International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 171

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


Survey on Fraud Ranking in Mobile Apps

Monali Zende, Aruna Gupta


Abstract: Ranking fraud in the mobile App business suggest to false or tricky exercises which have a motivation behind, knocking up the Apps in the fame list. Now a days, many shady means are used more frequently by app developers, such expanding their Apps' business or posting imposter App evaluations, to confer positioning misrepresentation. There is a limited understanding and research area for preventing ranking fraud. This paper gives a whole perspective of positioning misrepresentation and describes a Ranking fraud identification framework for mobile Apps. This work is grouped into three category. First is web ranking spam detection, second is online review spam detection and last one is mobile app recommendation. The Web ranking spam refers to any deliberate actions which bring to selected Web pages an unjustifiable favorable relevance or importance. Review spam is designed to give unfair view of some products so as to influence the consumers' perception of the products by directly or indirectly influeting or damaging the product's reputation.


Keywords: Mobile Apps, Ranking Fraud Detection, Evidence Aggregation, Historical Ranking Records, Rating and Review


Edition: Volume 5 Issue 2, February 2016,


Pages: 27 - 30


How to Cite this Article?

Monali Zende, Aruna Gupta, "Survey on Fraud Ranking in Mobile Apps", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV153188, Volume 5 Issue 2, February 2016, 27 - 30

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Mobile Apps'

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2069 - 2072

Discovery of Historical Record to Detect Fraud App

Pritam Porate, M. S. Nimbarte

Share this Article

Similar Articles with Keyword 'Ranking Fraud Detection'

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2069 - 2072

Discovery of Historical Record to Detect Fraud App

Pritam Porate, M. S. Nimbarte

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1672 - 1675

Survey: Fraud Detection and Discovery of Mobile Apps

Urmila Aware, D. O. Shamkuwar

Share this Article

Similar Articles with Keyword 'Evidence Aggregation'

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2069 - 2072

Discovery of Historical Record to Detect Fraud App

Pritam Porate, M. S. Nimbarte

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1672 - 1675

Survey: Fraud Detection and Discovery of Mobile Apps

Urmila Aware, D. O. Shamkuwar

Share this Article

Similar Articles with Keyword 'Historical Ranking Records'

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2069 - 2072

Discovery of Historical Record to Detect Fraud App

Pritam Porate, M. S. Nimbarte

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1672 - 1675

Survey: Fraud Detection and Discovery of Mobile Apps

Urmila Aware, D. O. Shamkuwar

Share this Article

Similar Articles with Keyword 'Mobile'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Apps'

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1011 - 1013

Transplantation of Native Android Apps onto J2ME Platform

Revati M. Wahul, Meenakshi Chandak, Neha Pandit, Kalyani Mote

Share this Article

Similar Articles with Keyword 'Ranking'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 26

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1720 - 1723

Key Phrase Extraction Using Recurrent Neural Network

Aakib Jabbar, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'Fraud'

Downloads: 84

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1850 - 1856

A Review on Detection of Outliers Over High Dimensional Streaming Data Using Cluster Based Hybrid Approach

Abhishek B. Mankar, Namrata Ghuse

Share this Article

Similar Articles with Keyword 'Detection'

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'Evidence'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 84

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Similar Articles with Keyword 'Aggregation'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2371 - 2374

Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm

Anagha Jagtap, M. D. Ingle

Share this Article

Similar Articles with Keyword 'Historical'

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2188 - 2190

Exploring Social User Behavior with Personalized Recommendation

Karishma Ahire, K.M. Varpe

Share this Article

Similar Articles with Keyword 'Records'

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Similar Articles with Keyword 'Rating'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Review'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 11, November 2021

Pages: 1044 - 1052

A Comprehensive Study of Various Sorting Algorithms

Cherukuri Nischay Sai

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article
Top