[{"name":"学术论文","count":3478,"id":1},{"name":"Papers","count":2803,"id":2},{"name":"学术通信","count":724,"id":3},{"name":"技术报告","count":621,"id":4},{"name":"Correspondences","count":503,"id":5},{"name":"短文","count":467,"id":6},{"name":"Technical Reports","count":269,"id":7},{"name":"综述","count":221,"id":8},{"name":"学 术 论 文","count":142,"id":9},{"name":"Concise Papers","count":103,"id":10},{"name":"研究简报","count":84,"id":11},{"name":"Comprehensive Review","count":82,"id":12},{"name":"论文","count":58,"id":13},{"name":"Comprehensive Reviews","count":56,"id":14},{"name":"论文Ⅱ","count":41,"id":15},{"name":"学 术 通 信","count":36,"id":16},{"name":"第九届全国青年通信学术会议优秀论文专栏","count":25,"id":17},{"name":"论文Ⅱ:学术论文","count":20,"id":18},{"name":"Network Application","count":15,"id":19},{"name":"Network Security","count":15,"id":20},{"name":"网络安全","count":15,"id":21},{"name":"网络应用","count":15,"id":22},{"name":"网络空间安全","count":15,"id":23},{"name":"网络新技术及其应用","count":14,"id":24},{"name":"Network Operation and Management","count":13,"id":25},{"name":"网络运行与管理","count":13,"id":26},{"name":"隐私保护","count":12,"id":27},{"name":"CERNET 2 and IPv6","count":11,"id":28},{"name":"CERNET与IPv6","count":11,"id":29},{"name":"Search","count":11,"id":30},{"name":"Technical Report","count":11,"id":31},{"name":"Trusting Internet","count":11,"id":32},{"name":"可信互联网络","count":11,"id":33},{"name":"搜索","count":11,"id":34},{"name":"CSCW Applications","count":10,"id":35},{"name":"CSCW应用系统","count":10,"id":36},{"name":"New network technology and its application","count":10,"id":37},{"name":"CSCW in Web/Grid","count":9,"id":38},{"name":"Network survey and plan","count":9,"id":39},{"name":"Topics: Strategic Technologies to Massive Connecting for the Future Mobile Networks","count":9,"id":40},{"name":"Virtulization, cloud computing and software defined networking","count":9,"id":41},{"name":"专题:面向未来移动网络的大规模组网关键技术","count":9,"id":42},{"name":"技 术 报 告","count":9,"id":43},{"name":"新网络环境下的协同工作","count":9,"id":44},{"name":"特约专稿","count":9,"id":45},{"name":"网络测量与规划","count":9,"id":46},{"name":"虚拟化、云计算与软件定义网络技术","count":9,"id":47},{"name":"5G and Cognitive and Cooperative Network","count":8,"id":48},{"name":"Artificial Intelligence and Network Security","count":8,"id":49},{"name":"Research on Cooperative Theory and Technology","count":8,"id":50},{"name":"Security in cyberspace","count":8,"id":51},{"name":"Special Issue on Internet of Things and Its Security","count":8,"id":52},{"name":"协同理论与技术研究","count":8,"id":53},{"name":"论文Ⅰ 空间信息传输网络","count":8,"id":54},{"name":"论文Ⅰ:5G及认知协作网络","count":8,"id":55},{"name":"论文Ⅰ:人工智能与网络安全","count":8,"id":56},{"name":"论文Ⅰ:物联网与安全","count":8,"id":57},{"name":"Access control and trust mechanism","count":7,"id":58},{"name":"BigDate for education and its application","count":7,"id":59},{"name":"CSCW Architecture and Module","count":7,"id":60},{"name":"CSCW体系结构和模型","count":7,"id":61},{"name":"Cloud Security","count":7,"id":62},{"name":"Correspondence","count":7,"id":63},{"name":"IPv6 for campus network engineering","count":7,"id":64},{"name":"IPv6新技术与校园网络工程","count":7,"id":65},{"name":"Privacy Protection","count":7,"id":66},{"name":"Topics: Key Technologies of the Polymorphic Network Environment","count":7,"id":67},{"name":"Topics:Low Earth Orbit Satellite Internet","count":7,"id":68},{"name":"专题:低地球轨道卫星互联网","count":7,"id":69},{"name":"专题:多模态网络环境关键技术","count":7,"id":70},{"name":"云安全","count":7,"id":71},{"name":"教育大数据技术与应用","count":7,"id":72},{"name":"杰青优青专栏","count":7,"id":73},{"name":"访问控制与信任机制","count":7,"id":74},{"name":"Distinguished and Excellent Young Scholars","count":6,"id":75},{"name":"IPv6下一代互联网技术","count":6,"id":76},{"name":"Optical Transmission System and Optical Network Optimization","count":6,"id":77},{"name":"Security Protocol","count":6,"id":78},{"name":"Technical Rcports","count":6,"id":79},{"name":"Topics: Convergence of Communications and Computing for the IoE","count":6,"id":80},{"name":"Topics: Distributed Edge Intelligence for Complex Environments","count":6,"id":81},{"name":"Topics: Intellgent Mine","count":6,"id":82},{"name":"Topics:Key Technologies for the Next Generation Mo","count":6,"id":83},{"name":"专题:下一代移动通信及网络的关键技术","count":6,"id":84},{"name":"专题:复杂环境下分布式边缘智能","count":6,"id":85},{"name":"专题:智慧矿山","count":6,"id":86},{"name":"专题:面向万物互联的通信与计算融合","count":6,"id":87},{"name":"安全协议","count":6,"id":88},{"name":"新技术展望","count":6,"id":89},{"name":"校园网络工程","count":6,"id":90},{"name":"论文Ⅱ:光传输系统与光网络优化","count":6,"id":91},{"name":"Comprehensive Reviser","count":5,"id":92},{"name":"Guarantee of QoS","count":5,"id":93},{"name":"Mobile Security","count":5,"id":94},{"name":"Privacy Protecting","count":5,"id":95},{"name":"Security Communication","count":5,"id":96},{"name":"Topics: Applications of Information Metamaterials in Mobile Communications","count":5,"id":97},{"name":"Topics: Deterministic Network","count":5,"id":98},{"name":"Topics: Intelligent Communication and Network Technologies for Manned/Unmanned Cooperation Systems","count":5,"id":99},{"name":"Topics: Key Technologies for Terahertz Communications","count":5,"id":100},{"name":"Topics: Key Technologies of Edge Computing","count":5,"id":101},{"name":"Topics: Marine Information Perception, Transmission and Fusion","count":5,"id":102},{"name":"Topics: New Technology of Computer Communication and Network System Security","count":5,"id":103},{"name":"Topics: Satellite Communications Technology","count":5,"id":104},{"name":"Topics: Technologies of Industrial Internet Security","count":5,"id":105},{"name":"专题:信息超材料在移动通信中的应用","count":5,"id":106},{"name":"专题:卫星通信技术","count":5,"id":107},{"name":"专题:太赫兹通信关键技术","count":5,"id":108},{"name":"专题:工业互联网安全技术","count":5,"id":109},{"name":"专题:海洋信息感知、传输与融合","count":5,"id":110},{"name":"专题:确定性网络","count":5,"id":111},{"name":"专题:计算机通信与网络系统安全技术","count":5,"id":112},{"name":"专题:边缘计算关键技术","count":5,"id":113},{"name":"专题:面向有人无人协同的智能通信与组网技术","count":5,"id":114},{"name":"安全通信","count":5,"id":115},{"name":"服务质量保证","count":5,"id":116},{"name":"移动安全","count":5,"id":117},{"name":"论文Ⅰ 网络攻击与防范","count":5,"id":118},{"name":"论文Ⅰ:密码算法与安全协议","count":5,"id":119},{"name":"论文Ⅲ:学术论文","count":5,"id":120},{"name":"Coorespondences","count":4,"id":121},{"name":"Correpondences","count":4,"id":122},{"name":"Data Security","count":4,"id":123},{"name":"Goncise Papers","count":4,"id":124},{"name":"Research Note","count":4,"id":125},{"name":"Resource management","count":4,"id":126},{"name":"Topics: 5G and AI","count":4,"id":127},{"name":"Topics: Key Technologies for Ubiquitous Sensing and Intelligent Recognition in the Ubiquitous Internet of Things","count":4,"id":128},{"name":"Topics: Key Technologies of 6G Oriented Intellicise Network","count":4,"id":129},{"name":"Topics: Mobile AI","count":4,"id":130},{"name":"Topics: Multi-/Cross-Modal Semantic Communications","count":4,"id":131},{"name":"Topics: Network Attack, Defense and Security Metrics","count":4,"id":132},{"name":"Topics: Novel Network Architecture","count":4,"id":133},{"name":"Topics:Key Technologies of Spectrum Game in Space-Air-Ground Integrated Networks","count":4,"id":134},{"name":"专题:5G与AI","count":4,"id":135},{"name":"专题:多/跨模态语义通信","count":4,"id":136},{"name":"专题:新型网络架构","count":4,"id":137},{"name":"专题:移动人工智能","count":4,"id":138},{"name":"专题:空天地一体化网络频谱博弈关键技术","count":4,"id":139},{"name":"专题:网络攻防与安全度量","count":4,"id":140},{"name":"专题:面向6G的智能至简网络关键技术","count":4,"id":141},{"name":"专题:面向泛在物联的普适感知与智能识别关键技术","count":4,"id":142},{"name":"学术通知","count":4,"id":143},{"name":"数字化校园及其应用","count":4,"id":144},{"name":"数据安全","count":4,"id":145},{"name":"无线与移动","count":4,"id":146},{"name":"资源管理","count":4,"id":147},{"name":"Application of cloud computing","count":3,"id":148},{"name":"Digitized Campus","count":3,"id":149},{"name":"Topics: Communication and Computing Fusion of Intelligent Emergency","count":3,"id":150},{"name":"Topics: Electromagnetic Space Signal Transmission Design and Intelligent Processing","count":3,"id":151},{"name":"Topics: Key Technologies of Intelligent Wireless Communication for 6G","count":3,"id":152},{"name":"专题:电磁空间信号传输设计与智能化处理","count":3,"id":153},{"name":"专题:面向智慧应急的通信与计算融合","count":3,"id":154},{"name":"云计算应用","count":3,"id":155},{"name":"数字化校园","count":3,"id":156},{"name":"无线移动技术及其应用","count":3,"id":157},{"name":"虚拟化和云计算","count":3,"id":158},{"name":"Concise Paper","count":2,"id":159},{"name":"Corresporndences","count":2,"id":160},{"name":"Invited Papers","count":2,"id":161},{"name":"Nerwork optimization","count":2,"id":162},{"name":"专题:面向6G的智能无线通信关键技术","count":2,"id":163},{"name":"信息安全专辑","count":2,"id":164},{"name":"特邀论文","count":2,"id":165},{"name":"网络优化","count":2,"id":166},{"name":"CSCW Summarize","count":1,"id":167},{"name":"CSCW综述","count":1,"id":168},{"name":"Comprehensire Review","count":1,"id":169},{"name":"Corresporndens","count":1,"id":170},{"name":"Distinguished and Excellent Young Scholar","count":1,"id":171},{"name":"Metropolitan Area Network and University City Network","count":1,"id":172},{"name":"城域网与大学城网络","count":1,"id":173},{"name":"学述通信","count":1,"id":174},{"name":"特约论文","count":1,"id":175},{"name":"综 述","count":1,"id":176}]