[{"name":"算法研究探讨","count":5026,"id":1},{"name":"图形图像技术","count":2653,"id":2},{"name":"Algorithm Research & Explore","count":2423,"id":3},{"name":"网络与通信技术","count":2087,"id":4},{"name":"信息安全技术","count":2033,"id":5},{"name":"研究探讨","count":1922,"id":6},{"name":"Algorithm Research & Explorer","count":1740,"id":7},{"name":"系统应用开发","count":1482,"id":8},{"name":"Technology of Graphic & Image","count":1468,"id":9},{"name":"System Development & Application","count":1236,"id":10},{"name":"Technology of Information Security","count":1100,"id":11},{"name":"Technology of Network & Communication","count":1087,"id":12},{"name":"综述评论","count":1051,"id":13},{"name":"软件技术研究","count":825,"id":14},{"name":"Survey","count":723,"id":15},{"name":"Software Technology Research","count":716,"id":16},{"name":"Network & Communication Technology","count":703,"id":17},{"name":"开发应用","count":679,"id":18},{"name":"Information Security Technology","count":655,"id":19},{"name":"信息安全","count":653,"id":20},{"name":"Graphics & Image Technology","count":601,"id":21},{"name":"应用与开发","count":594,"id":22},{"name":"图形图像","count":445,"id":23},{"name":"网络通信","count":415,"id":24},{"name":"开发与应用","count":405,"id":25},{"name":"RESEARCH & EXPLORER","count":307,"id":26},{"name":"Research & Explorer","count":266,"id":27},{"name":"DEVELOPMENT & APPLICATION","count":256,"id":28},{"name":"Development & Application","count":247,"id":29},{"name":"网络与通信","count":226,"id":30},{"name":"网络技术及应用","count":192,"id":31},{"name":"Graphic & Image","count":159,"id":32},{"name":"INFORMATION SECURITY","count":157,"id":33},{"name":"Information Security","count":156,"id":34},{"name":"Network & Communication","count":135,"id":35},{"name":"NETWORK & COMMUNICATION","count":125,"id":36},{"name":"GRAPHIC & IMAGE","count":124,"id":37},{"name":"Graphic & Image Technology","count":122,"id":38},{"name":"图形与图像","count":119,"id":39},{"name":"区块链技术","count":117,"id":40},{"name":"Algorithm Research&Explore","count":115,"id":41},{"name":"Technology of Blockchain","count":111,"id":42},{"name":"Algorithm Research&Explorer","count":110,"id":43},{"name":"Algorithm Research& Explore","count":107,"id":44},{"name":"网络技术","count":95,"id":45},{"name":"Technology of Graphic&Image","count":92,"id":46},{"name":"安全性研究","count":83,"id":47},{"name":"应用开发","count":78,"id":48},{"name":"Technology of Network&Communication","count":70,"id":49},{"name":"数据库技术","count":65,"id":50},{"name":"网络通信技术","count":63,"id":51},{"name":"经验技巧","count":56,"id":52},{"name":"算法研究与探讨","count":52,"id":53},{"name":"System Development&Application","count":51,"id":54},{"name":"图形、图像技术","count":50,"id":55},{"name":"SURVEY","count":49,"id":56},{"name":"软件技术","count":48,"id":57},{"name":"Algorithm research & Explorer","count":40,"id":58},{"name":"研究与探讨","count":35,"id":59},{"name":"信息集萃","count":34,"id":60},{"name":"Algorithm research & explorer","count":33,"id":61},{"name":"算法研究讨论","count":29,"id":62},{"name":"Graphics&Image Technology","count":27,"id":63},{"name":"网络技术应用","count":27,"id":64},{"name":"Algorithmic Research & Explorer","count":26,"id":65},{"name":"网络及网管技术","count":26,"id":66},{"name":"Algorthm Research & Explorer","count":25,"id":67},{"name":"A1gorithm Research & Explore","count":24,"id":68},{"name":"INFORMATION & SECURITY","count":23,"id":69},{"name":"Research & Explore","count":22,"id":70},{"name":"System Development& Application","count":22,"id":71},{"name":"通信技术","count":22,"id":72},{"name":"研究研讨","count":21,"id":73},{"name":"算法研究与建模","count":21,"id":74},{"name":"网络技术与安全性","count":20,"id":75},{"name":"Network&Communication Technology","count":19,"id":76},{"name":"System Develoment & Application","count":19,"id":77},{"name":"Technology Information Security","count":19,"id":78},{"name":"Technology of Graphic& Image","count":19,"id":79},{"name":"Techno1ogy of inormation Secnrity","count":18,"id":80},{"name":"Network & Commnnication Technology","count":16,"id":81},{"name":"APPLICATION & DEVELOPMENT","count":14,"id":82},{"name":"NETWORK TECHNOLOGY APPLICATION","count":14,"id":83},{"name":"系统应用技术","count":14,"id":84},{"name":"网络语通信技术","count":14,"id":85},{"name":"GIS技术","count":13,"id":86},{"name":"Graphics & Inage Technology","count":13,"id":87},{"name":"网络和数据库技术","count":13,"id":88},{"name":"Sygtem Development & Application","count":12,"id":89},{"name":"Software Ttechnology Research","count":11,"id":90},{"name":"Systcm Development&Application","count":11,"id":91},{"name":"System Development Application","count":11,"id":92},{"name":"Technology of Network& Communication","count":11,"id":93},{"name":"图形图象技术","count":11,"id":94},{"name":"Sortware Technology Research","count":10,"id":95},{"name":"系统应用开发技术","count":10,"id":96},{"name":"网络技术与安全性研究","count":10,"id":97},{"name":"通信与网络技术","count":10,"id":98},{"name":"Software Technology","count":9,"id":99},{"name":"图形与图象处理","count":9,"id":100},{"name":"Special Topics in Data Analysis and Knowledge Discovery","count":8,"id":101},{"name":"数据分析与知识发现专题","count":8,"id":102},{"name":"网格技术及应用","count":8,"id":103},{"name":"MPLS技术及应用","count":7,"id":104},{"name":"Technology of Information on Security","count":7,"id":105},{"name":"路径规划专题","count":7,"id":106},{"name":"Technology of Network & Communication","count":6,"id":107},{"name":"经验与技巧","count":6,"id":108},{"name":"EXPERIENCE & TECHNIQUE","count":5,"id":109},{"name":"GIS技术应用","count":5,"id":110},{"name":"SECURITY","count":5,"id":111},{"name":"Special Topic on Natural Language Processing","count":5,"id":112},{"name":"Special Topics in Federated Learning","count":5,"id":113},{"name":"Special Topics in Intelligent Optimization Algorithm and Application","count":5,"id":114},{"name":"TechnologyofGraphic& Image","count":5,"id":115},{"name":"TechnologyofInformationSecurity","count":5,"id":116},{"name":"TechnologyofNetwork& Communication","count":5,"id":117},{"name":"安全技术","count":5,"id":118},{"name":"智能优化算法及应用专题","count":5,"id":119},{"name":"网络数据库技术","count":5,"id":120},{"name":"联邦学习专题","count":5,"id":121},{"name":"自然语言处理专题","count":5,"id":122},{"name":"软件质量和过程管理","count":5,"id":123},{"name":"GIS与图形技术","count":4,"id":124},{"name":"Special Topics in Development and Application of Large Language model","count":4,"id":125},{"name":"Special Topics in Path Planning","count":4,"id":126},{"name":"System Development","count":4,"id":127},{"name":"Techno1ogy of Information Security","count":4,"id":128},{"name":"Technoloky of Blockchain","count":4,"id":129},{"name":"XML技术","count":4,"id":130},{"name":"图形、图象技术","count":4,"id":131},{"name":"图形与图像处理","count":4,"id":132},{"name":"大语言模型发展与应用专题","count":4,"id":133},{"name":"硬件技术","count":4,"id":134},{"name":"系统安全研究","count":4,"id":135},{"name":"通信技术及应用","count":4,"id":136},{"name":"CORBA技术","count":3,"id":137},{"name":"Special Topics in Contrastive and Non-contrastive Learning","count":3,"id":138},{"name":"Special Topics in Data Mining","count":3,"id":139},{"name":"Special Topics in Deep Reinforcement","count":3,"id":140},{"name":"Special Topics in Fault Diagnosis","count":3,"id":141},{"name":"Special Topics in Intelligent Transportation","count":3,"id":142},{"name":"Special Topics in Social Network Analysis & Discovery","count":3,"id":143},{"name":"Special Topics in Trend Forecasting Based on Artificial Intelligence","count":3,"id":144},{"name":"Sutvey","count":3,"id":145},{"name":"UML技术","count":3,"id":146},{"name":"图象处理","count":3,"id":147},{"name":"基于人工智能的趋势预测专题","count":3,"id":148},{"name":"对比或非对比学习专题","count":3,"id":149},{"name":"强化学习专题","count":3,"id":150},{"name":"故障诊断专题","count":3,"id":151},{"name":"数据挖掘专题","count":3,"id":152},{"name":"智能交通专题","count":3,"id":153},{"name":"电子商务技术","count":3,"id":154},{"name":"社交网络分析与发现专题","count":3,"id":155},{"name":"通讯技术","count":3,"id":156},{"name":"Special Topics in Graph Neural Network","count":2,"id":157},{"name":"TechnologyofBlockchain","count":2,"id":158},{"name":"图神经网络专题","count":2,"id":159},{"name":"虚拟现实技术","count":2,"id":160},{"name":"计算机辅助教学","count":2,"id":161},{"name":"INFORMATION","count":1,"id":162},{"name":"Information","count":1,"id":163},{"name":"专题评述","count":1,"id":164},{"name":"信息集卒","count":1,"id":165}]