Q Ke, M Liu, Y Li, R Hu, Y Sun - US Patent 8,433,140, 2013 - Google Patents
Methods and computer-readable media for propagating content category information to images stored in a database are described. A seed image that is associated with a known …
Q Ke, M Liu, Y Li - US Patent 9,710,491, 2017 - Google Patents
DESCRIPTORIDENTIFIERLOCATION can thus be represented as a set of descriptor identifiers. A search is performed on an index using the descriptor iden tifiers as search …
A method and system for searching for content relating to a target or query image by identifying duplicate images with associated content is provided. An image search system …
A Hunt, D Pon, C Kiernan, B Adams… - US Patent …, 2016 - Google Patents
Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a …
A Hunt, D Pon, C Kiernan, B Adams… - US Patent …, 2017 - Google Patents
Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website …
Y Li, L Zhang, Q Ke - US Patent App. 12/913,430, 2011 - Google Patents
Abstract Systems, methods, and computer media for enhancing user search query results are provided. Upon receiving a user search query, relevant images are identified. Duplicate …
M Liu, S Borar, S Kallumadi - US Patent 9,454,713, 2016 - Google Patents
A method to determine image similarities. The method may include obtaining a first image and a second image and determining a discrete transform difference between a first discrete …
A Hunt, D Pon, C Kiernan, B Adams… - US Patent …, 2017 - Google Patents
US9686283B2 - Using hash signatures of DOM objects to identify website similarity - Google Patents US9686283B2 - Using hash signatures of DOM objects to identify website similarity …
A Hunt, D Pon, C Kiernan, B Adams… - US Patent …, 2020 - Google Patents
Embodiments of the present invention are directed to iden tifying phishing websites by rendering and analyzing docu ment object model (DOM) objects associated with a website …