← Home

Publications

Peer-reviewed publications, datasets, and vulnerability disclosures. Full list also available on Google Scholar.

2026

IEEE SVCC

Prompt-Language Leakage from LLM-Generated Data via Membership Inference on Downstream LSTMs

K. Jin, A.K. Belman

IEEE AIIoT

Parallel Stream Transformer Based Architecture for Multimodal User Verification

J. Xiong, A.K. Belman

2025

IEEE SVCC

Inter-Device User Keystroke Analysis

A. Erwin-Martinetti, A.K. Belman

IEEE SVCC (Poster)

RTOS Security Risks in Telecommunications Hardware

A. Erwin-Martinetti, A.K. Belman

IEEE CARS

From Raspberry Pi to Nvidia Jetson: Boosting Cyber Awareness through Cyber-AI Summer Camps

A.K. Belman, M. Li, K. Liu, A. Roy, X. Su, M. Moh

IEEE ICCCNT

Enhanced Multi-Class DDoS Attack Identification Using a Meta-Learning Ensemble

A.I. Kumar, G. Ishigaki, A.K. Belman

IEEE ICCCNT

Overflow Attacks on Telecommunications Hardware

A. Erwin-Martinetti, A.K. Belman, M. Stamp

Springer Nature

Beyond Normality: Rethinking Behavioral Biometric Data

A.K. Belman, F. Sicong, V.V. Phoha, P. Mohanty

2021

ACM Digital Threats

Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation

L. Wang, S. Iyengar, A.K. Belman, P. Śniatała, V.V. Phoha, C. Wan

2020

2019

IEEE Dataport (Dataset)

SU-AIS BB-MAS: Behavioral Biometrics Multi-device and Multi-Activity Data from Same Users

A.K. Belman, L. Wang, S.S. Iyengar, P. Śniatała, R. Wright, R. Dora, J. Baldwin, Z. Jin, V.V. Phoha

2016

2013

ERCICA

Video Shot Detection Using Corner Detectors and Optical Flow

J. Majumdar, G.M. Venkatesh, A.K. Belman

Vulnerability Disclosures

CVE-2025-32105, Buffer Overflow in Sangoma IMG2020 HTTP Server

A. Erwin-Martinetti, A.K. Belman · 2025

CVE-2025-32106, Remote Code Execution in Audiocodes Mediapack MP-11x

A. Erwin-Martinetti, A.K. Belman · 2025