


default search action
Touhid Bhuiyan
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Marzia Ahmed
, Mohd Herwan Sulaiman
, Md. Maruf Hassan, Touhid Bhuiyan
:
Predicting the Classification of Heart Failure Patients Using Optimized Machine Learning Algorithms. IEEE Access 13: 30555-30569 (2025) - 2024
- [j8]Arif Mahmud
, Afjal Hossan Sarower, Amir Sohel, Md Assaduzzaman, Touhid Bhuiyan:
Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach. Array 21: 100339 (2024) - [j7]Maruf Ahmed Tamal, Md. Kabirul Islam, Touhid Bhuiyan, Abdus Sattar
:
Dataset of suspicious phishing URL detection. Frontiers Comput. Sci. 6 (2024) - [j6]Rubaiya Tasnim Sholi, Md Fouad Hossain Sarker
, Md. Salman Sohel, Md. Kabirul Islam, Maruf Ahmed Tamal, Touhid Bhuiyan, S. M. Khasrul Alam Shakil, Md Foysal Ahmed:
Application of Computer Vision and Mobile Systems in Education: A Systematic Review. Int. J. Interact. Mob. Technol. 18(1): 168-187 (2024) - 2023
- [j5]Supriya Sarker
, Mohammad Shamsul Arefin
, Md. Kowsher
, Touhid Bhuiyan, Pranab Kumar Dhar
, Oh-Jin Kwon
:
A Comprehensive Review on Big Data for Industries: Challenges and Opportunities. IEEE Access 11: 744-769 (2023) - [j4]Showmick Guha Paul
, Arpa Saha
, Mohammad Shamsul Arefin
, Touhid Bhuiyan, Al Amin Biswas
, Ahmed Wasif Reza
, Naif Mohammed Alotaibi, Salem A. Alyami
, Mohammad Ali Moni
:
A Comprehensive Review of Green Computing: Past, Present, and Future Research. IEEE Access 11: 87445-87494 (2023) - 2021
- [j3]Sayed Asaduzzaman
, Md. Raihan Ahmed
, Hasin Rehana
, Setu Chakraborty, Md. Shariful Islam, Touhid Bhuiyan:
Machine learning to reveal an astute risk predictive framework for Gynecologic Cancer and its impact on women psychology: Bangladeshi perspective. BMC Bioinform. 22(1): 213 (2021) - [c24]Abdullah Al Mamun Sardar, Shahalu Akter Salma, Md. Sanzidul Islam, Md. Arid Hasan, Touhid Bhuiyan:
Team Sigmoid at CheckThat!2021 Task 3a: Multiclass fake news detection with Machine Learning. CLEF (Working Notes) 2021: 612-618 - 2020
- [j2]Md. Kawsar
, Tasnimul Alam Taz
, Bikash Kumar Paul, Kawsar Ahmed
, Md. Ahsan Habib, Touhid Bhuiyan:
Identification of vital regulatory genes with network pathways among Huntington's, Parkinson's, and Alzheimer's diseases. Netw. Model. Anal. Health Informatics Bioinform. 9(1): 50 (2020) - [c23]Syeda Sumbul Hossain
, Yeasir Arafat, Tanvir Amin, Touhid Bhuiyan:
Requirements Re-usability in Global Software Development: A Systematic Mapping Study. ICCSA (4) 2020: 960-974
2010 – 2019
- 2019
- [c22]Lamisha Rawshan, Tasnim Rahman, Afsana Begum
, Syeda Sumbul Hossain
, Touhid Bhuiyan:
A Comparative Study on GA-based Scheduling on Cloud Computing. CIIS 2019: 74-78 - [c21]Syeda Sumbul Hossain
, S. A. M. Jubayer, Shadikur Rahman
, Touhid Bhuiyan, Lamisha Rawshan, Saiful Islam
:
Customer Feedback Prioritization Technique: A Case Study on Lean Startup. ICCSA (5) 2019: 70-81 - [c20]Zaman Wahid
, A. K. M. Zaidi Satter, Abdullah Al Imran
, Touhid Bhuiyan:
Predicting Absenteeism at Work Using Tree-Based Learners. ICMLSC 2019: 7-11 - [i2]Kaushik Sarker
, Hasibur Rahman, Khandaker Farzana Rahman, Md. Shohel Arman, Saikat Biswas, Touhid Bhuiyan:
A Comparative Analysis of the Cyber Security Strategy of Bangladesh. CoRR abs/1905.00299 (2019) - 2018
- [c19]Md. Shohel Rana
, Touhid Bhuiyan, A. K. M. Zaidi Satter:
e-School: Design and Implementation of Web Based Teaching Institution for Enhancing E-Learning Experiences. ICCCI (1) 2018: 99-108 - 2017
- [j1]M. S. Rana
, Maruf Hassan
