# | Document title | Authors | Year | Source | Cited by |
1 | Performance comparison of machine learning models for DDoS attacks detection | Khuphiran P., Leelaprute P., Uthayopas P., Ichikawa K., Watanakeesuntorn W. | 2018 | 2018 22nd International Computer Science and Engineering Conference, ICSEC 2018
| 33 |
2 | A topological analysis of communication channels for knowledge sharing in contemporary GitHub projects | Tantisuwankul J., Nugroho Y., Kula R., Hata H., Rungsawang A., Leelaprute P., Matsumoto K. | 2019 | Journal of Systems and Software 158 | 26 |
3 | The effects of vectorization methods on non-functional requirements classification | Amasaki S., Leelaprute P. | 2018 | Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018 ,pp. 175-182 | 21 |
4 | Describing and verifying integrated services of home network systems | Leelaprute P., Nakamura M., Tsuchiya T., Matsumoto K.I., Kikuno T. | 2005 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2005,pp. 549-558 | 17 |
5 | Extracting Insights from the Topology of the JavaScript Package Ecosystem | Lertwittayatrai N., Kula R.G., Onoue S., Hata H., Rungsawang A., Leelaprute P., Matsumoto K. | 2018 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2017-December,pp. 298-307 | 14 |
6 | Detecting feature interactions in home appliance networks | Leelaprute P., Matsuo T., Tsuchiya T., Kikuno T. | 2008 | Proc. 9th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008 and 2nd Int. Workshop on Advanced Internet Technology and Applications ,pp. 895-903 | 12 |
7 | On detecting feature interactions in the programmable service environment of Internet telephony | Nakamura M., Leelaprute P., Matsumoto K., Kikuno T. | 2004 | Computer Networks 45(5),pp. 605-624 | 11 |
8 | An Empirical Evaluation of Competitive Programming AI: A Case Study of AlphaCode | Lertbanjongngam S., Chinthanet B., Ishio T., Kula R.G., Leelaprute P., Manaskasemsak B., Rungsawang A., Matsumoto K. | 2022 | Proceedings - 2022 IEEE 16th International Workshop on Software Clones, IWSC 2022 ,pp. 10-15 | 11 |
9 | A comparative study on vectorization methods for non-functional requirements classification | Leelaprute P., Amasaki S. | 2022 | Information and Software Technology 150 | 9 |
10 | An algorithm for automatic collation of vocabulary decks based on word frequency | Yücel Z., Supitayakul P., Monden A., Leelaprute P. | 2020 | IEICE Transactions on Information and Systems E103D(8),pp. 1865-1874 | 7 |
11 | Resolution of feature interactions in integrated services of home network system | Leelaprute P. | 2007 | 2007 Asia-Pacific Conference on Communications, APCC ,pp. 363-366 | 7 |
12 | A review and comparison of methods for determining the best analogies in analogy-based software effort estimation | Chinthanet B., Leelaprute P., Rungsawang A., Phannachitta P., Ubayashi N., Kamei Y., Matsumoto K. | 2016 | Proceedings of the ACM Symposium on Applied Computing 04-08-April-2016,pp. 1554-1557 | 7 |
13 | Sparse Communication for Federated Learning | Thonglek K., Takahashi K., Ichikawa K., Nakasan C., Leelaprute P., Iida H. | 2022 | Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 ,pp. 1-8 | 6 |
14 | Does Coding in Pythonic Zen Peak Performance? Preliminary Experiments of Nine Pythonic Idioms at Scale | Leelaprute P., Chinthanet B., Wattanakriengkrai S., Kula R.G., Jaisri P., Ishio T. | 2022 | IEEE International Conference on Program Comprehension 2022-March,pp. 575-579 | 6 |
15 | Semantic warnings and feature interaction in Call Processing Language on Internet telephony | Nakamura M., Leelaprute P., Matsumoto K., Kikuno T. | 2003 | Proceedings - 2003 Symposium on Applications and the Internet, SAINT 2003 ,pp. 283-290 | 5 |
16 | Hajime Worm with Lifespan and Its Mitigation Evaluation Against Mirai Malware Based on Agent-Oriented Petri Net PN2 | Yamaguchi S., Leelaprute P. | 2019 | 2019 IEEE International Conference on Consumer Electronics, ICCE 2019
| 5 |
17 | Industry Application of Software Development Task Measurement System: TaskPit | Suthipornopas P., Leelaprute P., Monden A., Uwano H., Kamei Y., Ubayashi N., Araki K., Yamada K., Matsumoto K. | 2017 | IEICE Transactions on Information and Systems E100D(3),pp. 462-472 | 4 |
18 | Tour Miner: Mining system of tour plans from SNS:-Smelting function from travel records to tour routes- | Yamaguchi S., Terada T., Manaskasemsak B., Rungsawang A., Leelaprute P. | 2017 | 2017 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2017 ,pp. 239-240 | 3 |
19 | Task estimation for software company employees based on computer interaction logs | Pellegrin F., Pellegrin F., Yücel Z., Monden A., Leelaprute P. | 2021 | Empirical Software Engineering 26(5) | 3 |
20 | Investigating effect of stimulus modality on recollection rate in e-learning systems | Supitayakul P., Yucel Z., Monden A., Leelaprute P. | 2020 | Proceedings - 2020 9th International Congress on Advanced Applied Informatics, IIAI-AAI 2020 ,pp. 138-141 | 2 |
21 | Tour Miner: Mining System of Tour Plans from SNS: Extraction of Travel Records from Check-in Information | Leelaprute P., Yamaguchi S. | 2019 | 2019 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2019 ,pp. 174-175 | 2 |
22 | Threat Analysis of Fake Virus Alerts Using WebView Monitor | Imamura Y., Orito R., Chaikaew K., Chaikaew K., Manardo C., Manardo C., Leelaprute P., Sato M., Yamauchi T. | 2019 | Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019 ,pp. 28-36 | 2 |
23 | Automated Quantization and Retraining for Neural Network Models without Labeled Data | Thonglek K., Takahashi K., Ichikawa K., Nakasan C., Nakada H., Takano R., Leelaprute P., Iida H. | 2022 | IEEE Access
| 2 |
24 | The Convergence of Container and Traditional Virtualization: Strengths and Limitations | Li G., Takahashi K., Ichikawa K., Iida H., Nakasan C., Leelaprute P., Thiengburanathum P., Phannachitta P. | 2023 | SN Computer Science 4(4) | 2 |
25 | A Pilot Study of Testing Infrastructure as Code for Cloud Systems | Suwanachote N., Pornmaneerattanatri S., Kashiwa Y., Ichikawa K., Leelaprute P., Rungsawang A., Manaskasemsak B., Iida H. | 2023 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC ,pp. 584-588 | 1 |
26 | Assessing the Effect of Varying Word Classes on Behavioral Variables in Technology Mediated Vocabulary Learning | Supitayakul P., Yucel Z., Monden A., Leelaprute P. | 2019 | Proceedings - 2019 8th International Congress on Advanced Applied Informatics, IIAI-AAI 2019 ,pp. 226-229 | 1 |
27 | Practical application of tour plan mining system tour miner - Web application and case study - Web a | Leelaprute P., Sothanakul P., Yamaguchi S. | 2020 | Digest of Technical Papers - IEEE International Conference on Consumer Electronics 2020-January | 1 |
28 | Web access monitoring mechanism via Android WebView for threat analysis | Imamura Y., Orito R., Uekawa H., Uekawa H., Chaikaew K., Chaikaew K., Leelaprute P., Sato M., Yamauchi T. | 2021 | International Journal of Information Security
| 1 |
29 | Effect of grasping uniformity on estimation of grasping region from gaze data | Witchawanitchanun P., Yucel Z., Monden A., Leelaprute P. | 2019 | HAI 2019 - Proceedings of the 7th International Conference on Human-Agent Interaction ,pp. 265-267 | 1 |
