[{"name":"Guest Editorial","count":366,"id":1},{"name":"COMMUNICATIONS THEORIES & SYSTEMS","count":335,"id":2},{"name":"NETWORKS & SECURITY","count":219,"id":3},{"name":"EMERGING TECHNOLOGIES & APPLICATIONS","count":180,"id":4},{"name":"RESEARCH PAPER","count":103,"id":5},{"name":"论文集锦","count":87,"id":6},{"name":"NETWORK TECHNOLOGY AND APPLICATION","count":85,"id":7},{"name":"COMMUNICATIONS SYSTEM DESIGN","count":79,"id":8},{"name":"SIGNAL PROCESSING FOR COMMUNICATIONS","count":61,"id":9},{"name":"DIGITAL COMMUNICATIONS","count":52,"id":10},{"name":"SECURITY SCHEMES AND SOLUTIONS","count":48,"id":11},{"name":"COMMUNICATIONS SOFTWARE","count":45,"id":12},{"name":"SERVICES AND APPLICATIONS","count":37,"id":13},{"name":"CHANNEL CHARACTERIZATION AND MODELING","count":36,"id":14},{"name":"COMMUNICATION THEORIES & SYSTEMS","count":35,"id":15},{"name":"NETWORK TECHNOLOGY AND APPLICATIONS","count":35,"id":16},{"name":"COVER PAPER","count":34,"id":17},{"name":"REVIEW PAPER","count":32,"id":18},{"name":"SIGNAL PROCESSING","count":32,"id":19},{"name":"STRATEGIES AND SCHEMES","count":32,"id":20},{"name":"PHYSICAL AND FUNDAMENTALS","count":30,"id":21},{"name":"Research Paper","count":30,"id":22},{"name":"WIRELESS COMMUNICATIONS","count":29,"id":23},{"name":"INFORMATION SECURITY","count":26,"id":24},{"name":"TECHNOLOGY RESEARCH","count":25,"id":25},{"name":"学术天地","count":25,"id":26},{"name":"NETWORKS","count":23,"id":27},{"name":"客座编辑序言","count":23,"id":28},{"name":"INFORMATION THEORY AND CODING","count":22,"id":29},{"name":"THEORIES & SYSTEMS","count":22,"id":30},{"name":"COMMUNICATION NETWORKS","count":21,"id":31},{"name":"ICT MANAGEMENT","count":21,"id":32},{"name":"网络技术与应用","count":20,"id":33},{"name":"MAC AND NETWORKS","count":19,"id":34},{"name":"COMMUNICATIONS THEORIES&SYSTEMS","count":18,"id":35},{"name":"国际聚集","count":17,"id":36},{"name":"SHOW HIGHLIGHTS","count":16,"id":37},{"name":"FEATURE TOPIC:TERAHERTZ WIRELESS COMMUNICATIONS","count":15,"id":38},{"name":"HOT TOPIC","count":15,"id":39},{"name":"企业专访","count":15,"id":40},{"name":"热点论坛","count":15,"id":41},{"name":"焦点新闻","count":15,"id":42},{"name":"COMMUNICATIONS THEORIES","count":14,"id":43},{"name":"THEORIES&SYSTEMS","count":14,"id":44},{"name":"EXECUTIVE VIEW","count":13,"id":45},{"name":"Information Security","count":13,"id":46},{"name":"NATURAL LANGUAGE PROCESSING","count":13,"id":47},{"name":"NEWS SPOTLIGHT","count":13,"id":48},{"name":"OPERATIONS AND MANAGEMENT","count":13,"id":49},{"name":"展会报道","count":12,"id":50},{"name":"通信软件","count":12,"id":51},{"name":"FEATURE TOPIC:ARTIFICIAL INTELLIGENCE (AI)-DRIVEN SPECTRUM MANAGEMENT","count":11,"id":52},{"name":"INDUSTRY DYNAMICS","count":11,"id":53},{"name":"NETWORKS & TECHNOLOGIES","count":11,"id":54},{"name":"ORTHOGONAL TIME FREQUENCY SPACE MODULATION IN 6G ERA","count":11,"id":55},{"name":"WIRELESS SENSOR