, Touhid Bhuiyan:
An Enhanced Model for Inpainting on Digital Images Using Dynamic Masking. J. Commun. 12(4): 248-253 (2017) - [c18]Touhid Bhuiyan, Md. Shohel Rana
, Kaushik Sarker
, Zaman Wahid
:
A Proposed PST Model for Enhancing E-Learning Experiences. ICDTE 2017: 44-48 - 2016
- [c17]Afsana Begum
, Md. Maruf Hassan
, Touhid Bhuiyan, Md. Hasan Sharif:
RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh. IWCI 2016: 21-25 - 2015
- [c16]Delwar Alam, Md. Alamgir Kabir
, Touhid Bhuiyan
, Tanjila Farah:
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. CyberSec 2015: 73-77 - [c15]Delwar Alam, Touhid Bhuiyan
, Md. Alamgir Kabir
, Tanjila Farah:
SQLi vulnerabilty in education sector websites of Bangladesh. InfoSec 2015: 152-157 - [c14]Tanjila Farah, Delwar Alam, Md. Alamgir Kabir
, Touhid Bhuiyan
:
SQLi penetration testing of financial Web applications: Investigation of Bangladesh region. WorldCIS 2015: 146-151 - 2014
- [c13]Mohammad Abdur Razzak, Touhid Bhuiyan
, Rajib Ahmed:
Knowledge Management in Distributed Agile Software Development Projects. AI4KM@FedCSIS 2014: 107-131 - 2013
- [b1]Touhid Bhuiyan:
Trust for Intelligent Recommendation. Springer Briefs in Electrical and Computer Engineering, Springer 2013, ISBN 978-1-4614-6894-3, pp. i-xiv, 1-119 - [c12]K. M. Imtiaz-Ud-Din, Touhid Bhuiyan
, Shamim Ripon
:
Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET. ICACNI 2013: 163-172 - [i1]Shamim Ripon, Sk. Jahir Hossain, Touhid Bhuiyan:
Managing and Analysing Software Product Line Requirements. CoRR abs/1310.0152 (2013) - 2010
- [c11]Touhid Bhuiyan
, Yue Xu
, Audun Jøsang
:
SimTrust: A New Method of Trust Network Generation. EUC 2010: 718-722 - [c10]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
A Review of Trust in Online Social Networks to Explore New Research Agenda. International Conference on Internet Computing 2010: 123-128 - [c9]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
The Potential Relationship Between Trust and Interest Similarity. International Conference on Internet Computing 2010: 203-208 - [c8]Touhid Bhuiyan:
A Model of a Feed Forward Multi Layered Neural Network to Recognize Hand Written Bengali Digits. IC-AI 2010: 331-338 - [c7]Touhid Bhuiyan:
Impact of Knowledge Sharing in Supply Chain Networks. IKE 2010: 98-103 - [c6]Touhid Bhuiyan, Ataur Rahman, Scott Abbey:
Derivation of Design Rainfall Temporal Patterns in Australia's Gold Coast Region. IKE 2010: 113-119 - [c5]Touhid Bhuiyan
, Yue Xu
, Audun Jøsang
, Huizhi Liang
, Clive Cox:
Developing Trust Networks Based on User Tagging Information for Recommendation Making. WISE 2010: 357-364 - [p1]Touhid Bhuiyan, Audun Jøsang, Yue Xu:
Managing Trust in Online Social Networks. Handbook of Social Network Technologies 2010: 471-496
2000 – 2009
- 2008
- [c4]Touhid Bhuiyan
, Yue Xu
, Audun Jøsang
:
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making. Web Intelligence/IAT Workshops 2008: 107-110 - [c3]Audun Jøsang
, Touhid Bhuiyan
:
Optimal Trust Network Analysis with Subjective Logic. SECURWARE 2008: 179-184 - [c2]Audun Jøsang
, Touhid Bhuiyan
, Yue Xu
, Clive Cox:
Combining Trust and Reputation Management for Web-Based Services. TrustBus 2008: 90-99 - 2006
- [c1]Salahuddin Mohammad Masum, Amin Ahsan Ali, Mohammad Touhid-youl Islam Bhuiyan
:
Asynchronous Leader Election in Mobile Ad Hoc Networks. AINA (2) 2006: 827-831
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 01:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint