[{"name":"学术研究","count":53,"id":1},{"name":"Academic Research","count":44,"id":2},{"name":"综述","count":21,"id":3},{"name":"Review","count":15,"id":4},{"name":"技术应用","count":15,"id":5},{"name":"Technology Application","count":13,"id":6},{"name":"ACADEMIC RESEARCH","count":9,"id":7},{"name":"\"加密流量测量\"专题","count":7,"id":8},{"name":"\"智能身份认证\"专题","count":7,"id":9},{"name":"Editorial on special issue:Special topic on Intelligent authentication approach","count":7,"id":10},{"name":"SPECIAL TOPICS ON ENCRYPTET FLOW MEASUREMENT","count":7,"id":11},{"name":"REVIEW","count":6,"id":12},{"name":"\"隐私计算与数据安全\"专题","count":4,"id":13},{"name":"SPECIAL TOPICS ON PRIVACY COMPUTING AND DATA SECURITY","count":4,"id":14},{"name":"Special Contributions","count":3,"id":15},{"name":"特邀文章","count":3,"id":16},{"name":"Special Subject on White-Box Cryptography","count":2,"id":17},{"name":"TECHNOLOGY APPLICATION","count":2,"id":18},{"name":"白盒密码实现专题","count":2,"id":19}]