[{"name":"Computer Science","count":242,"id":1},{"name":"Mathematics","count":216,"id":2},{"name":"Security of Network and Communication","count":41,"id":3},{"name":"Cryptography","count":34,"id":4},{"name":"Information Technology","count":34,"id":5},{"name":"Engineering Science","count":28,"id":6},{"name":"Physics","count":27,"id":7},{"name":"Mountain Hazards","count":24,"id":8},{"name":"Applications of Information Security","count":23,"id":9},{"name":"Mountain Environment","count":21,"id":10},{"name":"Chemistry","count":20,"id":11},{"name":"Biomedicine","count":19,"id":12},{"name":"Complex Science Management","count":19,"id":13},{"name":"Biology","count":16,"id":14},{"name":"Cryptology","count":16,"id":15},{"name":"Material Science","count":13,"id":16},{"name":"Security of Information System","count":12,"id":17},{"name":"Trusted Software","count":11,"id":18},{"name":"Web Information Mining and Retrieval","count":11,"id":19},{"name":"Chemistry and Biology","count":10,"id":20},{"name":"Environmental Science","count":10,"id":21},{"name":"From Automation to Intelligence:New Theory and New Method of Industrial Digital Transformation","count":10,"id":22},{"name":"Physics and Chemistry","count":10,"id":23},{"name":"Web Information Security","count":10,"id":24},{"name":"Electronic and Electrical Engineering","count":9,"id":25},{"name":"Web Mining and Data Warehouse","count":9,"id":26},{"name":"Deep Web and Web Integration","count":8,"id":27},{"name":"Engineering Technology","count":8,"id":28},{"name":"Grid and Networking Technology","count":8,"id":29},{"name":"Infrastructure and Security Issues","count":8,"id":30},{"name":"Mountain Environment and Development","count":8,"id":31},{"name":"Security of Network and Trust Computation","count":8,"id":32},{"name":"Semantic Web and Intelligent Web","count":8,"id":33},{"name":"Web Services and Worklow Models","count":8,"id":34},{"name":"Information Hiding","count":7,"id":35},{"name":"Mountain Hazards Risk Assessment and Mitigation","count":7,"id":36},{"name":"Web Application Framework and Architecture","count":7,"id":37},{"name":"Web Data Managemant and Information Integration","count":7,"id":38},{"name":"Text Processing and Decision Support","count":6,"id":39},{"name":"Text Processing and Information Retrieval","count":6,"id":40},{"name":"Trusted Architecture","count":6,"id":41},{"name":"Web Services and Peer-to-Peer Computing","count":6,"id":42},{"name":"Chemistry and Physics","count":5,"id":43},{"name":"Physics and Information","count":5,"id":44},{"name":"Trusted Computing and Security of Information System","count":5,"id":45},{"name":"Water loss and Soil Erosion and Water and Soil Conservation","count":5,"id":46},{"name":"Physics and Biology","count":4,"id":47},{"name":"Physics and Electronic Information Technology","count":4,"id":48},{"name":"Security of Network","count":4,"id":49},{"name":"Trusted Hardware","count":4,"id":50},{"name":"Biology and Enviromental Science","count":3,"id":51},{"name":"Enviromental Science","count":3,"id":52},{"name":"Materials Science","count":3,"id":53},{"name":"Security of Content and Network","count":3,"id":54},{"name":"Biology and Pharmacy","count":2,"id":55},{"name":"Electronic Information","count":2,"id":56},{"name":"Introduction","count":2,"id":57},{"name":"Letter","count":2,"id":58},{"name":"Algorithm","count":1,"id":59},{"name":"Chemisrty","count":1,"id":60},{"name":"Engineering","count":1,"id":61},{"name":"Pharmacology","count":1,"id":62},{"name":"Resources and Environmental Science","count":1,"id":63},{"name":"Review","count":1,"id":64}]