-
公开(公告)号:US11462009B2
公开(公告)日:2022-10-04
申请号:US16421146
申请日:2019-05-23
Applicant: Apple Inc.
Inventor: Ashish Agarwal , Fei Peng , Wenyu Zhang , Matthew H. Thorn , Sean Michael Harold , Douglas Isaac Friedman , Leticia Marie Alarcón
Abstract: The disclosed techniques generally relate to devices and methods for generating cropped images in which one or more features of interest are preserved or emphasized. In one implementation, such features of interest may include facial features. In accordance with certain implementations, location and extent of such features may be identified and used in conjunction with information regarding display characteristics so as to generate cropped images preserving or emphasizing the feature of interest when displayed on a given device.
-
公开(公告)号:US11900675B2
公开(公告)日:2024-02-13
申请号:US17946720
申请日:2022-09-16
Applicant: Apple Inc.
Inventor: Ashish Agarwal , Fei Peng , Wenyu Zhang , Matthew H. Thorn , Sean Michael Harold , Douglas Isaac Friedman , Leticia Marie Alarcón
CPC classification number: G06V20/20 , G06T7/11 , G06V40/171 , G06V40/172 , G06T2207/20132 , G06T2207/30201
Abstract: The disclosed techniques generally relate to devices and methods for generating cropped images in which one or more features of interest are preserved or emphasized. In one implementation, such features of interest may include facial features. In accordance with certain implementations, location and extent of such features may be identified and used in conjunction with information regarding display characteristics so as to generate cropped images preserving or emphasizing the feature of interest when displayed on a given device.
-
公开(公告)号:US10685113B2
公开(公告)日:2020-06-16
申请号:US15676329
申请日:2017-08-14
Applicant: Apple Inc.
Inventor: Ashish Agarwal , Fei Peng , Zhui Deng
IPC: G06F21/56
Abstract: In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application, including a binary executable. The computing device can generate function signatures for the functions called within the binary executable. The computing device can generate a locality sensitive hash value for the application based on the function signatures. The computing device can group applications based on the locality sensitive hash value generated for each application. The computing device can compare the function signatures of the binary executables of the applications within a group to determine the similarity of the applications. If two applications have binary executables that are over a threshold percentage of similarity, the two applications can be identified as clones of each other.
-
公开(公告)号:US20230020233A1
公开(公告)日:2023-01-19
申请号:US17946720
申请日:2022-09-16
Applicant: Apple Inc.
Inventor: Ashish Agarwal , Fei Peng , Wenyu Zhang , Matthew H. Thorn , Sean Michael Harold , Douglas Isaac Friedman , Leticia Marie Alarcón
Abstract: The disclosed techniques generally relate to devices and methods for generating cropped images in which one or more features of interest are preserved or emphasized. In one implementation, such features of interest may include facial features. In accordance with certain implementations, location and extent of such features may be identified and used in conjunction with information regarding display characteristics so as to generate cropped images preserving or emphasizing the feature of interest when displayed on a given device.
-
公开(公告)号:US20190005242A1
公开(公告)日:2019-01-03
申请号:US15676329
申请日:2017-08-14
Applicant: Apple Inc.
Inventor: Ashish Agarwal , Fei Peng , Zhui Deng
IPC: G06F21/56
Abstract: In some implementations, a computing device can determine the similarity of binary executables. For example, the computing device can receive an application, including a binary executable. The computing device can generate function signatures for the functions called within the binary executable. The computing device can generate a locality sensitive hash value for the application based on the function signatures. The computing device can group applications based on the locality sensitive hash value generated for each application. The computing device can compare the function signatures of the binary executables of the applications within a group to determine the similarity of the applications. If two applications have binary executables that are over a threshold percentage of similarity, the two applications can be identified as clones of each other.
-
-
-
-