NETWORKS","count":11,"id":56},{"name":"企业专栏","count":11,"id":57},{"name":"通信系统设计","count":11,"id":58},{"name":"COMMUNICATIONS SYSTEMS AND THEORIES","count":10,"id":59},{"name":"CONCISE PAPER","count":10,"id":60},{"name":"EMERGING TECHNOLOGIES AND SERVICES","count":10,"id":61},{"name":"FUTURE DIGITAL COMMUNICATIONS","count":10,"id":62},{"name":"BROADBAND NETWORK","count":9,"id":63},{"name":"EMERGING TECHNOLOGIES&APPLICATIONS","count":9,"id":64},{"name":"FEATURE TOPIC","count":9,"id":65},{"name":"FEATURE TOPIC: 6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE","count":9,"id":66},{"name":"FEATURE TOPIC:EVOLUTIONARY TRENDS OF INTELLIGENT TOT NETWORKING FOR COMMERCIAL AND INDUSTRIAL USE CASES","count":9,"id":67},{"name":"MONOGRAPHIC STUDY","count":9,"id":68},{"name":"SECURITY OF CYBERSPACE","count":9,"id":69},{"name":"COMPUTER SYSTEM SECURITY","count":8,"id":70},{"name":"FEATURE TOPIC: FOG COMPUTING ENABLED\r\nINTERNET OF EVERYTHING","count":8,"id":71},{"name":"FEATURE TOPIC: WIDEBAND, INTELLIGENT AND INTEGRATED HF COMMUNICATIONS","count":8,"id":72},{"name":"FOCUS: E-Commerce and E-Finance","count":8,"id":73},{"name":"FOCUS: IN and New Service Development","count":8,"id":74},{"name":"FOCUS: MAN and Broadband Access Technology","count":8,"id":75},{"name":"MILLENNIUM HIGHLIGHTS","count":8,"id":76},{"name":"PRODUCT REPORT","count":8,"id":77},{"name":"PROTOCOLS AND ALGORITHMS","count":8,"id":78},{"name":"SELECTED PAPERS FROM IEEE/CIC ICCC2014","count":8,"id":79},{"name":"专题研究","count":8,"id":80},{"name":"数字通信技术","count":8,"id":81},{"name":"新世纪特稿","count":8,"id":82},{"name":"本期专题:城域网发展与宽带接入技术","count":8,"id":83},{"name":"本期专题:智能网与新业务发展","count":8,"id":84},{"name":"本期专题:电子商务与金融电子化","count":8,"id":85},{"name":"短文","count":8,"id":86},{"name":"COMMUNICATIONS AND NETWORKS","count":7,"id":87},{"name":"EDGE INTELLIGENCE FOR 6G NETWORKS","count":7,"id":88},{"name":"FEATURE TOPIC:CLOUD MOBILE MEDIA","count":7,"id":89},{"name":"FEATURE TOPIC:WIRELESS COMMUNICATIONS WITH RECONFIGURABLE INTELLIGENT SURFACES","count":7,"id":90},{"name":"FOCUS: Communications Private Network & Its Develo","count":7,"id":91},{"name":"FOCUS: New Generation Data Communications Network","count":7,"id":92},{"name":"FOCUS:Communications Power Supplies Technology","count":7,"id":93},{"name":"MOBILE INFORMATION SYSTEMS","count":7,"id":94},{"name":"NETWORK COMMUNICATIONS","count":7,"id":95},{"name":"REVIEW PAPERS","count":7,"id":96},{"name":"SELECTED PAPERS FROM IEEE/CIC ICCC 2018","count":7,"id":97},{"name":"产品讯息","count":7,"id":98},{"name":"本期专题:新一代数据通信网","count":7,"id":99},{"name":"本期专题:通信专网及其发展","count":7,"id":100},{"name":"本期专题:通信电源技术","count":7,"id":101},{"name":"策略与方案","count":7,"id":102},{"name":"6G NEW MULTIPLE ACCESS TECHNOLOGY","count":6,"id":103},{"name":"6G TOWARDS 2030: FROM KEY TECHNOLOGY TO NETWORK ARCHITECTURE","count":6,"id":104},{"name":"BIG DATA,CLOUD & MOBILE COMPUTING","count":6,"id":105},{"name":"CRYPTOGRAPHY","count":6,"id":106},{"name":"EMERGING