","count":11,"id":90},{"name":"Systcm Development&Application","count":11,"id":91},{"name":"System Development Application","count":11,"id":92},{"name":"Technology of Network& Communication","count":11,"id":93},{"name":"图形图象技术","count":11,"id":94},{"name":"Sortware Technology Research","count":10,"id":95},{"name":"系统应用开发技术","count":10,"id":96},{"name":"网络技术与安全性研究","count":10,"id":97},{"name":"通信与网络技术","count":10,"id":98},{"name":"Software Technology","count":9,"id":99},{"name":"图形与图象处理","count":9,"id":100},{"name":"Special Topics in Data Analysis and Knowledge Discovery","count":8,"id":101},{"name":"数据分析与知识发现专题","count":8,"id":102},{"name":"网格技术及应用","count":8,"id":103},{"name":"MPLS技术及应用","count":7,"id":104},{"name":"Technology of Information on Security","count":7,"id":105},{"name":"Technology of Network & Communication","count":6,"id":106},{"name":"经验与技巧","count":6,"id":107},{"name":"EXPERIENCE & TECHNIQUE","count":5,"id":108},{"name":"GIS技术应用","count":5,"id":109},{"name":"SECURITY","count":5,"id":110},{"name":"Special Topic on Natural Language Processing","count":5,"id":111},{"name":"Special Topics in Federated Learning","count":5,"id":112},{"name":"Special Topics in Intelligent Optimization Algorithm and Application","count":5,"id":113},{"name":"TechnologyofGraphic& Image","count":5,"id":114},{"name":"TechnologyofInformationSecurity","count":5,"id":115},{"name":"TechnologyofNetwork& Communication","count":5,"id":116},{"name":"安全技术","count":5,"id":117},{"name":"智能优化算法及应用专题","count":5,"id":118},{"name":"网络数据库技术","count":5,"id":119},{"name":"联邦学习专题","count":5,"id":120},{"name":"自然语言处理专题","count":5,"id":121},{"name":"软件质量和过程管理","count":5,"id":122},{"name":"GIS与图形技术","count":4,"id":123},{"name":"Special Topics in Development and Application of Large Language model","count":4,"id":124},{"name":"System Development","count":4,"id":125},{"name":"Techno1ogy of Information Security","count":4,"id":126},{"name":"Technoloky of Blockchain","count":4,"id":127},{"name":"XML技术","count":4,"id":128},{"name":"图形、图象技术","count":4,"id":129},{"name":"图形与图像处理","count":4,"id":130},{"name":"大语言模型发展与应用专题","count":4,"id":131},{"name":"硬件技术","count":4,"id":132},{"name":"系统安全研究","count":4,"id":133},{"name":"通信技术及应用","count":4,"id":134},{"name":"CORBA技术","count":3,"id":135},{"name":"Special Topics in Contrastive and Non-contrastive Learning","count":3,"id":136},{"name":"Special Topics in Data Mining","count":3,"id":137},{"name":"Special Topics in Deep Reinforcement","count":3,"id":138},{"name":"Special Topics in Fault Diagnosis","count":3,"id":139},{"name":"Special Topics in Intelligent Transportation","count":3,"id":140},{"name":"Sutvey","count":3,"id":141},{"name":"UML技术","count":3,"id":142},{"name":"图象处理","count":3,"id":143},{"name":"对比或非对比学习专题","count":3,"id":144},{"name":"强化学习专题","count":3,"id":145},{"name":"故障诊断专题","count":3,"id":146},{"name":"数据挖掘专题","count":3,"id":147},{"name":"智能交通专题","count":3,"id":148},{"name":"电子商务技术","count":3,"id":149},{"name":"通讯技术","count":3,"id":150},{"name":"Special Topics in Graph Neural Network","count":2,"id":151},{"name":"TechnologyofBlockchain","count":2,"id":152},{"name":"图神经网络专题","count":2,"id":153},{"name":"虚拟现实技术","count":2,"id":154},{"name":"计算机辅助教学","count":2,"id":155},{"name":"INFORMATION","count":1,"id":156},{"name":"Information","count":1,"id":157},{"name":"专题评述","count":1,"id":158},{"name":"信息集卒","count":1,"id":159}]