# | Document title | Authors | Year | Source | Cited by |
1 | Performance comparison of machine learning models for DDoS attacks detection | Khuphiran P., Leelaprute P., Uthayopas P., Ichikawa K., Watanakeesuntorn W. | 2018 | 2018 22nd International Computer Science and Engineering Conference, ICSEC 2018, 8712757 | 34 |
2 | A topological analysis of communication channels for knowledge sharing in contemporary GitHub projects | Tantisuwankul J., Nugroho Y., Kula R., Hata H., Rungsawang A., Leelaprute P., Matsumoto K. | 2019 | Journal of Systems and Software, 158, 110416 | 27 |
3 | The effects of vectorization methods on non-functional requirements classification | Amasaki S., Leelaprute P. | 2018 | Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018, pp. 175-182, 8498203 | 22 |
4 | Describing and verifying integrated services of home network systems | Leelaprute P., Nakamura M., Tsuchiya T., Matsumoto K.I., Kikuno T. | 2005 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC, 2005, pp. 549-558, 1607194 | 17 |
5 | Extracting Insights from the Topology of the JavaScript Package Ecosystem | Lertwittayatrai N., Kula R.G., Onoue S., Hata H., Rungsawang A., Leelaprute P., Matsumoto K. | 2018 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC, 2017-December, pp. 298-307 | 15 |
6 | Detecting feature interactions in home appliance networks | Leelaprute P., Matsuo T., Tsuchiya T., Kikuno T. | 2008 | Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications, pp. 895-903, 4617483 | 12 |
7 | On detecting feature interactions in the programmable service environment of Internet telephony | Nakamura M., Leelaprute P., Matsumoto K., Kikuno T. | 2004 | Computer Networks, 45(5), pp. 605-624 | 11 |
8 | An Empirical Evaluation of Competitive Programming AI: A Case Study of AlphaCode | Lertbanjongngam S., Chinthanet B., Ishio T., Kula R.G., Leelaprute P., Manaskasemsak B., Rungsawang A., Matsumoto K. | 2022 | Proceedings - 2022 IEEE 16th International Workshop on Software Clones, IWSC 2022, pp. 10-15 | 11 |
9 | A comparative study on vectorization methods for non-functional requirements classification | Leelaprute P., Amasaki S. | 2022 | Information and Software Technology, 150, 106991 | 9 |
10 | An algorithm for automatic collation of vocabulary decks based on word frequency | Yücel Z., Supitayakul P., Monden A., Leelaprute P. | 2020 | IEICE Transactions on Information and Systems, E103D(8), pp. 1865-1874 | 7 |
11 | Resolution of feature interactions in integrated services of home network system | Leelaprute P. | 2007 | 2007 Asia-Pacific Conference on Communications, APCC, pp. 363-366, 4433447 | 7 |
12 | A review and comparison of methods for determining the best analogies in analogy-based software effort estimation | Chinthanet B., Leelaprute P., Rungsawang A., Phannachitta P., Ubayashi N., Kamei Y., Matsumoto K. | 2016 | Proceedings of the ACM Symposium on Applied Computing, 04-08-April-2016, pp. 1554-1557 | 7 |
13 | Sparse Communication for Federated Learning | Thonglek K., Takahashi K., Ichikawa K., Nakasan C., Leelaprute P., Iida H. | 2022 | Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022, pp. 1-8 | 6 |
14 | Does Coding in Pythonic Zen Peak Performance? Preliminary Experiments of Nine Pythonic Idioms at Scale | Leelaprute P., Chinthanet B., Wattanakriengkrai S., Kula R.G., Jaisri P., Ishio T. | 2022 | IEEE International Conference on Program Comprehension, 2022-March, pp. 575-579 | 6 |
15 | Semantic warnings and feature interaction in Call Processing Language on Internet telephony | Nakamura M., Leelaprute P., Matsumoto K., Kikuno T. | 2003 | Proceedings - 2003 Symposium on Applications and the Internet, SAINT 2003, pp. 283-290, 1183061 | 5 |
16 | Hajime Worm with Lifespan and Its Mitigation Evaluation Against Mirai Malware Based on Agent-Oriented Petri Net PN2 | Yamaguchi S., Leelaprute P. | 2019 | 2019 IEEE International Conference on Consumer Electronics, ICCE 2019, 8662079 | 5 |
17 | Industry Application of Software Development Task Measurement System: TaskPit | Suthipornopas P., Leelaprute P., Monden A., Uwano H., Kamei Y., Ubayashi N., Araki K., Yamada K., Matsumoto K. | 2017 | IEICE Transactions on Information and Systems, E100D(3), pp. 462-472 | 4 |
18 | Tour Miner: Mining system of tour plans from SNS:-Smelting function from travel records to tour routes- | Yamaguchi S., Terada T., Manaskasemsak B., Rungsawang A., Leelaprute P. | 2017 | 2017 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2017, pp. 239-240, 7991084 | 3 |
19 | Automated Quantization and Retraining for Neural Network Models without Labeled Data | Thonglek K., Takahashi K., Ichikawa K., Nakasan C., Nakada H., Takano R., Leelaprute P., Iida H. | 2022 | IEEE Access | 3 |
20 | Task estimation for software company employees based on computer interaction logs | Pellegrin F., Pellegrin F., Yücel Z., Monden A., Leelaprute P. | 2021 | Empirical Software Engineering, 26(5), 98 | 3 |
21 | Parkinson’s Disease Classification from Scanned Images of Spiral Drawings | Wachiracharownong A., Wachiracharownong A., Sri-Iesaranusorn P., Surangsrirat D., Leelaprute P., Panyakaew P., Bhidayasiri R. | 2024 | Proceedings - 2024 IEEE 1st International Conference on Artificial Intelligence for Medicine, Health and Care, AIMHC 2024, pp. 185-186 | 3 |
22 | Investigating effect of stimulus modality on recollection rate in e-learning systems | Supitayakul P., Yucel Z., Monden A., Leelaprute P. | 2020 | Proceedings - 2020 9th International Congress on Advanced Applied Informatics, IIAI-AAI 2020, pp. 138-141, 9430313 | 2 |
23 | Tour Miner: Mining System of Tour Plans from SNS: Extraction of Travel Records from Check-in Information | Leelaprute P., Yamaguchi S. | 2019 | 2019 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2019, pp. 174-175, 8942200 | 2 |
24 | Threat Analysis of Fake Virus Alerts Using WebView Monitor | Imamura Y., Orito R., Chaikaew K., Chaikaew K., Manardo C., Manardo C., Leelaprute P., Sato M., Yamauchi T. | 2019 | Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019, pp. 28-36, 8958361 | 2 |
25 | The Convergence of Container and Traditional Virtualization: Strengths and Limitations | Li G., Takahashi K., Ichikawa K., Iida H., Nakasan C., Leelaprute P., Thiengburanathum P., Phannachitta P. | 2023 | SN Computer Science, 4(4), 387 | 2 |
26 | A Pilot Study of Testing Infrastructure as Code for Cloud Systems | Suwanachote N., Pornmaneerattanatri S., Kashiwa Y., Ichikawa K., Leelaprute P., Rungsawang A., Manaskasemsak B., Iida H. | 2023 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC, pp. 584-588 | 1 |
27 | Assessing the Effect of Varying Word Classes on Behavioral Variables in Technology Mediated Vocabulary Learning | Supitayakul P., Yucel Z., Monden A., Leelaprute P. | 2019 | Proceedings - 2019 8th International Congress on Advanced Applied Informatics, IIAI-AAI 2019, pp. 226-229, 8992730 | 1 |
28 | Practical application of tour plan mining system tour miner - Web application and case study - Web a | Leelaprute P., Sothanakul P., Yamaguchi S. | 2020 | Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2020-January, 9043122 | 1 |
29 | Web access monitoring mechanism via Android WebView for threat analysis | Imamura Y., Orito R., Uekawa H., Uekawa H., Chaikaew K., Chaikaew K., Leelaprute P., Sato M., Yamauchi T. | 2021 | International Journal of Information Security | 1 |
