James B. Wendt

me

Hello, and welcome to my personal site. I am a Staff Software Engineer at Google DeepMind currently focusing on improving the capabilities of large generative models related to structural data understanding. Previously, I was at Google Research where I focused on topics related to low-resource information extraction, semi-supervised learning, and data management and quality. My prior work also included developing large scale privacy-safe information extraction and data management systems for private corpora. Prior to joining Google, I earned my Ph.D. at UCLA under the guidance of Miodrag Potkonjak, where I explored methods for hardware security and low power circuit and system design.

You can find more information about me and my work below and at the following links.

Publications

Generative AI, Information Extraction, Data Management Systems, Applied ML

Work done while at Google.

  1. pdf 🔗 E. Hwang, Y. Zhou, J. B. Wendt, B. Gunel, N. Vo, S. Tata, “Enhancing Incremental Summarization with Structured Representations,” arXiv preprint 2407.15021, 2024.

  2. pdf 🔗 E. Hwang, Y. Zhou, B. Gunel, J. B. Wendt, S. Tata, “SUMIE: A Synthetic Benchmark for Incremental Entity Summarization,” arXiv preprint 2406.05079, 2024.

  3. pdf 🔗 B. Gunel, J. B. Wendt, J. Xie, Y. Zhou, N. Vo, Z. Fisher, S. Tata, “STRUM-LLM: Attributed and Structured Contrastive Summarization,” arXiv preprint 2403.19710, 2024.

  4. pdf doi J. Xie, J. B. Wendt, Y. Zhou, S. Ebner, S. Tata, “FieldSwap: Data Augmentation for Effective Form-Like Document Extraction,” Proceedings of the International Conference on Data Engineering (ICDE), pp. 4722-4732, 2024.

  5. pdf 🔗 Y. Zhou, J. B. Wendt, N. Potti, J. Xie, S. Tata, “Selective Labeling: How to Radically Lower Data-Labeling Costs for Document Extraction Models,” Proceedings of the Conference on Empircal Methods in Natural Language Processing (EMNLP), pp. 3847-3860, 2023.

  6. 🔗 Y. Zhou, J. B. Wendt, N. Potti, J. Xie, S. Tata, “Radically Lower Data-Labeling Costs for Document Extraction Models with Selective Labeling,” Proceedings of the DataPerf Workshop at ICML, 2022.

  7. pdf B. Gunel, N. Potti, S. Tata, J. B. Wendt, M. Najork, J. Xie, “Data-Efficient Information Extraction from Form-Like Documents,” Proceedings of the Document Intelligence Workshop at KDD, 2021.

  8. pdf doi S. Tata, N. Potti, J. B. Wendt, L. B. Costa, M. Najork, and B. Gunel, “Glean: Structured Extractions from Templatic Documents,” Proceedings of the International Conference on Very Large Databases (VLDB), vol. 14, iss. 6, pp. 997-1005, 2021.

  9. pdf 🔗 B. P. Majumder, N. Potti, S. Tata, J. B. Wendt, Q. Zhao, and M. Najork, “Representation Learning for Information Extraction from Form-like Documents,” Proceedings of the Annual Meeting of the Association for Computational Linguistics (ACL), pp. 6495-6504, 2020.

  10. pdf 🔗 Y. Sheng, N. Vo, J. B. Wendt, S. Tata, and M. Najork, “Migrating a Privacy-Safe Information Extraction System to a Software 2.0 Design,” Conference on Innovative Data Systems Research (CIDR), 2020.

  11. pdf doi M. Whittaker, N. Edmonds, S. Tata, J. B. Wendt, and M. Najork, “Online Template Induction for Machine-Generated Emails,” Proceedings of the International Conference on Very Large Databases (VLDB), vol. 12, iss. 11, pp. 1235-1248, 2019.

  12. pdf doi F. Kocayusufoglu, Y. Sheng, N. Vo, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “RiSER: Learning Better Representations for Richly Structured Emails,” Proceedings of the World Wide Web Conference (WWW), pp. 886-895, 2019.

  13. pdf doi Y. Sun, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Learning Effective Embeddings for Machine Generated Emails with Applications to Email Category Prediction,” Proceedings of the IEEE International Conference on Big Data, pp. 1846-1855, 2018.

  14. pdf doi Y. Sheng, S. Tata, J. B. Wendt, J. Xie, Q. Zhao, and M. Najork, “Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email,” Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), pp. 734-743, 2018.

  15. pdf doi N. Potti, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “Hidden in Plain Sight: Classifying Emails Using Embedded Image Contents,” Proceedings of the World Wide Web Conference (WWW), pp. 1865-1874, 2018.

  16. pdf doi A. Zhang, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Email Category Prediction,” Companion Proceedings of the World Wide Web Conference (WWW), pp. 495-503, 2017.

  17. pdf doi J. Proskurnia, M.-A. Cartright, L. Garcia-Pueyo, I.Krka, J. B. Wendt, T. Kaufmann, and B. Miklos, “Template Induction over Unstructured Email Corpora,” Proceedings of the World Wide Web Conference (WWW), pp. 1521-1530, 2017.

  18. pdf doi J. B. Wendt, M. Bendersky, L. Garcia-Pueyo, V. Josifovski, B. Miklos, I. Krka, A. Saikia, J. Yang, M.-C. Cartright, and S. Ravi, “Hierarchical Label Propagation and Discovery for Machine Generated Email,” Proceedings of the International Conference on Web Search and Data Mining (WSDM), pp. 317-326, 2016.

Hardware Security, Low Power System and Integrated Circuit Design

Work done while at UCLA.

  1. pdf doi J. Guo, J. B. Wendt, and M. Potkonjak, “Learning-Based Localized Offloading with Resource-Constrained Data Centers,” International Conference on Cloud and Autonomic Computing (ICCAC), pp. 212-215, 2015.

  2. pdf doi J. Rajendran, R. Karri, J. B. Wendt, M. Potkonjak, N. McDonald, G. S. Rose, and B. Wysocki, “Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications,” Proceedings of the IEEE, vol. 103, no. 5, pp. 829-849, 2015.

  3. pdf doi J. B. Wendt, N. A. Conos, and M. Potkonjak, “Multiple Constant Multiplication Implementations in Near-Threshold Computing Systems,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1071-1075, 2015.

  4. pdf doi T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT Systems: Design Challenges and Opportunities,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 417-423, 2014.

  5. pdf doi J. B. Wendt and M. Potkonjak, “Hardware Obfuscation using PUF-based Logic,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 270-277, 2014.

  6. pdf doi T. Xu, J. B. Wendt, and M. Potkonjak, “Ultra-lightweight Symmetric-key Cipher for Resource Constrained Systems,” IEEE Sensors, pp. 1252-1255, 2014.

  7. pdf doi T. Xu, J. B. Wendt, and M. Potkonjak, “Secure Remote Sensing and Communication using Digital PUFs,” ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 173-184, 2014.

  8. pdf doi T. Xu, J. B. Wendt, and M. Potkonjak, “Matched Digital PUFs for Low Power Security in Implantable Medical Devices,” IEEE International Conference on Healthcare Informatics (ICHI), pp. 33-38, 2014.

  9. pdf doi J. B. Wendt, F. Koushanfar, and M. Potkonjak, “Techniques for Foundry Identification,” ACM/IEEE Design Automation Conference (DAC), no. 208, pp. 1-6, 2014.

  10. pdf doi S. Wei, J. B. Wendt, A. Nahapetian, and M. Potkonjak, “Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels,” ACM/IEEE Design Automation Conference (DAC), no. 90, pp. 1-6, 2014. Nominated for Best Paper Award.

  11. pdf doi M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar, “Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security,” Design, Automation & Test in Europe (DATE), no. 352, pp. 1-6, 2014.

  12. pdf doi V. Goudar, J. B. Wendt, M. Potkonjak, Z. Ren, P. Brochu, and Q. Pei, “Leveraging Human Gait Characteristics Towards Self-Sustained Operation of Low-Power Mobile Devices,” IEEE World Forum on Internet of Things (WF-IoT), pp. 468-473, 2014.

  13. pdf doi J. B. Wendt and M. Potkonjak, “The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive,” IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 257-260, 2013.

  14. pdf J. B. Wendt and M. Potkonjak, “Improving Energy Efficiency in Sensing Subsystems via Near-Threshold Computing and Device Aging,” IEEE Sensors, pp. 555-558, 2013.

  15. pdf doi T. Xu, J. B. Wendt, and M. Potkonjak, “Digital Bimodal Function: An Ultra-Low Energy Security Primitive,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 292-297, 2013.

  16. pdf doi J. B. Wendt, V. Goudar, H. Noshadi, and M. Potkonjak, “Spatiotemporal Assignment of Energy Harvesters on a Self-Sustaining Medical Shoe,” IEEE Sensors, pp. 1312-1315, 2012.

  17. pdf doi J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Semantics-driven Sensor Configuration for Energy Reduction in Medical Sensor Networks,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 303-308, 2012.

  18. pdf doi J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression,” Data Compression Conference (DCC), p. 411, 2012.

  19. pdf doi J. B. Wendt and M. Potkonjak, “Nanotechnology-Based Trusted Remote Sensing,” IEEE Sensors, pp. 1213-1216, 2011.

  20. pdf doi J. B. Wendt and M. Potkonjak, “Medical Diagnostic-Based Sensor Selection,” IEEE Sensors, pp. 1507-1510, 2011.

Book Chapters

  1. doi J. B. Wendt, S. Meguerdichian, and M. Potkonjak, “Small is Beautiful and Smart,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 341-358, CRC Press, 2013.

  2. doi S. Meguerdichian, J. B. Wendt, and M. Potkonjak, “Simultaneous Trust and Privacy in Medical Systems using Public Physical Unclonable Functions,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 679-698, CRC Press, 2013.

Earthquake and Tsunami Simulation

Work done while an intern in the Geophysics department at UC Riverside.

  1. pdf doi J. Wendt, D. D. Oglesby, and E. L. Geist, “Tsunamis and Splay Fault Dynamics,” Geophysical Research Letters, vol. 36, no. 15, 2009.

Patents

Service