LSJ1508 - Discovery of Ranking Fraud For Mobile Apps
LSJ1508 - Discovery of Ranking Fraud For Mobile Apps
LSJ1508 - Discovery of Ranking Fraud For Mobile Apps
EXISTING SYSTEM:
In the literature, while there are some related work, such as web ranking
spam detection, online review spam detection and mobile App
recommendation, the problem of detecting ranking fraud for mobile Apps is
still under-explored.
Generally speaking, the related works of this study can be grouped into three
categories.
The first category is about web ranking spam detection.
The second category is focused on detecting online review spam.
Finally, the third category includes the studies on mobile App
recommendation
PROPOSED SYSTEM:
We first propose a simple yet effective algorithm to identify the leading
sessions of each App based on its historical ranking records. Then, with the
analysis of Apps ranking behaviors, we find that the fraudulent Apps often
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System
Hard Disk
40 GB.
Floppy Drive
1.44 Mb.
Monitor
15 VGA Colour.
Mouse
Logitech.
Ram
512 Mb.
SOFTWARE REQUIREMENTS:
Operating system :
Windows XP/7.
Coding Language :
JAVA/J2EE
IDE
Netbeans 7.4
Database
MYSQL
REFERENCE:
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen, Discovery of Ranking
Fraud for Mobile Apps, IEEE TRANSACTIONS ON KNOWLEDGE AND
DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015