Hello, and welcome to my personal site. I am a Staff Software Engineer at Google DeepMind currently focusing on improving the capabilities of large generative models related to structural data understanding. Previously, I was at Google Research where I focused on topics related to low-resource information extraction, semi-supervised learning, and data management and quality. My prior work also included developing large scale privacy-safe information extraction and data management systems for private corpora. Prior to joining Google, I earned my Ph.D. at UCLA under the guidance of Miodrag Potkonjak, where I explored methods for hardware security and low power circuit and system design.
You can find more information about me and my work below and at the following links.
Work done while at Google.
🔗 E. Hwang, Y. Zhou, J. B. Wendt, B. Gunel, N. Vo, S. Tata, “Enhancing Incremental Summarization with Structured Representations,” arXiv preprint 2407.15021, 2024.
🔗 E. Hwang, Y. Zhou, B. Gunel, J. B. Wendt, S. Tata, “SUMIE: A Synthetic Benchmark for Incremental Entity Summarization,” arXiv preprint 2406.05079, 2024.
🔗 B. Gunel, J. B. Wendt, J. Xie, Y. Zhou, N. Vo, Z. Fisher, S. Tata, “STRUM-LLM: Attributed and Structured Contrastive Summarization,” arXiv preprint 2403.19710, 2024.
J. Xie, J. B. Wendt, Y. Zhou, S. Ebner, S. Tata, “FieldSwap: Data Augmentation for Effective Form-Like Document Extraction,” Proceedings of the International Conference on Data Engineering (ICDE), pp. 4722-4732, 2024.
🔗 Y. Zhou, J. B. Wendt, N. Potti, J. Xie, S. Tata, “Selective Labeling: How to Radically Lower Data-Labeling Costs for Document Extraction Models,” Proceedings of the Conference on Empircal Methods in Natural Language Processing (EMNLP), pp. 3847-3860, 2023.
🔗 Y. Zhou, J. B. Wendt, N. Potti, J. Xie, S. Tata, “Radically Lower Data-Labeling Costs for Document Extraction Models with Selective Labeling,” Proceedings of the DataPerf Workshop at ICML, 2022.
B. Gunel, N. Potti, S. Tata, J. B. Wendt, M. Najork, J. Xie, “Data-Efficient Information Extraction from Form-Like Documents,” Proceedings of the Document Intelligence Workshop at KDD, 2021.
S. Tata, N. Potti, J. B. Wendt, L. B. Costa, M. Najork, and B. Gunel, “Glean: Structured Extractions from Templatic Documents,” Proceedings of the International Conference on Very Large Databases (VLDB), vol. 14, iss. 6, pp. 997-1005, 2021.
🔗 B. P. Majumder, N. Potti, S. Tata, J. B. Wendt, Q. Zhao, and M. Najork, “Representation Learning for Information Extraction from Form-like Documents,” Proceedings of the Annual Meeting of the Association for Computational Linguistics (ACL), pp. 6495-6504, 2020.
🔗 Y. Sheng, N. Vo, J. B. Wendt, S. Tata, and M. Najork, “Migrating a Privacy-Safe Information Extraction System to a Software 2.0 Design,” Conference on Innovative Data Systems Research (CIDR), 2020.
M. Whittaker, N. Edmonds, S. Tata, J. B. Wendt, and M. Najork, “Online Template Induction for Machine-Generated Emails,” Proceedings of the International Conference on Very Large Databases (VLDB), vol. 12, iss. 11, pp. 1235-1248, 2019.
F. Kocayusufoglu, Y. Sheng, N. Vo, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “RiSER: Learning Better Representations for Richly Structured Emails,” Proceedings of the World Wide Web Conference (WWW), pp. 886-895, 2019.
Y. Sun, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Learning Effective Embeddings for Machine Generated Emails with Applications to Email Category Prediction,” Proceedings of the IEEE International Conference on Big Data, pp. 1846-1855, 2018.
Y. Sheng, S. Tata, J. B. Wendt, J. Xie, Q. Zhao, and M. Najork, “Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email,” Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), pp. 734-743, 2018.
N. Potti, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “Hidden in Plain Sight: Classifying Emails Using Embedded Image Contents,” Proceedings of the World Wide Web Conference (WWW), pp. 1865-1874, 2018.
A. Zhang, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Email Category Prediction,” Companion Proceedings of the World Wide Web Conference (WWW), pp. 495-503, 2017.
