[{"name":"Artificial Intelligence","count":173,"id":1},{"name":"Letter","count":125,"id":2},{"name":"Information Security","count":78,"id":3},{"name":"Information Systems","count":67,"id":4},{"name":"Software","count":67,"id":5},{"name":"Architecture","count":35,"id":6},{"name":"Theoretical Computer Science","count":30,"id":7},{"name":"Networks and Communication","count":28,"id":8},{"name":"Excellent Young Scholars Forum","count":25,"id":9},{"name":"NSFC Excellent Young Scholars Forum","count":24,"id":10},{"name":"Multimedia and Graphics","count":22,"id":11},{"name":"Interdisciplinary","count":19,"id":12},{"name":"Image and Graphics","count":16,"id":13},{"name":"Complex Networks and Computing Editorial","count":15,"id":14},{"name":"RESEARCH ARTICLE","count":13,"id":15},{"name":"Feature Article","count":12,"id":16},{"name":"Foreword","count":11,"id":17},{"name":"Letters","count":11,"id":18},{"name":"RESEARCH ATICLE","count":11,"id":19},{"name":"Artficial Intelligence","count":9,"id":20},{"name":"Surveys","count":9,"id":21},{"name":"Perspective","count":8,"id":22},{"name":"RESEARCH ARTICLE","count":8,"id":23},{"name":"letter","count":8,"id":24},{"name":"Cloud computing:systems,benchmarks,and managements","count":6,"id":25},{"name":"Formal Engineering Methods for Software Quality Assurance","count":5,"id":26},{"name":"Network and Communication","count":5,"id":27},{"name":"New Topics in Database Research","count":5,"id":28},{"name":"Social Computing and Computational Social Sciences","count":5,"id":29},{"name":"Special Section on Deep Learning Applications in Computer Vision","count":5,"id":30},{"name":"Artificial Intelligent","count":4,"id":31},{"name":"Knowledge based Information Processing","count":4,"id":32},{"name":"Machine Learning and Pattern Recogntion","count":4,"id":33},{"name":"Optimization Strategy","count":4,"id":34},{"name":"Perspectives","count":4,"id":35},{"name":"Resource Planning and Allocation","count":4,"id":36},{"name":"Smart Cities and Urban Computing","count":4,"id":37},{"name":"Special Section on Blockchain and Smart Contract","count":4,"id":38},{"name":"Special Section on Smart Cities and Urban Computing","count":4,"id":39},{"name":"Special Section on Software-defined Storage for Big Data","count":4,"id":40},{"name":"Vision and Image Processing","count":4,"id":41},{"name":"parallel Architectures,Algorithms and Programming","count":4,"id":42},{"name":"Multimedia and HCI","count":3,"id":43},{"name":"Special Section on Advances of Orange Technologies","count":3,"id":44},{"name":"Special Section on Semantic-focused Modelling of Embedded Architectures","count":3,"id":45},{"name":"Tnformation Security","count":3,"id":46},{"name":"Web Information Management in Big Data Era","count":3,"id":47},{"name":"Bioinformatics","count":2,"id":48},{"name":"Computational Intelligence","count":2,"id":49},{"name":"Computer Architecture","count":2,"id":50},{"name":"Cryptography and Information Security","count":2,"id":51},{"name":"Database and Query Processing","count":2,"id":52},{"name":"Formal Methods","count":2,"id":53},{"name":"Formal Semantics of Programming Languages","count":2,"id":54},{"name":"Intelligent Robotics","count":2,"id":55},{"name":"Knowledge Representation","count":2,"id":56},{"name":"Machine Learning and Data Mining","count":2,"id":57},{"name":"Pattern Recognition","count":2,"id":58},{"name":"Signal Acquisition and Processing","count":2,"id":59},{"name":"Software Engineering","count":2,"id":60},{"name":"software","count":2,"id":61},{"name":"Anouncement","count":1,"id":62},{"name":"Architeture","count":1,"id":63},{"name":"Communication","count":1,"id":64},{"name":"Correspondence","count":1,"id":65},{"name":"Editorial","count":1,"id":66},{"name":"Survey","count":1,"id":67},{"name":"Theory of Computation","count":1,"id":68},{"name":"Tutorials","count":1,"id":69}]