James B. Wendt

James is a Senior Software Engineer in the Strategic Technologies group at Google Research, working on large-scale machine-learned information extraction. He earned his Ph.D. at UCLA under the guidance of Miodrag Potkonjak. You can find more information about James and his work below.

Publications @ Google

  1. Y. Sun, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, "Learning Effective Embeddings for Machine Generated Emails with Applications to Email Category Prediction," to appear in Proceedings of the IEEE International Conference on Big Data, 2018.
  2. Y. Sheng, S. Tata, J. B. Wendt, J. Xie, Q. Zhao, and M. Najork, "Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email," Proceedings of the International Conference on Knowledge Discovery and Data Mining (KDD), pp. 734-743, 2018.
  3. N. Potti, J. B. Wendt, Q. Zhao, S. Tata, and M. Najork, "Hidden in Plain Sight: Classifying Emails Using Embedded Image Contents," Proceedings of the World Wide Web Conference (WWW), pp. 1865-1874, 2018.
  4. A. Zhang, L. Garcia-Pueyo, J. B. Wendt, M. Najork, and A. Broder, "Email Category Prediction," Companion Proceedings of the World Wide Web Conference (WWW), pp. 495-503, 2017.
  5. J. Proskurnia, M.-A. Cartright, L. Garcia-Pueyo, I.Krka, J. B. Wendt, T. Kaufmann, and B. Miklos, "Template Induction over Unstructured Email Corpora," Proceedings of the World Wide Web Conference (WWW), pp. 1521-1530, 2017.
  6. J. B. Wendt, M. Bendersky, L. Garcia-Pueyo, V. Josifovski, B. Miklos, I. Krka, A. Saikia, J. Yang, M.-C. Cartright, and S. Ravi, "Hierarchical Label Propagation and Discovery for Machine Generated Email," Proceedings of the International Conference on Web Search and Data Mining (WSDM), pp. 317-326, 2016.

Publications @ UCLA

  1. J. Rajendran, R. Karri, J. B. Wendt, M. Potkonjak, N. McDonald, G. S. Rose, and B. Wysocki, "Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications," Proceedings of the IEEE, vol. 103, no. 5, pp. 829-849, 2015.
  2. J. B. Wendt, N. A. Conos, and M. Potkonjak, "Multiple Constant Multiplication Implementations in Near-Threshold Computing Systems," IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1071-1075, 2015.
  3. T. Xu, J. B. Wendt, and M. Potkonjak, "Security of IoT Systems: Design Challenges and Opportunities," IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 417-423, 2014.
  4. pp.
  5. J. B. Wendt and M. Potkonjak, "Hardware Obfuscation using PUF-based Logic," IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 270-277, 2014.
  6. T. Xu, J. B. Wendt, and M. Potkonjak, "Ultra-lightweight Symmetric-key Cipher for Resource Constrained Systems," IEEE Sensors, pp. 1252-1255, 2014.
  7. T. Xu, J. B. Wendt, and M. Potkonjak, "Secure Remote Sensing and Communication using Digital PUFs," ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 173-184, 2014.
  8. T. Xu, J. B. Wendt, and M. Potkonjak, "Matched Digital PUFs for Low Power Security in Implantable Medical Devices," IEEE International Conference on Healthcare Informatics (ICHI), pp. 33-38, 2014.
  9. J. B. Wendt, F. Koushanfar, and M. Potkonjak, "Techniques for Foundry Identification," ACM/IEEE Design Automation Conference (DAC), no. 208, pp. 1-6, 2014.
  10. S. Wei, J. B. Wendt, A. Nahapetian, and M. Potkonjak, "Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels," ACM/IEEE Design Automation Conference (DAC), no. 90, pp. 1-6, 2014. Nominated for Best Paper Award.
  11. M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar, "Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security," Design, Automation & Test in Europe (DATE), no. 352, pp. 1-6, 2014.
  12. V. Goudar, J. B. Wendt, M. Potkonjak, Z. Ren, P. Brochu, and Q. Pei, "Leveraging Human Gait Characteristics Towards Self-Sustained Operation of Low-Power Mobile Devices," IEEE World Forum on Internet of Things (WF-IoT), pp. 468-473, 2014.
  13. J. B. Wendt and M. Potkonjak, "The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive," IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 257-260, 2013.
  14. J. B. Wendt and M. Potkonjak, "Improving Energy Efficiency in Sensing Subsystems via Near-Threshold Computing and Device Aging," IEEE Sensors, pp. 555-558, 2013.
  15. T. Xu, J. B. Wendt, and M. Potkonjak, "Digital Bimodal Function: An Ultra-Low Energy Security Primitive," ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 292-297, 2013.
  16. J. B. Wendt, V. Goudar, H. Noshadi, and M. Potkonjak, "Spatiotemporal Assignment of Energy Harvesters on a Self-Sustaining Medical Shoe," IEEE Sensors, pp. 1312-1315, 2012.
  17. J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, "Semantics-driven Sensor Configuration for Energy Reduction in Medical Sensor Networks," ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 303-308, 2012.
  18. J. B. Wendt, S. Meguerdichian, H. Noshadi, and M. Potkonjak, "Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression," Data Compression Conference (DCC), p. 411, 2012.
  19. J. B. Wendt and M. Potkonjak, "Nanotechnology-Based Trusted Remote Sensing," IEEE Sensors, pp. 1213-1216, 2011.
  20. J. B. Wendt and M. Potkonjak, "Medical Diagnostic-Based Sensor Selection," IEEE Sensors, pp. 1507-1510, 2011.

Book Chapters & Miscellaneous Publications

  1. J. B. Wendt, S. Meguerdichian, and M. Potkonjak, "Small is Beautiful and Smart," Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 341-358, CRC Press, 2013.
  2. S. Meguerdichian, J. B. Wendt, and M. Potkonjak, "Simultaneous Trust and Privacy in Medical Systems using Public Physical Unclonable Functions," Telehealthcare Computing and Engineering: Principles and Design, ed. by Fei Hu, pp. 679-698, CRC Press, 2013.
  3. J. Wendt, D. D. Oglesby, and E. L. Geist, "Tsunamis and Splay Fault Dynamics," Geophysical Research Letters, vol. 36, no. 15, 2009.

Patents

Service

  • Program Committee Member
    • Conference on Information and Knowledge Management (CIKM), Short Paper Track. 2018.
    • Knowledge Discovery and Data Mining (KDD), Applied Data Science Track. 2018.
    • Hardware-Oriented Security and Trust conference (HOST). 2016‒2018.
  • Journal Reviewer
    • IEEE Transactions on Information Forensics and Security (T-IFS). 2012, 2014‒2015.
    • IEEE Transactions on Emerging Topics in Computing (TETC). 2013, 2015‒2016.
  • Conference Reviewer
    • World Wide Web Conference (WWW). 2016.
    • IEEE GLOBECOM. 2012, 2015.
    • IEEE International Conference on Communications (ICC). 2014.
    • International Conference on Advances in Computing, Communications & Informatics (ICACCI). 2012.
  • Ph.D. Application Reviewer
    • UCLA Computer Science Department. 2014‒2017.