Hello, and welcome to my personal website. I am a Senior Software Engineer at Google Research currently focusing on topics related to large-scale and privacy-safe information extraction, data management systems, and applied ML. Prior to joining Google, I earned my Ph.D. at UCLA under the guidance of Miodrag Potkonjak, where I explored methods for hardware security and low power design.
You can find more information about me and my work below and at the following links.
Topics include privacy-safe information extraction, data management systems, and applied machine learning.
B. P. Majumder, N. Potti, S. Tata, J. B. Wendt, Q. Zhao, and M. Najork, “Representation Learning for Information Extraction from Form-like Documents,” to appear in the Annual Conference of the Association for Computational Linguistics (ACL), 2020.
M. Whittaker, N. Edmonds, S. Tata, J. B. Wendt, and M. Najork, “Online Template Induction for Machine-Generated Emails,” Proceedings of the International Conference on Very Large Databases (VLDB), pp. 1235-1248, 2019.
F. Kocayusufoglu, Y. Sheng, N. Vo, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “RiSER: Learning Better Representations for Richly Structured Emails,” Proceedings of the World Wide Web Conference (WWW), pp. 886-895, 2019.
Y. Sun, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Learning Effective Embeddings for Machine Generated Emails with Applications to Email Category Prediction,” Proceedings of the IEEE International Conference on Big Data, pp. 1846-1855, 2018.
Y. Sheng, S. Tata, J. B. Wendt, J. Xie, Q. Zhao, and M. Najork, “Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email,” Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), pp. 734-743, 2018.
N. Potti, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “Hidden in Plain Sight: Classifying Emails Using Embedded Image Contents,” Proceedings of the World Wide Web Conference (WWW), pp. 1865-1874, 2018.
J. Proskurnia, M.-A. Cartright, L. Garcia-Pueyo, I.Krka, J. B. Wendt, T. Kaufmann, and B. Miklos, “Template Induction over Unstructured Email Corpora,” Proceedings of the World Wide Web Conference (WWW), pp. 1521-1530, 2017.
J. B. Wendt, M. Bendersky, L. Garcia-Pueyo, V. Josifovski, B. Miklos, I. Krka, A. Saikia, J. Yang, M.-C. Cartright, and S. Ravi, “Hierarchical Label Propagation and Discovery for Machine Generated Email,” Proceedings of the International Conference on Web Search and Data Mining (WSDM), pp. 317-326, 2016.
Topics include hardware security and low power system and integrated circuit design.
J. Guo, J. B. Wendt, and M. Potkonjak, “Learning-Based Localized Offloading with Resource-Constrained Data Centers,” International Conference on Cloud and Autonomic Computing (ICCAC), pp. 212-215, 2015.
J. Rajendran, R. Karri, J. B. Wendt, M. Potkonjak, N. McDonald, G. S. Rose, and B. Wysocki, “Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications,” Proceedings of the IEEE, vol. 103, no. 5, pp. 829-849, 2015.
J. B. Wendt, N. A. Conos, and M. Potkonjak, “Multiple Constant Multiplication Implementations in Near-Threshold Computing Systems,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1071-1075, 2015.
T. Xu, J. B. Wendt, and M. Potkonjak, “Secure Remote Sensing and Communication using Digital PUFs,” ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 173-184, 2014.
S. Wei, J. B. Wendt, A. Nahapetian, and M. Potkonjak, “Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels,” ACM/IEEE Design Automation Conference (DAC), no. 90, pp. 1-6, 2014. Nominated for Best Paper Award.
M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar, “Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security,” Design, Automation & Test in Europe (DATE), no. 352, pp. 1-6, 2014.
V. Goudar, J. B. Wendt, M. Potkonjak, Z. Ren, P. Brochu, and Q. Pei, “Leveraging Human Gait Characteristics Towards Self-Sustained Operation of Low-Power Mobile Devices,” IEEE World Forum on Internet of Things (WF-IoT), pp. 468-473, 2014.
J. B. Wendt and M. Potkonjak, “The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive,” IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 257-260, 2013.
T. Xu, J. B. Wendt, and M. Potkonjak, “Digital Bimodal Function: An Ultra-Low Energy Security Primitive,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 292-297, 2013.
J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Semantics-driven Sensor Configuration for Energy Reduction in Medical Sensor Networks,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 303-308, 2012.
J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression,” Data Compression Conference (DCC), p. 411, 2012.
S. Meguerdichian, J. B. Wendt, and M. Potkonjak, “Simultaneous Trust and Privacy in Medical Systems using Public Physical Unclonable Functions,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 679-698, CRC Press, 2013.