Follow
Touhid Bhuiyan
Touhid Bhuiyan
Professor of Cyber Security, Washington University of Science and Technology
Verified email at wust.edu
Title
Cited by
Cited by
Year
Optimal Trust Network Analysis with Subjective Logic
A Jøsang, T Bhuiyan
The Second International Conference on Emerging Security Information …, 2008
1772008
Hybrid photonic crystal fiber in chemical sensing
S Asaduzzaman, K Ahmed, T Bhuiyan, T Farah
SpringerPlus 5, 1-11, 2016
1472016
Impact of photo electrode thickness and annealing temperature on natural dye sensitized solar cell
TA Ruhane, MT Islam, MS Rahaman, MMH Bhuiyan, JMM Islam, ...
Sustainable energy technologies and assessments 20, 72-77, 2017
772017
Design of single mode spiral photonic crystal fiber for gas sensing applications
MI Islam, K Ahmed, S Asaduzzaman, BK Paul, T Bhuiyan, S Sen, ...
Sensing and Bio-Sensing Research 13, 55-62, 2017
592017
State-of-the-art review on opinion mining from online customers’ feedback
T Bhuiyan, Y Xu, A Josang
Proceedings of the 9th Asia-Pacific Complex Systems Conference, 385-390, 2009
502009
Combining Trust and Reputation Management for Web-Based Services
Audun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox
Trust, Privacy and Security in Digital Business 5185, pp 90-99, 2008
47*2008
An image steganography algorithm using LSB replacement through XOR substitution
T Bhuiyan, AH Sarower, R Karim, M Hassan
2019 International Conference on Information and Communications Technology …, 2019
382019
A survey on the relationship between trust and interest similarity in online social networks
T Bhuiyan
Journal of emerging technologies in web intelligence 2 (4), 291-299, 2010
362010
Integrating trust with public reputation in location-based social networks for recommendation making
T Bhuiyan, Y Xu, A Jøsang
2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008
352008
Asynchronous leader election in mobile ad hoc networks
SM Masum, AA Ali, T Bhuiyan
20th International Conference on Advanced Information Networking and …, 2006
332006
Association assessment among risk factors and breast cancer in a low income country: Bangladesh
K Ahmed, S Asaduzzaman, MI Bashar, G Hossain, T Bhuiyan
Asian Pacific Journal of Cancer Prevention 16 (17), 7507-7512, 2015
322015
A study on remote code execution vulnerability in web applications
S Biswas, M Sohel, MM Sajal, T Afrin, T Bhuiyan, MM Hassan
International conference on cyber security and computer science (ICONCS 2018 …, 2018
312018
Predicting absenteeism at work using tree-based learners
Z Wahid, AKMZ Satter, A Al Imran, T Bhuiyan
Proceedings of the 3rd international conference on machine learning and soft …, 2019
302019
Trust and reputation management in web-based social network
T Bhuiyan, A Josang, Y Xu
Web Intelligence and Intelligent Agents, 207-232, 2010
272010
Effects of cognitive ability, trust and time-saving: predicting further amelioration and successive usage of E-ticketing with TAM, TPB and cognitive frameworks
R Hossain, SM Hasan Mahmud, MA Hossin, T Bhuiyan, YX Hua
Information and Communication Technology for Competitive Strategies …, 2019
242019
RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh
A Begum, MM Hassan, T Bhuiyan, MH Sharif
2016 International Workshop on Computational Intelligence (IWCI), 21-25, 2016
242016
Developing Trust Networks Based on User Tagging Information for Recommendation Making
B Touhid, X Yue, J Audun, L Huizhi, C Clive
Web Information Systems Engineering 6488, pp 357-364, 2010
23*2010
Investigation of highly birefringent and highly nonlinear Hexa Sectored PCF with low confinement loss
MT Anas, S Asaduzzaman, K Ahmed, T Bhuiyan
Results in Physics 11, 1039-1043, 2018
222018
Trust for intelligent recommendation
T Bhuiyan
Springer, 2013
212013
Machine learning to reveal an astute risk predictive framework for Gynecologic Cancer and its impact on women psychology: Bangladeshi perspective
S Asaduzzaman, MR Ahmed, H Rehana, S Chakraborty, MS Islam, ...
BMC bioinformatics 22 (1), 213, 2021
202021
The system can't perform the operation now. Try again later.
Articles 1–20