Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Identifier Model for Ranking Fraud Recognition System

Author : Pampati. Nagaraju 1 Samudrala.Venu Gopal 2

Date of Publication :24th January 2018

Abstract: Inside the literature works since there are some related studies, like web ranking junk e-mail recognition, recognition of internet review junk e-mail additionally to mobile application recommendation, the impracticality of recognition of ranking fraud for mobile programs remains under-investigated. For achieving the crucial void, we advise to build up a ranking fraud recognition system intended for mobile programs. We submit an all-natural vision of ranking fraud while increasing your ranking fraud recognition system intended for mobile programs. It's extended by means of other domain created particulars for ranking fraud recognition. Inside the recommended system of a ranking fraud recognition system for mobile programs, it's worth watching the whole evidence are acquired by means of modelling of programs ranking, rating and review behaviours completely through record ideas tests.

Reference :

    1. J. Kivinen and M. K. Warmuth, “Additive versus exponentiated gradient updates for linear prediction,” in Proc. 27th Annu. ACM Symp. Theory Comput., 1995, pp. 209–218.
    2. A. Klementiev, D. Roth, and K. Small, “An unsupervised learning algorithm for rank aggregation,” in Proc. 18th Eur. Conf. Mach. Learn., 2007, pp. 616–623.
    3. A. Klementiev, D. Roth, and K. Small, “Unsupervised rank aggregation with Distance-based models,” in Proc. 25th Int. Conf. Mach. Learn., 2008, pp. 472–479.
    4. Z. Wu, J. Wu, J. Cao, and D. Tao, “HySAD: A semisupervised hybrid shilling attack detector for trustworthy product recommendation,” in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 985– 993.
    5. S. Xie, G. Wang, S. Lin, and P. S. Yu, “Review spam detection via temporal pattern discovery,” in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 823–831.
    6. B.Yan and G.Chen, “App Joy: Person alized mobile application discovery,” in Proc. 9th Int. Conf. Mobile Syst., Appl., Serv., 2011, pp. 113–126.

Recent Article