Available for opportunities
HAO logo

HAO PORTFOLIO

Moving from "Passive Monitoring" to "Proactive Defence"

AI & Cybersecurity

Developing advanced ML models for spam detection, real-time intrusion detection systems (IDS), and fraud heuristics.

Full-Stack engineering

Building zero-trust Backend-for-Frontend (BFF) architectures and highly responsive web applications using React & Next.js.

Network Communications

Implementing robust server setups, edge computing integrations, and custom telemetry data pipelines.

Professional Profile

I am LOI CHIANG HAO

Cybersecurity & AI Developer | Full-Stack Engineer

Biography

I am a final-year Information Technology student at Universiti Tunku Abdul Rahman (UTAR), specializing in Communications and Networking, with a strong focus on AI-driven cybersecurity and secure system design. My work centers on building proactive, machine learning-powered defense systems and zero-trust full-stack architectures, integrating technologies such as RAG pipelines, intrusion detection, and real-time threat analysis to address modern security challenges beyond traditional approaches.

Core Skills & Specializations

CybersecurityArtificial IntelligenceReactJSNext.jsPythonMachine LearningSupabaseNetwork Forensics

Experience & Education

My academic and professional journey

IT Support Specialist (Internship)

Meteorsoft Sdn Bhd

Nov 2025 Jan 2026

Managed system deployments, customized business reports using DevExpress, supported server setups, and configured networking hardware. Provided direct on-site and remote client support for the Auto Power Suite (APS) ecosystem.

Current

Undergraduate IT Student

Universiti Tunku Abdul Rahman (UTAR)

Oct 2022 Present

Final year student (MUET Band: 4.0). Spearheading research in AI-powered Email Threat Detection systems and gaining hands-on expertise in digital forensics, ethical hacking, internetworking, and operating systems.

Featured Projects

Systems I've designed and built

HAO • PORTFOLIO (Secure AI Identity System)

A premium AI-native developer portfolio built with Next.js 16, Tailwind CSS v4, and Sanity, featuring HaoGPT—a custom assistant powered by a structured RAG pipeline for context-aware, verifiable responses. Designed on a zero-trust BFF architecture with multi-layer LLM security, it ensures strong API protection and resistance to prompt injection while maintaining high interactivity and control.

Next.js 16TypeScriptTailwind CSS v4Sanity CMSFramer MotionVercel AI SDKRAG Pipeline

Cloud-Based Distributed E-commerce Analytics Platform

A high-performance distributed e-commerce analytics platform built with Python, Streamlit, and Flask, featuring real-time data sharding across geographic nodes. Designed with a robust asynchronous aggregation engine (httpx + asyncio) and intelligent request routing, it ensures high availability and partial fault tolerance while seamlessly integrating with Supabase for cloud-native PostgreSQL data management.

Distributed SystemsStreamlitFlask REST APISupabase (PostgreSQL)Asyncio & HTTPXPlotly

Kedai Kopi Gedok Website & Management

A highly secure, full-stack landing page and admin system for a local F&B business. Engineered a zero-trust Backend-for-Frontend (BFF) architecture featuring stateful session revocation, global distributed rate-limiting, and AI-driven spam honeypots to neutralize CSRF, XSS, and bot attacks.

ReactJSSupabaseVercelFramer MotionSecurity HeadersStateful Security

AI-Powered Email Threat Detection Extension

Developed an AI defensive Chrome extension using a Multi-Layer Perceptron (MLP) and One-Class SVM. Fused Content Metrics with Network Forensics (SMTP/SPF) to preempt zero-day phishing mutations. Implemented SHAP for advanced Explainable AI.

PythonMachine LearningScikit-LearnChrome ExtensionForensics

TrustGuard AI Fraud Detection

Built for the V HACK 2026 Hackathon. A hybrid fraud detection platform combining XGBoost ML models and Behavioral Heuristics to secure digital wallets. Features geospatial monitoring and neural network relationship graphing.

XGBoostPythonFastAPIData Analysis

Aegis Edge — Intrusion Detection System

A lightweight, AI-driven IDS engineered to operate dynamically on edge computing nodes. Analyzes network traffic anomalies in real-time, leveraging decentralized Cloud logic to asynchronously sync threat intelligence.

PythonNetworkingMachine LearningJSON Telemetry

Smart Factory Simulation & IIoT Dashboard

Designed a comprehensive Smart Factory Simulation using Node-RED to replicate manufacturing lifecycles with real-time logic control, inventory management, SVG interactive dashboards, and IIoT MQTT telemetry.

Node-REDIoTJavaScriptMQTT

NeighborLink: Community Resource Sharing App

Developed a native Android application using Kotlin and MVVM architecture to facilitate sustainable community resource sharing. Features RESTful API integration, offline-first smart caching, and a gamified Credit-Based Reputation System.

AndroidKotlinMVVMRetrofitREST API

Cybersecurity Threat Analysis & Defense

Co-authored a comprehensive cybersecurity analysis report focusing on offensive penetration testing and defensive countermeasures against vectors like Ransomware and Social Engineering (Phishing).

CybersecuritySocial EngineeringMetasploitSnort IDS

Certifications

Continuous learning & validation

Generative AI/LLM Concepts

Alibaba Cloud

ISC2 Candidate

ISC2

Gemini for Data Scientists and Analysts

Google

Connect and Protect: Network Security

Google Cloud

Responsible AI for Developers

Google Cloud

Level 1 TRIZ Practitioner

International Triz Association

Cybersecurity Job Simulation

Mastercard & Datacom