About Me
Passionate
Artificial Intelligence and Cyber Security enthusiast
Curious
Lifelong Learner
Motivated
With the new day comes new strength and new thoughts.

I'm a computer science student in my final year at university working on privacy preserving machine learning, more precisely on the use of homomorphic encryption for deep learning. I've been participating in capture the flag competition since 2016 which made me learn about different fields of computer science as it's all about solving problems that often requires a set of skills that aren't centered around a specific topic, but the heart of it is mostly cyber security. I'm a strong believer that humans can be polyvalent and I always strive to explore new concepts and technologies as a way to have a larger scope that will help me find solutions to complex problems. I don't like to work on repetitive and simple problems, but I prefer to mix approaches and find new ones to solve what haven't been explored yet or optimize where others left. I mostly like working on projects that have an impact while being surrounded by great people that supports each other.
I started coding when I was 14, but I discovered the real sense of computers after starting my Computer Science studies. I was really excited to know more about every piece that made computers alive today, because this is where vulnerabilities were born, and it would be hard for us to make a good use of those building blocks if we don't understand them.
My Experience
PyTorch-OpenMined Fellow
Community Leader
CTF Player
DevOps Engineer
Ambassador
Python Developer
My Skills
Certified in Cyber Security and Machine Learning.
I'm continually expanding my skills with a goal of mastering what I do and to be always ready for the industry of tomorrow.
My Works

TenSEAL
A library for applying homomorphic encryption in machine learning.

CrypTen Integration into PySyft
Using CrypTen as a Secure Multi-Party Computation backend in PySyft.

Continuous Control
Train a double-jointed arm agent to reach a moving target location.

Malware Revealer
A malware classification framework, it contains a modular toolset for feature extraction, as well as pre-trained models.

Navigation
Train an agent to navigate and collect bananas in a large, square world.

Pneumonia Detector
A trained neural network that can diagnose Pneumonia on chest x-ray, wrapped by an easy to use web application.

Face Generation
Build a Generative Adversarial Network that can generate new human faces.

Dog Identification
Build a Convolutional Neural Network that can identify the breed of a dog.

Messaging
Messaging is a client/server app written in Python2.7 that allows multiple users to communicate over a shared channel.

Open Class
OpenClass is a web app that promote information sharing through organized workshops.

Sentiment Analysis
Kaggle kernel explaining how I did the classification of tweets as happy or sad.

TV Script Generation
Build a Recurrent Neural Network to generate new TV script.

Youbix
It is a simple kernel developed for learning purposes. If you are new to kernel development then you may find it useful as the code is well documented.

Web Scraping
Scraping websites like Indiegogo, Kickstarter and Schizophrenia among many others.

Cryptili
Cryptili is a lightweight Android app that allows you to encrypt/decrypt messages and send them through a different app.

ESI Linux
It is a linux distribution made for ESI-SBA students particularly, it provides all the necessary tools for their curriculum.
CSAW'19 CTF
My team (Sudo_root) and I won the second place at the Cyber Security Awareness Week CTF organised by New York University Abu Dhabi in the MENA region.
Deep Learning with Pytorch Challenge
Our Pneumonia Detector project got selected by Udacity and Facebook as the best healthcare project during the Deep Learning with PyTorch Challenge.
Hacklab CTF
My team (Sudo_root) and I won the fourth place during the Hacklab Capture the Flag competition held in ESGI Paris.
MLH Local Hack Day
I won the first place in the programming competition organized by AutoBot13 during the MLH Hack Day.


Ayoub B. is a very dedicated freelancer. There were a few technical difficulties on my side and he went out of his way to help me. He is very resourceful and patient in explaining the code at every stage. We were able to get the work done in time and I am rehiring him for my next projects.

Very positive experience with this developer. Definitely will ask his help again.

Excellent work done by Ayoub. He demonstrated his commitment to solve problems effectively and professionally I recommend him to the community.

I recommend Ayoub who is very serious in his work and who delivers the work very quickly
Latest Posts

Build an Homomorphic Encryption Scheme from Scratch with Python
This blog post aims at explaining the basic mathematical concepts behind most of today’s homomorphic encryption (HE) schemes, and then build upon this to implement our own scheme (similar to BFV) from scratch using Python.
Read more
Homomorphic Encryption Types
A previous post introduced homomorphic encryption (HE) and the challenges of applying it to deep learning. This post will dig into the three main types of HE schemes. We will first introduce the notion of a circuit, so that we can describe the properties of each type and differentiate between them.
Read more
Introduction to Homomorphic Encryption
This is the first of a series of blog posts about the use of homomorphic encryption for deep learning. Here I introduce the basics and terminology as well as link to external resources that might help with a deeper understanding of the topic.
Read more
CSAW'19 CTF Finals Writeup - Sharing is Caring
Cyber Security Awareness Worldwide is the most comprehensive student-run cyber security event in the world, featuring nine competitions, 6 global hosts, workshops, and industry events.
Read more
CSAW'19 CTF Quals Writeup - Fault Box
Cyber Security Awareness Worldwide is the most comprehensive student-run cyber security event in the world, featuring nine competitions, 6 global hosts, workshops, and industry events.
Read more
Understanding the Basics of Reinforcement Learning
We will start with the story of Agent-S, someone that never went to the beach before, one day he was put into the center of the ocean, he doesn’t have any prior knowledge of how to swim, but he is scary…
Read more
Hack PySyft - Find Bugs Before the Malicious Guys
On July 31st, 2019, Trask launched the Hack PySyft initiative, saying ‘Some day, when PySyft is deployed in production around the world, someone evil is going to try to hack PySyft and steal personal data…
Read more
MCTF Final 2019 Writeup - Back to the Old Ways
There is a group of hackers that we’ve been trying to take down for a while, we had a spy among them but his cover was compromised, but he managed to leak a piece of code…
Read more
Feature Extraction and Detection of Malwares Using Machine Learning
Malicious softwares, or malwares in short, represent a growing threat on the information systems worldwide. Throughout years cyber-security specialists have been using…
Read more
Tackle Today's IT Challenges with Docker
In the IT world, a software product generally goes through a Software Supply Chain, which is basically all the processes and methods used to deliver that product to the customers…
Read moreGet In Touch
Contact Details
I will be more than happy to discuss with you.
Ayoub gets the job done and has a huge potential.