TECHNOLOGIES & SERVICES","count":6,"id":107},{"name":"EMERGING TECHNOLOGLES & APPLICATIONS","count":6,"id":108},{"name":"FEATURE TOPIC: AI-EMPOWERED FUTURE COMMUNICATION NETWORKS","count":6,"id":109},{"name":"FEATURE TOPIC: MEASUREMENTS AND APPLICATIONS OF QOE FOR MULTIMEDIA COMMUNICATIONS","count":6,"id":110},{"name":"FEATURE TOPIC: SECURITY ISSUES IN EMERGING EDGE COMPUTING","count":6,"id":111},{"name":"FEATURE TOPIC:AMBIENT ASSISTED LIVING","count":6,"id":112},{"name":"FEATURE TOPIC:CLOUD COMPUTING BASED RADIO ACCESS N","count":6,"id":113},{"name":"FOCUS: Next Generation Network and Softswitch Tech","count":6,"id":114},{"name":"FOCUS:E-commerce","count":6,"id":115},{"name":"FULL-DUPLEX WIRELESS COMMUNICATIONS","count":6,"id":116},{"name":"ICT Management","count":6,"id":117},{"name":"NETWORK TECHNOLOGIES & APPLICATIONS","count":6,"id":118},{"name":"NETWORK-CONNECTED UAV COMMUNICATIONS","count":6,"id":119},{"name":"NEXT GENERATION WIRELESS NETWORKS","count":6,"id":120},{"name":"本期专题:NGN","count":6,"id":121},{"name":"本期专题:下一代网络及软交换技术","count":6,"id":122},{"name":"本期专题:电子商务","count":6,"id":123},{"name":"海外视点","count":6,"id":124},{"name":"行业动态","count":6,"id":125},{"name":"CHANNEL CHARACTERIZATION AND MODELLING","count":5,"id":126},{"name":"CLOUD SECURITY AND RISK PREVENTION","count":5,"id":127},{"name":"COMMUNICATIONS SYSTEMS&N ETWORKS","count":5,"id":128},{"name":"COMMUNICATlONS THEORIES & SYSTEMS","count":5,"id":129},{"name":"EMERGING APPLICATIONS & MANAGEMENT","count":5,"id":130},{"name":"FEATURE TOPIC: BLOCKCHAIN FOR INTERNET OF THINGS","count":5,"id":131},{"name":"FEATURE TOPIC: COMMUNICATION IC","count":5,"id":132},{"name":"FEATURE TOPIC: EDGE ARTIFICIAL INTELLIGENCE IN 6G SYSTEMS: THEORY, KEY TECHNIQUES, AND APPLICATIONS","count":5,"id":133},{"name":"FEATURE TOPIC: VEHICUIAR NETWORKING","count":5,"id":134},{"name":"FEATURE TOPIC:INFORMATION-CENTRIC NETWORKING","count":5,"id":135},{"name":"FEATURE TOPIC:NEW ERA SOFTWARE DEFINED NETWORK","count":5,"id":136},{"name":"FOCUS: New Generation IP Technology","count":5,"id":137},{"name":"FOCUS: Optical Communication Technology and All-op","count":5,"id":138},{"name":"FOCUS: WTO Entry and China Communications Reform","count":5,"id":139},{"name":"FOCUS:3G and Mobile Communications Development","count":5,"id":140},{"name":"FOCUS:China Informationization & Informationizatio","count":5,"id":141},{"name":"FOCUS:City Area Network and Access Network Technol","count":5,"id":142},{"name":"Feature Topic: Big Data","count":5,"id":143},{"name":"Guest Editoral","count":5,"id":144},{"name":"IEEE/CIC ICCC2013精选论文","count":5,"id":145},{"name":"INDUSTRY INFORMATION","count":5,"id":146},{"name":"INTEGRATION OF OPTICAL AND WIRELESS NETWORKS","count":5,"id":147},{"name":"INVITED PAPER","count":5,"id":148},{"name":"LETTER","count":5,"id":149},{"name":"NETWORKS & APPLICATIONS","count":5,"id":150},{"name":"NETWORKS&COMPUTING","count":5,"id":151},{"name":"NETWORKS&SECURITY","count":5,"id":152},{"name":"PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINST C","count":5,"id":153},{"name":"SECURITY","count":5,"id":154},{"name":"SECURITY & PRIVACY PROTECTION","count":5,"id":155},{"name":"SELECTED PAPERS FROM IEEE ICCC'12","count":5,"id":156},{"name":"SELECTED PAPERS FROM IEEE/CIC ICCC 2016","count":5,"id":157},{"name":"SELECTED PAPERS FROM IEEE/CIC ICCC2013","count":5,"id":158},{"name":"信息化论坛","count":5,"id":159},{"name":"展会报导","count":5,"id":160},{"name":"未来互联网专题:车联网","count":5,"id":161},{"name":"本期专题:光通技术与全光网络","count":5,"id":162},{"name":"本期专题:入世与中国通信改革","count":5,"id":163},{"name":"本期专题:国家信息化与信息化网络建设","count":5,"id":164},{"name":"本期专题:城域网与接入网技术","count":5,"id":165},{"name":"本期专题:新一代IP技术","count":5,"id":166},{"name":"本期专题:3G及移动通信发展","count":5,"id":167},{"name":"ARTIFICIAL INTELLIGENCE","count":4,"id":168},{"name":"CLOUD COMPUTING AND DATA MINING","count":4,"id":169},{"name":"EMERGING APPLICATIONS","count":4,"id":170},{"name":"FEATURE TOPIC SPACE INTERNET","count":4,"id":171},{"name":"FEATURE TOPIC: 6G MOBILE NETWORKS:EMERGING TECHNOLOGIES AND APPLICATIONS","count":4,"id":172},{"name":"FEATURE TOPIC: AI-EMPOWERED MILLIMETER WAVE COMMUNICATION AND NETWORKING","count":4,"id":173},{"name":"FEATURE TOPIC: CHAOS-BASED SECURE COMMUNICATIONS","count":4,"id":174},{"name":"FEATURE TOPIC: INTEGRATED TERRESTRIAL-SATELLITE NETWORKS","count":4,"id":175},{"name":"FEATURE TOPIC:CLOUD COMPUTING","count":4,"id":176},{"name":"FEATURE TOPIC:ENERGY CONSERVATION AND HARVESTING F","count":4,"id":177},{"name":"FEATURE TOPIC:MULTI-HOP RELAYING IN 5G:FROM RESEARCH TO SYSTEMS,STANDARDS,AND APPLICATIONS","count":4,"id":178},{"name":"FEATURE TOPIC:SELECTED PAPERS FROM CICC","count":4,"id":179},{"name":"FEATURE TOPIC:SIDE CHANNEL ATTACKS AND COUNTERMEAS","count":4,"id":180},{"name":"FEATURE TOPIC:TELECOMMUNICATIONS FOR REMOTE MEDICI","count":4,"id":181},{"name":"FOCUS:Global Telecom Capital Market","count":4,"id":182},{"name":"FOCUS:Optical Communications Revolution","count":4,"id":183},{"name":"FOCUS:Wireless Data Network","count":4,"id":184},{"name":"GREEN IT AND ENERGY EFFICIENT COMMUNICATIONS","count":4,"id":185},{"name":"NETWORK CODING AND ALGORITHM","count":4,"id":186},{"name":"OPTICAL COMMUNICATIONS","count":4,"id":187},{"name":"OPTICAL FIBER TECHNOLOGY","count":4,"id":188},{"name":"PROCESSING FOR COMMUNICATIONS","count":4,"id":189},{"name":"RFID专栏","count":4,"id":190},{"name":"SECURITY&MANAGEMENT","count":4,"id":191},{"name":"SENSOR NETWORKS TECHNOLOGY","count":4,"id":192},{"name":"UBIQUITOUS NETWORKING","count":4,"id":193},{"name":"信息理论与编码","count":4,"id":194},{"name":"信息通信技术管理","count":4,"id":195},{"name":"新闻报道","count":4,"id":196},{"name":"本期专题:3G网络及商用化","count":4,"id":197},{"name":"本期专题:光通信革命","count":4,"id":198},{"name":"本期专题:国际电信资本市场","count":4,"id":199},{"name":"本期专题:无线数据网","count":4,"id":200}]