Building intelligent systems that solve complex problems and drive innovation through artificial intelligence and deep learning.
I’m a Cybersecurity graduate and currently pursuing a Bachelor’s degree in Physics at USP, with a focus on Computer Science and Artificial Intelligence. Alongside my academic pursuits, I actively engage in projects and research related to reinforcement learning. By exploring the exciting realm of reinforcement learning, I aim to further enhance my understanding of how intelligent systems can learn and make decisions in dynamic environments. With a foundation in cybersecurity and a passion for pushing the boundaries of AI, I strive to contribute to the development of innovative solutions and applications in this rapidly evolving field.
AI Engineer
Cybersecurity Expert
Backend
Data Scientist
Physics
2023
Physics
Cyber Security and Information Technology
2020 - 2022
Cyber Security and Information Technology
Vocational High School
2019 - 2020
Vocational High School
GenDigit is an artificial intelligence model based on generative adversarial networks (GANs) trained to generate realistic images of handwritten digits. Using a generator conditioned on specific numbers, the project enables the creation of customized samp...
This project focuses on leveraging Large Language Models (LLMs) for the automated generation of security reports from web server logs. The system is designed to analyze extensive web server logs, extract relevant security-related information, and produce ...
This project aims to predict phishing cyber attacks using BERT and NLP techniques. By analyzing email content and URLs, the model identifies phishing patterns with high accuracy, enhancing cybersecurity defenses against evolving threats. BERT's contextual...
This project applies reinforcement learning (RL) to train an AI agent to autonomously play Super Mario Bros. The agent learns through trial and error, optimizing its actions to maximize rewards. Using RL methods like Q-learning or deep Q-networks (DQN), t...
Paper.Not is an innovative project that leverages large language models (LLMs) to revolutionize the way users interact with scientific papers. The platform allows users to upload a scientific paper and receive an instant, concise summary generated by an a...
This project develops a personalized music recommendation system using Large Language Models (LLM). It generates curated playlists based on users' preferences, emotions, and listening history. By integrating LLM's natural language processing with Spotify'...
The Sentiment Analyzer is an advanced Natural Language Processing (NLP) project designed to classify the sentiment of text data using BERT (Bidirectional Encoder Representations from Transformers). This tool leverages state-of-the-art machine learning tec...
An agent trained with Deep Q-Network (DQN) to solve the classic CartPole problem, where the goal is to balance an inverted pendulum on a cart moving left or right. This project demonstrates fundamental reinforcement learning concepts, including exploratio...
Development of an agent trained with Q-Learning or SARSA to find the exit of procedurally generated mazes. The agent learns to navigate the environment, avoiding dead ends and optimizing its trajectory for the most efficient solution. This project highlig...
A computer vision system to detect and recognize faces in real-time, using Convolutional Neural Networks (CNNs) and techniques such as OpenCV for image capture and processing. The project can be expanded to include facial authentication systems or securit...
Development of an algorithm that tracks objects in videos using techniques such as optical flow algorithms or convolutional neural networks for object segmentation. The project can be applied to various areas such as security surveillance, motion analysis...
Development of a machine learning-based system to identify and predict fraudulent transactions on e-commerce platforms. The model analyzes purchasing behavior patterns, such as amounts, location, and user history, to detect anomalies in real-time. Algorit...
Creation of an artificial intelligence application that processes web server logs to generate automated security reports. The system uses log analysis techniques and machine learning to detect patterns of anomalous traffic, intrusion attempts, and securit...
Development of a predictive model to detect phishing attacks in real-time, focusing on fraudulent emails, websites, and messages. Using supervised learning, the system analyzes data such as textual content, URLs, and metadata to classify and identify phis...
The BB84 protocol is a Quantum Key Distribution (QKD) scheme developed by Charles Bennett and Gilles Brassard in 1984. It enables two parties, traditionally called Alice and Bob, to securely share a secret key, ensuring resistance against eavesdropping at...
QuantumTeleportViz simulates and animates quantum teleportation, a phenomenon where a quantum state is transferred from one qubit to another without the physical transmission of information, using quantum entanglement....
LightCaster 2D is an interactive real-time light propagation simulator that visually demonstrates the fundamental principles of geometric optics in a two-dimensional environment. This educational application allows users to explore how light propagates in...
WaveDuality is a 2D interactive simulator in C++ and SFML that demonstrates the famous double-slit experiment, one of the pillars of quantum physics that reveals the dual wave-particle nature of matter. This software allows real-time visualization of inte...
Numerical Detector is an interactive application built with Streamlit and TensorFlow/Keras that allows users to draw handwritten numbers and receive predictions from a trained model using the MNIST dataset. The intuitive interface provides a hands-on expe...
AI/Software Engineer
2024 - Present
Develop algorithms and machine learning models focused on NLP and Large Language Models (LLMs).
Build and maintain REST APIs to deploy AI models in production environments.
Systems Programmer
2021 - 2024
Design and develop advanced security applications for offensive and defensive cybersecurity testing.
Conduct vulnerability research and create custom exploits or defensive countermeasures.
Information Security Consultant
2020 - 2021
Identify and evaluate potential threats to information security across systems and networks.
Analyze vulnerabilities in applications, infrastructure, and network environments.
html>