An International Journal House

Einstein International Journal Organization(EIJO)

Connecting People With Genius Thought

Einstein International Journal Organization(EIJO) is an international Genius Thought journals platform .
JOURNALS || EIJO Journal of Engineering, Technology and Innovative Research (EIJO – JETIR) [ ISSN : 2455 - 9172 ]
Improved Hierarchial Ranking Fraud Detection of Mobile Apps Using Sentiword Dictonary

Author Names : P.Ponnaruvi, P.Suganya, K. Raju, S. Sageengrana  volume 1 issue 2
Article Overview

ABSTRACT 

The primary aim of this project is to enhance the prevention of ranking frauds in mobile apps using the MAC address. In the existing system the leading event and leading session of an app is identified from the collected historical records. Then three different types of evidences are collected from the user feedbacks namely ranking based evidence, rating based evidence and review based evidence. These three evidences are aggregated by using evidence aggregation method. In the proposed system additionally, we are proposing two enhancements. Firstly, we are using Sentiword dictionary to identify the exact reviews scores. Secondly, the fake feedbacks by a same person for pushing up that app on the leader board are restricted. Two different constraints are considered for accepting the feedback given to an application. The first constraint is that an app can be rated only once from a user login. And the second is implemented with the aid of MAC address that limits the number of user login logged per day from a MAC address as five.

Keywords: Ranking fraud, leader board, Evidence aggregation, MAC address, IP spoofing.

Reference

[1]. Discovery of Ranking Fraud for Mobile Apps Hengshu Zhu, Hui Xiong, Senior Member, IEEE, Yong Ge, and Enhong Chen, Senior Member, IEEE.

[2]. Experiments with dbpedia, wordnet and sentiwordnet as resources for sentiment analysis in micro-blogging Hussam Hamdan,  Frederic Béchet, Patrice Bellot  Aggregation Process With Multiple Evidence Levels For Experimental Studies In Software Engineering Enrique Fernández.

[3]. L. Azzopardi, M. Girolami and K. V. Risjbergen, "Investigating the relationship between language model perplexity and ir precision-recall measures", Proc. 26th Int. Conf. Res. Develop. Inform. Retrieval, pp. 369-370, 2003 .

[4]. D. M. Blei, A. Y. Ng and M. I. Jordan, "Latent Dirichlet allocation", J. Mach. Learn. Res., pp. 993-1022, 2003.

[5]. Y. Ge, H. Xiong, C. Liu and Z.-H. Zhou, "A taxi driving fraud detection system", Proc. IEEE 11th Int. Conf. Data Mining, pp. 181-190, 2011.

[6]. D. F. Gleich and L.-h. Lim, "Rank aggregation via nuclear norm minimization", Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 60-68, 2011 .

[7]. T. L. Griffiths and M. Steyvers, "Finding scientific topics", Proc. Nat. Acad. Sci. USA, vol. 101, pp. 5228-5235, 2004.

[8]. G. Heinrich, Parameter estimation for text analysis, [online].

[9]. N. Spirin and J. Han, "Survey on web spam detection: Principles and algorithms", SIGKDD Explor. Newslett., vol. 13, no. 2, pp. 50-64, 2012 [CrossRef].

[10]. M. N. Volkovs and R. S. Zemel, "A flexible generative model for preference aggregation", Proc. 21st Int. Conf. World Wide Web, pp. 479-488, 2012 [CrossRef].

[11]. Z. Wu, J. Wu, J. Cao and D. Tao, "HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation", Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 985-993, 2012 [CrossRef]

[12]. S. Xie, G. Wang, S. Lin and P. S. Yu, "Review spam detection via temporal pattern discovery",Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 823-831, 2012 [CrossRef].

[13]. B. Yan and G. Chen, "AppJoy: Personalized mobile application discovery", Proc. 9th Int. Conf. Mobile Syst., Appl., Serv., pp. 113-126, 2011 [CrossRef].

[14]. B. Zhou, J. Pei and Z. Tang, "A spamicity approach to web spam detection", Proc. SIAM Int. Conf. Data Mining, pp. 277-288, 2008 [CrossRef].

[15]. H. Zhu, H. Cao, E. Chen, H. Xiong and J. Tian, "Exploiting enriched contextual information for mobile app classification", Proc. 21st ACM Int. Conf. Inform. Knowl. Manage., pp. 1617-1621, 2012[CrossRef].

[16]. H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong and J. Tian, "Mining personal context-aware preferences for mobile users", Proc. IEEE 12th Int. Conf. Data Mining, pp. 1212-1217, 2012.