Skip to main content

Building Trustworthy AI Systems

Bridging the gap between theoretical research and production-ready secure AI systems

I'm an AI Security Researcher with a journey that took me from IT consulting to fraud detection operations, and now to the frontiers of federated learning security. My path wasn't linear—I started in software engineering, moved into detecting financial crimes at major Indonesian financial institutions, and found myself drawn to the deeper question: how do we build AI systems that remain secure when no single party can be fully trusted?

For 3+ years, I led fraud detection operations at ITSEC Asia, maintaining 99.9%+ SLA on real-time systems processing millions of daily transactions. My work included deployments at major Indonesian financial institutions including Bank Rakyat Indonesia (BRI), where I saw firsthand the gap between academic security research and production constraints—budgets, latency requirements, and the reality that adversaries don't follow the threat models in papers. This experience drove me toward federated learning research, exploring how to build secure, collaborative ML systems that work within real-world constraints. I've published research in steganography (Springer LNNS vol. 285) and focus on practical defenses for federated learning environments.

Now I focus on federated learning defense: building systems like SignGuard that combine ECDSA signatures with anomaly detection to achieve 94.5% attack detection rates. My work sits at the intersection of cryptographic verification and adversarial robustness—developing practical Byzantine-robust aggregation methods and anomaly detection techniques that scale to real-world deployments.

Technical Expertise

Technologies and tools I use to build secure, production-ready AI systems

Federated Learning & Security

PyTorch Flower PySyft Opacus TenSEAL scikit-learn

Fraud Detection & ML

TensorFlow SAS Fraud Management SAS Viya Power BI scikit-learn

Security Research

Adversarial ML Steganography Penetration Testing Threat Modeling Byzantine Robustness

Cryptography

ECDSA AES Shamir's Secret Sharing TenSEAL

Engineering

FastAPI Docker LangChain LangGraph React SQL IBM DB2 Git

Professional Timeline

My career path from industry to research

January 2025

AI Security Researcher at Independent Research

Conducting research in federated learning security and adversarial machine learning. Developing SignGuard, a novel defense mechanism against poisoning attacks in FL systems, and exploring privacy-preserving AI techniques.

September 2021

Fraud Detection & AI Systems Consultant at ITSEC Asia

Led fraud detection operations and ML system development for enterprise clients including major banks and payment processors, managing real-time systems processing millions of daily transactions.

June 2019

Software Engineering Intern at Aruna Indonesia

Software engineering internship focused on testing and quality assurance for real-time communication applications.

August 2016

Bachelor of Informatics - Telkom University

Improving the Imperceptibility of Pixel Value Difference and LSB Substitution Based Steganography Using Modulo Encoding

Bachelor of Informatics

Telkom University

Period

Aug 2016 – Feb 2021

GPA

3.82/4.00

Location

Jakarta, Indonesia

* Completed while working full-time in industry

Beyond the Code

When I step away from the terminal, I'm usually building things in Roblox Studio or experimenting with game mechanics. There's something fascinating about creating interactive systems that thousands of people can explore and enjoy—it's the same drive that pulls me toward distributed systems, just in a more playful context. I also spend time producing electronic music, which scratches a different creative itch than programming. The connection between pattern-based music production and algorithmic thinking isn't lost on me, and I find that switching between these different modes keeps my perspective fresh.

Lately I've been diving deeper into game development, learning how the same principles I apply to secure systems—state management, race conditions, trust boundaries—show up in multiplayer game architecture. It's a reminder that the best engineering insights often come from seemingly unrelated fields.