-
Freelance
- San Diego
-
02:20
(UTC -08:00) - https://www.linkedin.com/in/ericyocam/
- https://orcid.org/0000-0001-8176-3867
- https://scholar.google.com/citations?user=Ns46BB0AAAAJ&hl=en
- https://www.semanticscholar.org/author/Eric-Yocam/70804327
- https://www.scopus.com/authid/detail.uri?authorId=6504039224
- https://www.researchgate.net/profile/Eric-Yocam-2
-
steganography_text_image_poc Public
Steganography providing embedded text and images into a cover image, and later extract them.
Jupyter Notebook MIT License UpdatedNov 6, 2025 -
drone_opt_path_gas_leak_poc Public
Hybrid classical-quantum system for gas leak detection and drone path planning using synthetic GPLA-12 data, classical ML, and quantum-inspired optimization.
machine-learning environmental-monitoring synthetic-data quantum-ai matplotlib-animation voronoi-map autonomous-dronesJupyter Notebook UpdatedSep 24, 2025 -
GIS_unemploy_interactive_poc Public
Creates an interactive visualization of unemployment data for Washington and California State counties. It combines geographical data with unemployment statistics to produce a choropleth map and a …
Jupyter Notebook UpdatedSep 23, 2025 -
model-watermark-demo-poc Public
Secure Neural Network Model Watermarking
Jupyter Notebook UpdatedAug 29, 2025 -
-
Neural Network Model Reverse Engineering Toolkit
neural-network-analysis deep-learning-security model-reverse-engineering ml-model-extraction ai-model-auditing black-box-analysis model-architecture-detectionJupyter Notebook UpdatedAug 28, 2025 -
Implements a multi-level approach to image encryption and signing using post-quantum cryptographic techniques, with a focus on the FALCON (Fast-Fourier Lattice-based Compact Signatures over NTRU) a…
aes-encryption post-quantum-cryptography mean-squared-error lwe-encryption 2d-dwt falcon-digital-signatures multi-level-approachJupyter Notebook UpdatedAug 15, 2025 -
quantum_ibm_qiskit_poc Public
Demo of quantum cryptanalysis combining Shor's Algorithm for RSA factorization with Quantum Neural Networks for cryptographic security assessment, running on real IBM quantum computers.
Jupyter Notebook UpdatedAug 7, 2025 -
Deep learning framework for classifying traffic sign safety using synthetic data and hybrid quantum-classical models, tested against compound adversarial attacks and enhanced defenses.
Jupyter Notebook UpdatedJul 30, 2025 -
wildfire_risk_prediction_poc Public
Novel approach to wildfire risk prediction by integrating behavioral and social data
Jupyter Notebook UpdatedJul 27, 2025 -
Generating and analyzing synthetic traffic sign images using cGANs and safety CNN
Jupyter Notebook UpdatedJul 27, 2025 -
gather_cyber_topics_poc Public
A curated collection of educational links and videos covering various cybersecurity and computer science topics.
Rich Text Format UpdatedJan 11, 2025 -
key_exchanges_demo_poc Public
Demonstrates basic cryptographic concepts using simplified implementations of Diffie-Hellman and RSA algorithms.
Jupyter Notebook UpdatedSep 10, 2024 -
Demonstrates key concepts in cryptography and security principles.
rsa-cryptography pkcs mixed-content public-key-encryption discrete-logarithms modular-math diffie-hellman-key-exchangeJupyter Notebook UpdatedSep 6, 2024 -
access_control_demo_poc Public
Demonstrates six key access control concepts.
role-based-access-control access-control attribute-based-access-control access-control-matrix principle-least-priviledgeJupyter Notebook Apache License 2.0 UpdatedSep 5, 2024 -
obfuscation_techniques_poc Public
Demonstrates of eight common code obfuscation techniques
-
cyber-domain-tools-ref-poc Public
Cyber analysis tools used in different domains of cybersecurity.
-
An analysis of binary explotation memory corruption vulnerabilities.
Jupyter Notebook UpdatedSep 4, 2024 -
A comprehensive mapping of the Cyber Kill Chain and MITRE ATT&CK frameworks to various tools and techniques commonly used in malware analysis, reverse engineering, and software exploitation analysis.
-
A simulation of network traffic using synthetic network traffic for 802.11, 3G GSM, 4G LTE, and 5G NR
-
A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.
-
Performs firmware analysis on a given binary file.
-
A comparison analysis between classical and quantum-classical (or hybrid) neural network and the impact effectiveness of a compound adversarial attack.
-
A quantum-classical (or hybrid) neural network and the use of a adversarial attack mechanism. The core libraries employed are Quantinuum pytket and pytket-qiskit. torchattacks is used for the white…
mnist-dataset quantum-classical adversarial-attacks white-box-attacks hybrid-neural-network quantinuum targetted-attacksJupyter Notebook UpdatedSep 4, 2024 -
gan_mnist_gen_all_digits_poc Public
Generative Adversarial Network to generate handwritten digit images similar to the MNIST dataset.
-
A quantum anomaly detection approach using the Cirq and Pennylane libraries, designed to detect adversarial attacks on quantum circuits.
-
bgp-routing-attacks-sim-poc Public
Simulates the Border Gateway Protocol (BGP) routing process and demonstrates two common BGP attacks: sub-prefix hijacking and BGP prepending.
-
Demonstrates the implementation of various logical gates using quantum circuits. The code utilizes three popular quantum computing libraries: Cirq, PyQuil, and ProjectQ.
Jupyter Notebook UpdatedSep 4, 2024 -
Fuzzy Logic Enhanced Network Traffic Routing with QoS
Jupyter Notebook UpdatedSep 4, 2024 -
A language model that generates text based on a given prompt.
Jupyter Notebook UpdatedSep 4, 2024