J. Proskurnia, M.-A. Cartright, L. Garcia-Pueyo, I.Krka, J. B. Wendt, T. Kaufmann, and B. Miklos, “Template Induction over Unstructured Email Corpora,” Proceedings of the World Wide Web Conference (WWW), pp. 1521-1530, 2017.
J. B. Wendt, M. Bendersky, L. Garcia-Pueyo, V. Josifovski, B. Miklos, I. Krka, A. Saikia, J. Yang, M.-C. Cartright, and S. Ravi, “Hierarchical Label Propagation and Discovery for Machine Generated Email,” Proceedings of the International Conference on Web Search and Data Mining (WSDM), pp. 317-326, 2016.
Work done while at UCLA.
J. Guo, J. B. Wendt, and M. Potkonjak, “Learning-Based Localized Offloading with Resource-Constrained Data Centers,” International Conference on Cloud and Autonomic Computing (ICCAC), pp. 212-215, 2015.
J. Rajendran, R. Karri, J. B. Wendt, M. Potkonjak, N. McDonald, G. S. Rose, and B. Wysocki, “Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications,” Proceedings of the IEEE, vol. 103, no. 5, pp. 829-849, 2015.
J. B. Wendt, N. A. Conos, and M. Potkonjak, “Multiple Constant Multiplication Implementations in Near-Threshold Computing Systems,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1071-1075, 2015.
T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT Systems: Design Challenges and Opportunities,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 417-423, 2014.
J. B. Wendt and M. Potkonjak, “Hardware Obfuscation using PUF-based Logic,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 270-277, 2014.
T. Xu, J. B. Wendt, and M. Potkonjak, “Ultra-lightweight Symmetric-key Cipher for Resource Constrained Systems,” IEEE Sensors, pp. 1252-1255, 2014.
T. Xu, J. B. Wendt, and M. Potkonjak, “Secure Remote Sensing and Communication using Digital PUFs,” ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 173-184, 2014.
T. Xu, J. B. Wendt, and M. Potkonjak, “Matched Digital PUFs for Low Power Security in Implantable Medical Devices,” IEEE International Conference on Healthcare Informatics (ICHI), pp. 33-38, 2014.
J. B. Wendt, F. Koushanfar, and M. Potkonjak, “Techniques for Foundry Identification,” ACM/IEEE Design Automation Conference (DAC), no. 208, pp. 1-6, 2014.
S. Wei, J. B. Wendt, A. Nahapetian, and M. Potkonjak, “Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels,” ACM/IEEE Design Automation Conference (DAC), no. 90, pp. 1-6, 2014. Nominated for Best Paper Award.
M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar, “Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security,” Design, Automation & Test in Europe (DATE), no. 352, pp. 1-6, 2014.
V. Goudar, J. B. Wendt, M. Potkonjak, Z. Ren, P. Brochu, and Q. Pei, “Leveraging Human Gait Characteristics Towards Self-Sustained Operation of Low-Power Mobile Devices,” IEEE World Forum on Internet of Things (WF-IoT), pp. 468-473, 2014.
J. B. Wendt and M. Potkonjak, “The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive,” IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 257-260, 2013.
J. B. Wendt and M. Potkonjak, “Improving Energy Efficiency in Sensing Subsystems via Near-Threshold Computing and Device Aging,” IEEE Sensors, pp. 555-558, 2013.
T. Xu, J. B. Wendt, and M. Potkonjak, “Digital Bimodal Function: An Ultra-Low Energy Security Primitive,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 292-297, 2013.
J. B. Wendt, V. Goudar, H. Noshadi, and M. Potkonjak, “Spatiotemporal Assignment of Energy Harvesters on a Self-Sustaining Medical Shoe,” IEEE Sensors, pp. 1312-1315, 2012.
J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Semantics-driven Sensor Configuration for Energy Reduction in Medical Sensor Networks,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 303-308, 2012.
J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression,” Data Compression Conference (DCC), p. 411, 2012.
J. B. Wendt and M. Potkonjak, “Nanotechnology-Based Trusted Remote Sensing,” IEEE Sensors, pp. 1213-1216, 2011.
J. B. Wendt and M. Potkonjak, “Medical Diagnostic-Based Sensor Selection,” IEEE Sensors, pp. 1507-1510, 2011.
J. B. Wendt, S. Meguerdichian, and M. Potkonjak, “Small is Beautiful and Smart,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 341-358, CRC Press, 2013.
S. Meguerdichian, J. B. Wendt, and M. Potkonjak, “Simultaneous Trust and Privacy in Medical Systems using Public Physical Unclonable Functions,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 679-698, CRC Press, 2013.
Work done while an intern in the Geophysics department at UC Riverside.