Mobile Apps Ranking Rating and Review Fraud Detection by evidences

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 2, No 7, 2016.

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: J.Thejappa,Ms.M.Sharmila Devi

Reference:IJCS-148

View PDF Format

Abstract

Ranking extortion in the portable App business sector alludes to feign or alluding exercises which have a motivation behind knocking up the Apps in the fame list. For sure, it turns out to be more successive for App designers to utilize shady designates, for example, swelling their Apps' business or posting fake App appraisals, to submit situating extortion. While the consequentiality of averting situating extortion has been broadly perceived, there is restricted comprehension and examination here. To this end, in this paper, we give an all encompassing perspective of situating misrepresentation and propose a situating extortion apperception framework for portable Apps. In particular, we first propose to precisely find the mining so as to position misrepresentation the dynamic periods, to be categorical driving sessions, of multifarious Apps. Such driving sessions can be utilized for distinguishing the neighborhood oddity rather than ecumenical peculiarity of App rankings. Moreover, we research three sorts of proofs, i.e., situating predicated substantiations, modeling so as to rate predicated proofs and audit predicated proofs, Apps' situating, rating and survey practices through quantifiable notional theorizations tests. What's more, we propose a streamlining predicated total technique to incorporate every one of the proofs for misrepresentation detection. The multifarious application suggestion for determinately, we assess the proposed framework with true App information amassed from the iOS App Store for quite a while period. In the tribulations, we approve the adequacy of the proposed framework, and demonstrate the adaptability of the apperception calculation and withal some normality of situating extortion exercises.

References

[1] Discovery of ranking fraud for mobile apps. HengshuZhu,Hui Xiong,Senior members,IEEE,Yong Ge, andEnhong Chen,Senior member,IEEE,IEEE transactions onknowledge and data engineering,vol .27,No.1,January2015. [2] Detecting product review spammers using ratingbehaviors. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu,and H. W. Lauw. In Proceedings of the 19th ACMinternational conference on Information and knowledgemanagement. [3] Supervised rank aggregation. Y.-T. Liu, T.-Y. Liu, T.Qin, Z.-M. Ma, and H. Li In Proceedings of the 16thinternational conference onWorld Wide Web. [4] An unsupervised learning algorithm for rankaggregation, A. Klementiev, D. Roth, and K. Smallin Proceedings of the 18th Europeanconference onMachine Learning, ECML ’07, pages 616–623, 2007. [5] An unsupervised learning algorithm for rankaggregation, A. Klementiev, D. Roth, and K. Smallin Proceedings of the 18th Europeanconference onMachine Learning, ECML ’07, pages 616–623, 2007. [6] Getjar mobile application recommendations with verysparse datasets. K. Shi and K. Ali. In Proceedings of the18th ACM SIGKDDinternational conference onKnowledge discovery and data mining, KDD ’12, pages204–212, 2012. [7] Ranking fraud Mining personal context-awarepreferences for mobile users. H. Zhu, E. Chen, K. Yu, H.Cao, H. Xiong, and J. Tian. In Data Mining (ICDM),2012 IEEE 12th International Conference on, Pages1212–1217, 2012. [8] Detection for mobile apps H. Zhu, H. Xiong, Y. Ge, andE. Chen. A holistic view. In Proceedings of the 22ndACMinternational conference on Information andknowledge management,CIKM ’13, 2013. [9] Exploiting enriched contextual information for mobileapp classification, H. Zhu, H. Cao, E. Chen, H. Xiong,and J. Tian. In Proceedings of the 21st ACMinternational conference on Information and knowledgemanagement, CIKM ’12, pages 1617–1621, 2012. [10] spammers using behavioral Footprints A. Mukherjee, A.Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos,and R.Ghosh. In Proceedings of the 19th ACM SIGKDDinternational conference on Knowledge discovery anddata mining, KDD ’13, 2013. [11] Detecting product review spammers using ratingbehaviors. E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu,and H. W. Lauw In Proceedings of the 19th ACMinternational conference on Information and knowledgemanagement, CIKM ’10, pages 939–948, 2010.


Keywords

Mobile Apps, Ranking Fraud Detection, Evidence Aggregation, Historical Ranking Records, Rating and Review, Recommendation app, KNN.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog