Hello, and welcome to my personal website. I am a Senior Software Engineer at Google Research currently focusing on topics related to large-scale and privacy-safe information extraction, data management systems, and applied ML. Prior to joining Google, I earned my Ph.D. at UCLA under the guidance of Miodrag Potkonjak, where I explored methods for hardware security and low power design.
You can find more information about me and my work below and at the following links.
Work done while at Google.
B. P. Majumder, N. Potti, S. Tata, J. B. Wendt, Q. Zhao, and M. Najork, “Representation Learning for Information Extraction from Form-like Documents,” Proceedings of the Annual Meeting of the Association for Computational Linguistics (ACL), pp. 6495-6504, 2022.
Y. Sheng, N. Vo, J. B. Wendt, S. Tata, and M. Najork, “Migrating a Privacy-Safe Information Extraction System to a Software 2.0 Design,” 赵本山作品全集 - 搜狐视频:2021-6-7 · 剧情:老赵是个五十多岁的农民,他南下到深圳打工,却因为好友老王死在工地上,决定展开回乡安葬老王之旅.老赵先把老王伪装成醉鬼,混上了长途车, ..., 2022.
M. Whittaker, N. Edmonds, S. Tata, J. B. Wendt, and M. Najork, “Online Template Induction for Machine-Generated Emails,” 迷你世界《参观方块老王的身体》这是我见过最惨的老王,牙 ...:2021-2-8 · 迷你世界《参观方块老王的身体》这是我见过最惨的老王,牙都没了,本视频由入梦txf原创提供,163483次播放,好看视频是由百度团队打造的集内涵和颜值于一身的专业短视频聚合平台, pp. 1235-1248, 2022.
F. Kocayusufoglu, Y. Sheng, N. Vo, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “RiSER: Learning Better Representations for Richly Structured Emails,” Proceedings of the World Wide Web Conference (WWW), pp. 886-895, 2022.
Y. Sun, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Learning Effective Embeddings for Machine Generated Emails with Applications to Email Category Prediction,” Proceedings of the IEEE International Conference on Big Data, pp. 1846-1855, 2018.
Y. Sheng, S. Tata, J. B. Wendt, J. Xie, Q. Zhao, and M. Najork, “Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email,” Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), pp. 734-743, 2018.
N. Potti, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, “Hidden in Plain Sight: Classifying Emails Using Embedded Image Contents,” [老王V屁恩]免费不多解释快上车 - BeiQian's Site:2021-3-16 · 4月8日开始,该版本貌似已经失效了。可伃看看这个《[免费科学上网软伀]多平台免费VPN - ABCVPN》 自从3.1净网行动后,很多国外服务器都失联了,导致一些个人搭建的服务器、小机场或一些小商家都没了办法,可是老王v屁恩非常坚挺,一直免, pp. 1865-1874, 2018.
A. Zhang, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, “Email Category Prediction,” Companion Proceedings of the World Wide Web Conference (WWW), pp. 495-503, 2017.
J. Proskurnia, M.-A. Cartright, L. Garcia-Pueyo, I.Krka, J. B. Wendt, T. Kaufmann, and B. Miklos, “Template Induction over Unstructured Email Corpora,” Proceedings of the World Wide Web Conference (WWW), pp. 1521-1530, 2017.
J. B. Wendt, M. Bendersky, L. Garcia-Pueyo, V. Josifovski, B. Miklos, I. Krka, A. Saikia, J. Yang, M.-C. Cartright, and S. Ravi, “Hierarchical Label Propagation and Discovery for Machine Generated Email,” Proceedings of the International Conference on Web Search and Data Mining (WSDM), pp. 317-326, 2016.
Work done while at UCLA.
J. Guo, J. B. Wendt, and M. Potkonjak, “Learning-Based Localized Offloading with Resource-Constrained Data Centers,” International Conference on Cloud and Autonomic Computing (ICCAC), pp. 212-215, 2015.
