Author : Pampati. Nagaraju 1
Date of Publication :24th January 2018
Abstract: Inside the literature works since there are some related studies, like web ranking junk e-mail recognition, recognition of internet review junk e-mail additionally to mobile application recommendation, the impracticality of recognition of ranking fraud for mobile programs remains under-investigated. For achieving the crucial void, we advise to build up a ranking fraud recognition system intended for mobile programs. We submit an all-natural vision of ranking fraud while increasing your ranking fraud recognition system intended for mobile programs. It's extended by means of other domain created particulars for ranking fraud recognition. Inside the recommended system of a ranking fraud recognition system for mobile programs, it's worth watching the whole evidence are acquired by means of modelling of programs ranking, rating and review behaviours completely through record ideas tests.
Reference :
-
- J. Kivinen and M. K. Warmuth, “Additive versus exponentiated gradient updates for linear prediction,” in Proc. 27th Annu. ACM Symp. Theory Comput., 1995, pp. 209–218.
- A. Klementiev, D. Roth, and K. Small, “An unsupervised learning algorithm for rank aggregation,” in Proc. 18th Eur. Conf. Mach. Learn., 2007, pp. 616–623.
- A. Klementiev, D. Roth, and K. Small, “Unsupervised rank aggregation with Distance-based models,” in Proc. 25th Int. Conf. Mach. Learn., 2008, pp. 472–479.
- Z. Wu, J. Wu, J. Cao, and D. Tao, “HySAD: A semisupervised hybrid shilling attack detector for trustworthy product recommendation,” in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 985– 993.
- S. Xie, G. Wang, S. Lin, and P. S. Yu, “Review spam detection via temporal pattern discovery,” in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 823–831.
- B.Yan and G.Chen, “App Joy: Person alized mobile application discovery,” in Proc. 9th Int. Conf. Mobile Syst., Appl., Serv., 2011, pp. 113–126.