Three Way Latent Relationship among Evidences to Discover Fraud Mobile Apps
Abstract
Ranking extortion in the portable App business sector alludes to fake or misleading exercises which have a motivation behind knocking up the Apps in the fame list. For sure, it turns out to be more successive for App designers to utilize shady means, for example, swelling their Apps' business or posting fake App appraisals, to submit positioning extortion. While the significance of averting positioning extortion has been broadly perceived, there is restricted comprehension and examination here. In mobile App market ranking fraud refers to fraudulent or deceptive activities done by App developers. To commit ranking fraud, have a purpose of bumping up their Apps in the popularity list. Ranking fraud is found out by finding the active periods called leading sessions for mobile. This is done by using the latent relationship among these three evidences.
Keywords
Full Text:
PDFReferences
Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou, “A taxi driving frauddetection system,” in Proc. IEEE 11th Int. Conf. Data Mining, 2011, pp. 181–190.
M. N. Volkovs and R. S. Zemel, “A flexible generative model for preference aggregation,” in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 479–488.
A. Klementiev, D. Roth, and K. Small, “Unsupervised rank aggregation with distance-based models,” in Proc. 25th Int. Conf. Mach. Learn., 2008, pp. 472–479.
D. F. Gleich and L.-h. Lim, “Rank aggregation via nuclear norm minimization,” in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 60–68.
A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M.Castellanos, and R. Ghosh, “Spotting opinion spammers using behavioral footprints,”in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 632–640. [21]
A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh, “Spotting opinion spammers using behavioral footprints,” in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 632–640.
A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly, “Detecting spam web pages through content analysis,” in Proc. 15th Int. Conf. World Wide Web, 2006, pp. 83–92.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.