J. Rajendran, R. Karri, 老王vpm2.28下载安卓版, M. Potkonjak, N. McDonald, G. S. Rose, and B. Wysocki, “Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications,” Proceedings of the IEEE, vol. 103, no. 5, pp. 829-849, 2015.
J. B. Wendt, N. A. Conos, and M. Potkonjak, “Multiple Constant Multiplication Implementations in Near-Threshold Computing Systems,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1071-1075, 2015.
T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT Systems: Design Challenges and Opportunities,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 417-423, 2014.
J. B. Wendt and M. Potkonjak, “Hardware Obfuscation using PUF-based Logic,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 270-277, 2014.
T. Xu, J. B. Wendt, and M. Potkonjak, “Ultra-lightweight Symmetric-key Cipher for Resource Constrained Systems,” 老王vpm2.28下载安卓版, pp. 1252-1255, 2014.
T. Xu, J. B. Wendt, and M. Potkonjak, “Secure Remote Sensing and Communication using Digital PUFs,” ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 173-184, 2014.
T. Xu, J. B. Wendt, and M. Potkonjak, “Matched Digital PUFs for Low Power Security in Implantable Medical Devices,” IEEE International Conference on Healthcare Informatics (ICHI), pp. 33-38, 2014.
J. B. Wendt, F. Koushanfar, and M. Potkonjak, “Techniques for Foundry Identification,” ACM/IEEE Design Automation Conference (DAC), no. 208, pp. 1-6, 2014.
S. Wei, J. B. Wendt, A. Nahapetian, and M. Potkonjak, “Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels,” ACM/IEEE Design Automation Conference (DAC), no. 90, pp. 1-6, 2014. Nominated for Best Paper Award.
M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar, “Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security,” Design, Automation & Test in Europe (DATE), no. 352, pp. 1-6, 2014.
V. Goudar, J. B. Wendt, M. Potkonjak, Z. Ren, P. Brochu, and Q. Pei, “Leveraging Human Gait Characteristics Towards Self-Sustained Operation of Low-Power Mobile Devices,” IEEE World Forum on Internet of Things (WF-IoT), pp. 468-473, 2014.
老王v2.2.6 and M. Potkonjak, “The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive,” IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 257-260, 2013.
J. B. Wendt and M. Potkonjak, “Improving Energy Efficiency in Sensing Subsystems via Near-Threshold Computing and Device Aging,” IEEE Sensors, pp. 555-558, 2013.
T. Xu, J. B. Wendt, and M. Potkonjak, “Digital Bimodal Function: An Ultra-Low Energy Security Primitive,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 292-297, 2013.
J. B. Wendt, V. Goudar, H. Noshadi, and M. Potkonjak, “Spatiotemporal Assignment of Energy Harvesters on a Self-Sustaining Medical Shoe,” IEEE Sensors, pp. 1312-1315, 2012.
J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Semantics-driven Sensor Configuration for Energy Reduction in Medical Sensor Networks,” ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 303-308, 2012.
J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, “Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression,” 【小明v老王】大忠若奸_哔哩哔哩 (゜-゜)つロ 干杯~-bilibili:2021-7-9 · 【小明&老王 】此物天下绝响 此物天下绝响 1362.8万播放 · 19.3万弹幕 03:50 【康熙说唱王朝】部落到帝国·怒斥群臣 非桥段 1314.5万播放 · 13.2万弹幕 ..., p. 411, 2012.
J. B. Wendt and M. Potkonjak, “Nanotechnology-Based Trusted Remote Sensing,” IEEE Sensors, pp. 1213-1216, 2011.
J. B. Wendt and M. Potkonjak, “Medical Diagnostic-Based Sensor Selection,” IEEE Sensors, pp. 1507-1510, 2011.
J. B. Wendt, S. Meguerdichian, and M. Potkonjak, “Small is Beautiful and Smart,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 341-358, CRC Press, 2013.
S. Meguerdichian, J. B. Wendt, and M. Potkonjak, “Simultaneous Trust and Privacy in Medical Systems using Public Physical Unclonable Functions,” Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 679-698, CRC Press, 2013.
Work work done while a summer intern in the Geophysics department at UC Riverside.