30 | Effect of grasping uniformity on estimation of grasping region from gaze data | Witchawanitchanun P., Yucel Z., Monden A., Leelaprute P. | 2019 | HAI 2019 - Proceedings of the 7th International Conference on Human-Agent Interaction, pp. 265-267 | 1 |
31 | Evaluating semantic warnings in VoIP programmable services with open source environment | Leelaprute P., Nakamura M., Matsumoto K.I., Kikuno T. | 2003 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC, 2003-January, pp. 552-561, 1254410 | 1 |
32 | Deriving interaction-prone scenarios in feature interaction filtering with use case maps | Nakamura M., Leelaprute P., Kikuno T. | 2002 | Proceedings - International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS, 2002-January, pp. 237-244, 1000058 | 1 |
33 | Fault-prone byte-code detection using text classifier | Fujiwara T., Mizuno O., Leelaprute P. | 2015 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9459, pp. 415-430 | 0 |
34 | Lessons learned from collaborative research in software engineering: A student's perspective | Jongyindee A., Leelaprute P., Ohira M., Matsumoto K. | 2012 | Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 494-497, 6299327 | 0 |
35 | Definition and detection of semantic warnings for voiceXML | Leelaprute P., Kikuno T., Nakamura M., Matsumoto K.I. | 2005 | Proceedings of the IASTED International Conference on Software Engineering: part of the 23rd IASTED International Multi-Conference on Applied Informatics, SE 2005, pp. 267-275 | 0 |
36 | Tool support for consistency verification of UML diagrams | Phuklang S., Yokogawa T., Leelaprute P., Arimoto K. | 2017 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10611 LNCS, pp. 606-609 | 0 |
37 | Extraction of library update history using source code reuse detection | Jewmaidang K., Ishio T., Ihara A., Matsumoto K., Leelaprute P. | 2018 | IEICE Transactions on Information and Systems, E101D(3), pp. 799-802 | 0 |
38 | Experiment Design and Verification for Assessing the Acquisition of Strategic Planning Ability | Manatphaiboon N., Hamachi S., Yucel Z., Leelaprute P., Monden A. | 2023 | Proceedings - 2023 15th International Congress on Advanced Applied Informatics Winter, IIAI-AAI-Winter 2023, pp. 121-128 | 0 |
39 | Do Developers Present Proficient Code Snippets in Their README Files? An Analysis of PyPI Libraries in GitHub | Sitthithanasakul S., Chinthanet B., Kula R.G., Netsiwawichian N., Leelaprute P., Manaskasemsak B., Rungsawang A., Matsumoto K. | 2023 | Journal of Information Processing, 31, pp. 679-688 | 0 |
40 | Portable Containerized MPI Application Using UCX Replacement Method | Manatura S., Ichikawa K., Chantrapornchai C., Nakasan C., Leelaprute P., Rungsawang A., Manaskasemsak B. | 2024 | Lecture Notes on Data Engineering and Communications Technologies, 189, pp. 222-234 | 0 |
41 | A Multi - Aspect Evaluation of DL-based SQLi Attack Detection Models | Leelaprute P., Kase Y., Amasaki S., Aman H., Yokogawa T. | 2024 | 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Proceedings, pp. 352-355 | 0 |
42 | An Evaluation of Network Performance through the Integration of SRv6 and MPTCP | Laohakanniyom P., Ichikawa K., Iida H., Leelaprute P., Manaskasemsak B., Rungsawang A. | 2024 | COMNETSAT 2024 - IEEE International Conference on Communication, Networks and Satellite, pp. 203-210 | 0 |
43 | Exploring Benefits of Bellwether Projects in Cross-Project IR-based Fault Localization | Amasaki S., Leelaprute P., Aman H., Yokogawa T. | 2024 | Proceedings of the Euromicro Conference on Software Engineering and Advanced Applications, EUROMICRO-SEAA, (2024), pp. 214-221 | 0 |