Publications
Peer-reviewed publications, datasets, and vulnerability disclosures. Full list also available on Google Scholar.
2026
IEEE SVCC
Prompt-Language Leakage from LLM-Generated Data via Membership Inference on Downstream LSTMs
K. Jin, A.K. Belman
IEEE AIIoT
Parallel Stream Transformer Based Architecture for Multimodal User Verification
J. Xiong, A.K. Belman
2025
IEEE SVCC
SyntheticPop: Attacking Speaker Verification Systems With Synthetic VoicePops
E. Jamdar, A.K. Belman
IEEE SVCC (Poster)
RTOS Security Risks in Telecommunications Hardware
A. Erwin-Martinetti, A.K. Belman
IEEE AIIoT
Multi-Modal Adversarial Activity Detection Using Keyboard and Mouse Dynamics
J. Xiong, A.K. Belman
IEEE CARS
Adopting AI in Computing-based Interdisciplinary Curricula for Workforce Readiness
A.K. Belman, M. Khazaei, M. Moh
IEEE CARS
From Raspberry Pi to Nvidia Jetson: Boosting Cyber Awareness through Cyber-AI Summer Camps
A.K. Belman, M. Li, K. Liu, A. Roy, X. Su, M. Moh
IEEE ICCCNT
Enhanced Multi-Class DDoS Attack Identification Using a Meta-Learning Ensemble
A.I. Kumar, G. Ishigaki, A.K. Belman
IEEE ICCCNT
Overflow Attacks on Telecommunications Hardware
A. Erwin-Martinetti, A.K. Belman, M. Stamp
Springer Nature
Beyond Normality: Rethinking Behavioral Biometric Data
A.K. Belman, F. Sicong, V.V. Phoha, P. Mohanty
2021
ACM Digital Threats
Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation
L. Wang, S. Iyengar, A.K. Belman, P. Śniatała, V.V. Phoha, C. Wan
2020
ACM Trans. Privacy & Security (TOPS)
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification
A.K. Belman, V.V. Phoha
IEEE AISP
Classification of Threat Level in Typing Activity Through Keystroke Dynamics
A.K. Belman, S. Sridhara, V.V. Phoha
IEEE AISP
DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices
A.K. Belman, V.V. Phoha
Springer (Book Chapter)
A.K. Belman et al.
IEEE AISP
Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication
A.K. Belman et al.
2019
IEEE Dataport (Dataset)
SU-AIS BB-MAS: Behavioral Biometrics Multi-device and Multi-Activity Data from Same Users
A.K. Belman, L. Wang, S.S. Iyengar, P. Śniatała, R. Wright, R. Dora, J. Baldwin, Z. Jin, V.V. Phoha
2016
ASME IMECE
Detecting Malicious Defects in 3D Printing Process Using Machine Learning and Image Classification
M. Wu, V.V. Phoha, Y.B. Moon, A.K. Belman
2013
ERCICA
Video Shot Detection Using Corner Detectors and Optical Flow
J. Majumdar, G.M. Venkatesh, A.K. Belman
Vulnerability Disclosures
CVE-2025-32105, Buffer Overflow in Sangoma IMG2020 HTTP Server
A. Erwin-Martinetti, A.K. Belman · 2025
CVE-2025-32106, Remote Code Execution in Audiocodes Mediapack MP-11x
A. Erwin-Martinetti, A.K. Belman · 2025