30 | Evaluating semantic warnings in VoIP programmable services with open source environment | Leelaprute P., Nakamura M., Matsumoto K.I., Kikuno T. | 2003 | Proceedings - Asia-Pacific Software Engineering Conference, APSEC 2003-January,pp. 552-561 | 1 |
31 | Deriving interaction-prone scenarios in feature interaction filtering with use case maps | Nakamura M., Leelaprute P., Kikuno T. | 2002 | Proceedings - International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2002-January,pp. 237-244 | 1 |
32 | Parkinson’s Disease Classification from Scanned Images of Spiral Drawings | Wachiracharownong A., Wachiracharownong A., Sri-Iesaranusorn P., Surangsrirat D., Leelaprute P., Panyakaew P., Bhidayasiri R. | 2024 | Proceedings - 2024 IEEE 1st International Conference on Artificial Intelligence for Medicine, Health and Care, AIMHC 2024 ,pp. 185-186 | 1 |
33 | A Multi - Aspect Evaluation of DL-based SQLi Attack Detection Models | Leelaprute P., Kase Y., Amasaki S., Aman H., Yokogawa T. | 2024 | 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Proceedings ,pp. 352-355 | 0 |
34 | An Evaluation of Network Performance through the Integration of SRv6 and MPTCP | Laohakanniyom P., Ichikawa K., Iida H., Leelaprute P., Manaskasemsak B., Rungsawang A. | 2024 | COMNETSAT 2024 - IEEE International Conference on Communication, Networks and Satellite ,pp. 203-210 | 0 |
35 | Exploring Benefits of Bellwether Projects in Cross-Project IR-based Fault Localization | Amasaki S., Leelaprute P., Aman H., Yokogawa T. | 2024 | Proceedings of the Euromicro Conference on Software Engineering and Advanced Applications, EUROMICRO-SEAA (2024),pp. 214-221 | 0 |
36 | Fault-prone byte-code detection using text classifier | Fujiwara T., Mizuno O., Leelaprute P. | 2015 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9459,pp. 415-430 | 0 |
37 | Lessons learned from collaborative research in software engineering: A student's perspective | Jongyindee A., Leelaprute P., Ohira M., Matsumoto K. | 2012 | Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012 ,pp. 494-497 | 0 |
38 | Definition and detection of semantic warnings for voiceXML | Leelaprute P., Kikuno T., Nakamura M., Matsumoto K.I. | 2005 | Proceedings of the IASTED International Conference on Software Engineering: part of the 23rd IASTED International Multi-Conference on Applied Informatics, SE 2005 ,pp. 267-275 | 0 |
39 | Tool support for consistency verification of UML diagrams | Phuklang S., Yokogawa T., Leelaprute P., Arimoto K. | 2017 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10611 LNCS,pp. 606-609 | 0 |
40 | Extraction of library update history using source code reuse detection | Jewmaidang K., Ishio T., Ihara A., Matsumoto K., Leelaprute P. | 2018 | IEICE Transactions on Information and Systems E101D(3),pp. 799-802 | 0 |
41 | Experiment Design and Verification for Assessing the Acquisition of Strategic Planning Ability | Manatphaiboon N., Hamachi S., Yucel Z., Leelaprute P., Monden A. | 2023 | Proceedings - 2023 15th International Congress on Advanced Applied Informatics Winter, IIAI-AAI-Winter 2023 ,pp. 121-128 | 0 |
42 | Do Developers Present Proficient Code Snippets in Their README Files? An Analysis of PyPI Libraries in GitHub | Sitthithanasakul S., Chinthanet B., Kula R.G., Netsiwawichian N., Leelaprute P., Manaskasemsak B., Rungsawang A., Matsumoto K. | 2023 | Journal of Information Processing 31,pp. 679-688 | 0 |
43 | Portable Containerized MPI Application Using UCX Replacement Method | Manatura S., Ichikawa K., Chantrapornchai C., Nakasan C., Leelaprute P., Rungsawang A., Manaskasemsak B. | 2024 | Lecture Notes on Data Engineering and Communications Technologies 189,pp. 222-234 | 0 |