CFP last date
20 January 2025
Reseach Article

Survey on Fraud Ranking Detection in Mobile App Store

Published on July 2016 by M. Aadil Khan, T.h. Gurav
International Conference on Internet of Things, Next Generation Networks and Cloud Computing
Foundation of Computer Science USA
ICINC2016 - Number 3
July 2016
Authors: M. Aadil Khan, T.h. Gurav
26207ed6-8457-46a7-b688-e44fa127defd

M. Aadil Khan, T.h. Gurav . Survey on Fraud Ranking Detection in Mobile App Store. International Conference on Internet of Things, Next Generation Networks and Cloud Computing. ICINC2016, 3 (July 2016), 9-12.

@article{
author = { M. Aadil Khan, T.h. Gurav },
title = { Survey on Fraud Ranking Detection in Mobile App Store },
journal = { International Conference on Internet of Things, Next Generation Networks and Cloud Computing },
issue_date = { July 2016 },
volume = { ICINC2016 },
number = { 3 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/icinc2016/number3/25535-4821/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%A M. Aadil Khan
%A T.h. Gurav
%T Survey on Fraud Ranking Detection in Mobile App Store
%J International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%@ 0975-8887
%V ICINC2016
%N 3
%P 9-12
%D 2016
%I International Journal of Computer Applications
Abstract

From last few years, mobile technology has been received much more attention since it is most popular and basic need of today's world. Due to the popularity, mobiles are major target for malicious applications. Key challenge is to detect and remove malicious apps from mobiles. Numerous amounts of mobile apps are generated daily so ranking fraud is the one of the major aspects in front of the mobile App market. Ranking fraud refers to fraudulent or vulnerable activities. Main aim of the fraudulent is to knock the fraud mobile apps in the popularity list. Most App developer generates the ranking fraud apps by tricky means like enhancing the apps sales or by simply rating fake apps. Thus, there is need to have novel system to effectively analyze fraud apps. This paper provides a survey on various existing techniques with the novelties highlighting the need of novel technique to detect fraud mobile apps. This paper is motivated by arising need to detect fraud apps with less time. In proposed system, we add recommendation based on the modified ranking.

References
  1. Hengshu Zhu, Hui Xiong, Senior Member, IEEE, Yong Ge, and Enhong Chen, Senior Member, IEEE,"Discovery of Ranking Fraud for Mobile Apps", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, January 2015. Learn. Res. 3 (Mar. 2003), 1289-1305.
  2. D. F. Gleich and L. -h. Lim. Rank aggregation via nuclear norm minimization. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pages 60–68, 2011. Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  3. A. Klementiev, D. Roth, and K. Small. An unsupervised learning algorithm for rank aggregation. In Proceedings of the 18th European conference on Machine Learning, ECML '07, pages 616–623, 2007.
  4. A. Klementiev, D. Roth, and K. Small. Unsupervised rank aggregation with distance-based models. In Proceedings of the 25th international conference on Machine learning, ICML '08, pages 472– 479, 2008.
  5. E. -P. Lim, V. -A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pages 939–948, 2010.
  6. A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, 2013.
  7. Z. Wu, J. Wu, J. Cao, and D. Tao. Hysad: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pages 985–993, 2012. S
  8. B. Zhou, J. Pei, and Z. Tang. A spamicity approach to web spam detection. In Proceedings of the 2008 SIAM International Conference on Data Mining, SDM'08, pages 277–288, 2008.
  9. H. Zhu, H. Cao, E. Chen, H. Xiong, and J. Tian. Exploiting enriched contextual information for mobile app classification. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM '12, pages 1617–1621, 2012.
  10. H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong, and J. Tian. Mining personal context-aware preferences for mobile users. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 1212–1217, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Apps Ranking Fraud Detection Evidence Aggregation Historical Ranking Records Rating And Review