A New Analysis on Fraud Ranking In Mobile Apps

Jaya Aditya C, S Madhuri, V.G.L Narasamba


Fraud in the mobile Application market refers to fake or misleading exercises which have a reason for knocking up the Applications in the popularity list. To be sure, it turns out to be increasingly visit for Application engineers to utilize shady means, for example, blowing up their Applications' deals or posting fake Application appraisals, to submit positioning misrepresentation. While the significance of averting positioning misrepresentation has been generally perceived, there is restricted comprehension and research here. To this end, in this we give an all-encompassing perspective of positioning extortion and propose a positioning deception area system for flexible Applications. Specifically, we examine three sorts of evidences, i.e., situating based affirmations, rating based verifications and study based affirmations, by showing Applications' situating, rating and review hones through true hypotheses tests. Additionally, we propose a progression based aggregation system to fuse each one of the verifications for blackmail area.



(2014). [Online]. Available: http://en.wikipedia.org/wiki/cohen’s_kappa

(2014). [Online]. Available: http://en.wikipedia.org/wiki/information_retrie val

(2012). [Online]. Available: https://developer.apple.com/news/index.php?i d=02062012a

(2012). [Online]. Available: http://venturebeat.com/2012/07/03/ apples-crackdown-on-app-ranking-manipulation/

(2012). [Online]. Available: http://www.ibtimes.com/applethreatens-crackdown-biggest-app-store-ranking-fra ud-406764

(2012). [Online]. Available: http://www.lextek.com/manuals/onix/index.ht ml

(2012). [Online]. Available: http://www.ling.gu.se/lager/ mogul/porter-stemmer.

L. Azzopardi, M. Girolami, and K. V. Risjbergen, “Investigating the relationship between language model perplexity and ir precision- recall measures,” in Proc. 26th Int. Conf. Res. Develop. Inform. Retrieval, 2003, pp. 369–370.

D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent Dirichlet allocation,” J. Mach. Learn. Res., pp. 993–1022, 2003.

Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou, “A taxi driving fraud detection system,” in Proc. IEEE 11th Int. Conf. Data Mining, 2011, pp. 181–190.

D. F. Gleich and L.-h. Lim, “Rank aggregation via nuclear norm minimization,” in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 60– 68.

T. L. Griffiths and M. Steyvers, “Finding scientific topics,” Proc. Nat. Acad. Sci. USA, vol. 101, pp. 5228–5235, 2004.

G. Heinrich, Parameter estimation for text analysis, “ Univ. Leipzig, Leipzig, Germany, Tech. Rep., http://faculty.cs.byu.edu/~ringger/ CS601R/papers/Heinrich-GibbsLDA.pdf, 2008.

N. Jindal and B. Liu, “Opinion spam and analysis,” in Proc. Int. Conf. Web Search Data Mining, 2008, pp. 219–230.

J. Kivinen and M. K. Warmuth, “Additive versus exponentiated gradient updates for linear prediction,” in Proc. 27th Annu. ACM Symp. Theory Comput., 1995, pp. 209–218

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.