Open Access Open Access  Restricted Access Subscription or Fee Access

Three Way Latent Relationship among Evidences to Discover Fraud Mobile Apps

P. Kumari Deepika, K. Kiruthika, P. Umamageswari

Abstract


Ranking extortion in the portable App business sector alludes to fake or misleading exercises which have a motivation behind knocking up the Apps in the fame list. For sure, it turns out to be more successive for App designers to utilize shady means, for example, swelling their Apps' business or posting fake App appraisals, to submit positioning extortion. While the significance of averting positioning extortion has been broadly perceived, there is restricted comprehension and examination here. In mobile App market ranking fraud refers to fraudulent or deceptive activities done by App developers. To commit ranking fraud, have a purpose of bumping up their Apps in the popularity list. Ranking fraud is found out by finding the active periods called leading sessions for mobile. This is done by using the latent relationship among these three evidences.


Keywords


Mobile Apps, Ranking Fraud Detection, Evidence Aggregation, Historical Ranking Records, Rating and Review Recommendation App

Full Text:

PDF

References


Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou, “A taxi driving frauddetection system,” in Proc. IEEE 11th Int. Conf. Data Mining, 2011, pp. 181–190.

M. N. Volkovs and R. S. Zemel, “A flexible generative model for preference aggregation,” in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 479–488.

A. Klementiev, D. Roth, and K. Small, “Unsupervised rank aggregation with distance-based models,” in Proc. 25th Int. Conf. Mach. Learn., 2008, pp. 472–479.

D. F. Gleich and L.-h. Lim, “Rank aggregation via nuclear norm minimization,” in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 60–68.

A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M.Castellanos, and R. Ghosh, “Spotting opinion spammers using behavioral footprints,”in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 632–640. [21]

A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh, “Spotting opinion spammers using behavioral footprints,” in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 632–640.

A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly, “Detecting spam web pages through content analysis,” in Proc. 15th Int. Conf. World Wide Web, 2006, pp. 83–92.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.