default search action
Ryo Kurachi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Libing Deng, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Xiongren Xiao, Renfa Li, Guoqi Xie:
Enhanced Real-time Scheduling of AVB Flows in Time-Sensitive Networking. ACM Trans. Design Autom. Electr. Syst. 29(2): 33:1-33:26 (2024) - 2023
- [j18]Yong Xie, Gang Zeng, Ryo Kurachi, Fu Xiao, Hiroaki Takada, Shiyan Hu:
Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3064-3078 (2023) - 2022
- [c20]Ryo Kurachi, Takanari Katayama, Takamitsu Sasaki, Masaki Saito, Yoshimasa Ajioka:
Evaluation of Automotive Event Data Recorder towards Digital Forensics. VTC Spring 2022: 1-7 - 2021
- [j17]Yong Xie, Gang Zeng, Ryo Kurachi, Fu Xiao, Hiroaki Takada:
Optimizing Extensibility of CAN FD for Automotive Cyber-Physical Systems. IEEE Trans. Intell. Transp. Syst. 22(12): 7875-7886 (2021) - 2020
- [j16]Yong Xie, Gang Zeng, Ryo Kurachi, Xin Peng, Guoqi Xie, Hiroaki Takada:
Balancing Bandwidth Utilization and Interrupts: Two Heuristic Algorithms for the Optimized Design of Automotive CPS. IEEE Trans. Ind. Informatics 16(4): 2382-2392 (2020) - [c19]Ryo Kurachi, Hiroaki Takada, Hiroshi Ueda, Shuhei Takimoto:
Towards Minimizing MAC Utilization for Controller Area Network. AutoSec@CODASPY 2020: 45-50 - [c18]Kenji Taguchi, Ryo Kurachi, Kiyoshi Sasaki, Nobuhiko Nakamura, Kazuki Tomonaga, Shuhei Yamashita:
Threat Analysis Framework for Safety Architectures in SCDL. SAFECOMP 2020: 341-354 - [c17]Toshiyuki Fujikura, Ryo Kurachi:
A Simultaneous Attack Scenario Generation Method Using the Parallel Behavior Model. VTC Spring 2020: 1-7
2010 – 2019
- 2019
- [j15]Yang Qin, Gang Zeng, Ryo Kurachi, Yixiao Li, Yutaka Matsubara, Hiroaki Takada:
Energy-Efficient Intra-Task DVFS Scheduling Using Linear Programming Formulation. IEEE Access 7: 30536-30547 (2019) - [j14]Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada:
Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming. J. Inf. Process. 27: 136-148 (2019) - [j13]Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada:
Execution-variance-aware task allocation for energy minimization on the big.LITTLE architecture. Sustain. Comput. Informatics Syst. 22: 155-166 (2019) - [j12]Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Zhetao Li, Renfa Li, Keqin Li:
WCRT Analysis and Evaluation for Sporadic Message-Processing Tasks in Multicore Automotive Gateways. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(2): 281-294 (2019) - [j11]Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Renfa Li, Keqin Li:
Exact WCRT Analysis for Message-Processing Tasks on Gateway-Integrated In-Vehicle CAN Clusters. ACM Trans. Embed. Comput. Syst. 17(6): 95:1-95:29 (2019) - [j10]Yong Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Guoqi Xie:
Security/Timing-Aware Design Space Exploration of CAN FD for Automotive Cyber-Physical Systems. IEEE Trans. Ind. Informatics 15(2): 1094-1104 (2019) - [c16]Shu Takemoto, Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa, Shinya Honda, Ryo Kurachi:
Performance Evaluation of CAESAR Authenticated Encryption on SROS2. AICCC 2019: 168-172 - [c15]Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita:
Asymmetric Key-Based Secure ECU Replacement Without PKI. HASE 2019: 234-240 - [c14]Toshiyuki Fujikura, Ryo Kurachi:
An Attack Scenario Generation Method Using the Behavior Model. PRDC 2019: 59-60 - [c13]Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita:
DDCAN: Delay-Time Deliverable CAN Network. QRS Companion 2019: 36-41 - [c12]Toshiyuki Fujikura, Ryo Kurachi:
A Test Scenario Generation Method for High Requirement Coverage by using KAOS Method. QRS Companion 2019: 542-543 - [c11]Ryo Kurachi, Hiroaki Takada, Kentaro Takei, Takaaki Iinuma, Yuki Satoh, Manabu Nakano, Hideki Matsushima, Jun Anzai, Toshihisa Nakano:
Evaluation of Security Access Service in Automotive Diagnostic Communication. VTC Spring 2019: 1-7 - 2018
- [j9]Wufei Wu, Yizhi Huang, Ryo Kurachi, Gang Zeng, Guoqi Xie, Renfa Li, Keqin Li:
Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks. IEEE Access 6: 45233-45245 (2018) - [j8]Wufei Wu, Ryo Kurachi, Gang Zeng, Yutaka Matsubara, Hiroaki Takada, Renfa Li, Keqin Li:
IDH-CAN: A Hardware-Based ID Hopping CAN Mechanism With Enhanced Security for Automotive Real-Time Applications. IEEE Access 6: 54607-54623 (2018) - [j7]Zhongqi Ma, Ryo Kurachi, Gang Zeng, Hiroaki Takada:
Further Analysis with Linear Programming on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling. J. Inf. Process. 26: 540-548 (2018) - [c10]Shan Ding, Tong Zhao, Ryo Kurachi, Gang Zeng:
ID Hopping CAN Controller Design with Obfuscated Priority Assignment. DASC/PiCom/DataCom/CyberSciTech 2018: 94-99 - [c9]Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada:
Energy-Aware Task Allocation for Large Task Sets on Heterogeneous Multiprocessor Systems. EUC 2018: 158-165 - [c8]Ryo Kurachi, Hiroaki Takada, Masato Tanabe, Jun Anzai, Kentaro Takei, Takaaki Iinuma, Manabu Maeda, Hideki Matsushima:
Improving secure coding rules for automotive software by using a vulnerability database. ICVES 2018: 1-8 - 2017
- [j6]Shan Ding, Gang Zeng, Ryo Kurachi, Ruifeng Huang:
A Genetic Algorithm for Packing CAN FD Frame with Real-Time Constraints. IEICE Trans. Inf. Syst. 100-D(10): 2505-2514 (2017) - [j5]Yong Xie, Gang Zeng, Ryo Kurachi, Guoqi Xie, Yong Dou, Zhili Zhou:
An optimized design of CAN FD for automotive cyber-physical systems. J. Syst. Archit. 81: 101-111 (2017) - [j4]Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Zhetao Li, Renfa Li, Keqin Li:
WCRT Analysis of CAN Messages in Gateway-Integrated In-Vehicle Networks. IEEE Trans. Veh. Technol. 66(11): 9623-9637 (2017) - 2016
- [c7]Shan Ding, Ruifeng Huang, Ryo Kurachi, Gang Zeng:
A Genetic Algorithm for Minimizing Bandwidth Utilization by Packing CAN-FD Frame. ICESS 2016: 119-124 - [c6]Ryosuke Nishimura, Ryo Kurachi, Kazumasa Ito, Takashi Miyasaka, Masaki Yamamoto, Miwako Mishima:
Implementation of the CAN-FD protocol in the fuzzing tool beSTORM. ICVES 2016: 1-6 - [c5]Zhongqi Ma, Ryo Kurachi, Gang Zeng, Hiroaki Takada:
Further analysis on blocking time bounds for partitioned fixed priority multiprocessor scheduling. SIES 2016: 226-231 - 2015
- [c4]Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Renfa Li:
Gateway Modeling and Response Time Analysis on CAN Clusters of Automobiles. HPCC/CSS/ICESS 2015: 1147-1153 - [c3]Ryo Kurachi, Yang Chen, Hiroaki Takada, Gang Zeng:
An Integrated Framework for Topology Design of CAN Networks under Real-Time Constraints. VTC Fall 2015: 1-5 - 2013
- [j3]Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li:
Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway. IEICE Trans. Inf. Syst. 96-D(7): 1467-1477 (2013) - 2012
- [j2]Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada:
The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages. Inf. Media Technol. 7(2): 841-852 (2012) - [j1]Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada:
The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages. J. Inf. Process. 20(2): 451-462 (2012) - [c2]Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li:
Schedulability Analysis for Messages in Gateway-Interconnected Controller Area Network. ICCVE 2012: 83-90 - 2011
- [c1]Yang Chen, Ryo Kurachi, Hiroaki Takada, Gang Zeng:
Schedulability Comparison for CAN Message with Offset: Priority Queue Versus FIFO Queue. RTNS 2011: 181-192
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint