{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:44:01Z","timestamp":1765827841582,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,27]]},"DOI":"10.1145\/3341161.3345306","type":"proceedings-article","created":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T21:07:04Z","timestamp":1579122424000},"page":"671-678","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Uncovering download fraud activities in mobile app markets"],"prefix":"10.1145","author":[{"given":"Yingtong","family":"Dou","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago"}]},{"given":"Weijian","family":"Li","sequence":"additional","affiliation":[{"name":"University of Rochester"}]},{"given":"Zhirong","family":"Liu","sequence":"additional","affiliation":[{"name":"Noah's Ark Research Lab, Huawei, China"}]},{"given":"Zhenhua","family":"Dong","sequence":"additional","affiliation":[{"name":"Noah's Ark Research Lab, Huawei, China"}]},{"given":"Jiebo","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Rochester"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago and Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A survey of app store analysis for software engineering,\" IEEE TSE","author":"Martin W.","year":"2017","unstructured":"W. Martin , F. Sarro , Y. Jia , Y. Zhang , and M. Harman , \" A survey of app store analysis for software engineering,\" IEEE TSE , 2017 . W. Martin, F. Sarro, Y. Jia, Y. Zhang, and M. Harman, \"A survey of app store analysis for software engineering,\" IEEE TSE, 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"Search rank fraud and malware detection in google play.\" TKDE","author":"Rahman M.","year":"2017","unstructured":"M. Rahman , M. Rahman , B. Carbunar , and D. H. Chau , \" Search rank fraud and malware detection in google play.\" TKDE , 2017 . M. Rahman, M. Rahman, B. Carbunar, and D. H. Chau, \"Search rank fraud and malware detection in google play.\" TKDE, 2017."},{"key":"e_1_3_2_1_3_1","volume-title":"Discovery of ranking fraud for mobile apps,\" TKDE","author":"Zhu H.","year":"2015","unstructured":"H. Zhu , H. Xiong , Y. Ge , and E. Chen , \" Discovery of ranking fraud for mobile apps,\" TKDE , 2015 . H. Zhu, H. Xiong, Y. Ge, and E. Chen, \"Discovery of ranking fraud for mobile apps,\" TKDE, 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Toward detecting collusive ranking manipulation attackers in mobile app markets,\" in ASIACCS","author":"Chen H.","year":"2017","unstructured":"H. Chen , D. He , S. Zhu , and J. Yang , \" Toward detecting collusive ranking manipulation attackers in mobile app markets,\" in ASIACCS , 2017 . H. Chen, D. He, S. Zhu, and J. Yang, \"Toward detecting collusive ranking manipulation attackers in mobile app markets,\" in ASIACCS, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Early detection of spam mobile apps,\" in WWW","author":"Seneviratne S.","year":"2015","unstructured":"S. Seneviratne , A. Seneviratne , M. A. Kaafar , A. Mahanti , and P. Mohapatra , \" Early detection of spam mobile apps,\" in WWW , 2015 . S. Seneviratne, A. Seneviratne, M. A. Kaafar, A. Mahanti, and P. Mohapatra, \"Early detection of spam mobile apps,\" in WWW, 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"Crowdsourced app review manipulation,\" in SIGIR","author":"Li S.","year":"2017","unstructured":"S. Li , J. Caverlee , W. Niu , and P. Kaghazgaran , \" Crowdsourced app review manipulation,\" in SIGIR , 2017 . S. Li, J. Caverlee, W. Niu, and P. Kaghazgaran, \"Crowdsourced app review manipulation,\" in SIGIR, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Why are android apps removed from google play?: a large-scale empirical study,\" in ACM MSR","author":"Wang H.","year":"2018","unstructured":"H. Wang , H. Li , L. Li , Y. Guo , and G. Xu , \" Why are android apps removed from google play?: a large-scale empirical study,\" in ACM MSR , 2018 . H. Wang, H. Li, L. Li, Y. Guo, and G. Xu, \"Why are android apps removed from google play?: a large-scale empirical study,\" in ACM MSR, 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale,\" in USENIX Security","author":"Chen K.","year":"2015","unstructured":"K. Chen , P. Wang , Y. Lee , X. Wang , N. Zhang , H. Huang , W. Zou , and P. Liu , \" Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale,\" in USENIX Security , 2015 . K. Chen, P. Wang, Y. Lee, X. Wang, N. Zhang, H. Huang, W. Zou, and P. Liu, \"Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale,\" in USENIX Security, 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Fairplay: Fraud and malware detection in google play,\" in SDM","author":"Rahman M.","year":"2016","unstructured":"M. Rahman , M. Rahman , B. Carbunar , and D. H. Chau , \" Fairplay: Fraud and malware detection in google play,\" in SDM , 2016 . M. Rahman, M. Rahman, B. Carbunar, and D. H. Chau, \"Fairplay: Fraud and malware detection in google play,\" in SDM, 2016."},{"key":"e_1_3_2_1_10_1","unstructured":"A. K. Sinha \"App only and buying fake downloads? google just delisted an app startup \" https:\/\/nextbigwhat.com\/play-store-fake-downloads\/ accessed on: 2019-04-11.  A. K. Sinha \"App only and buying fake downloads? google just delisted an app startup \" https:\/\/nextbigwhat.com\/play-store-fake-downloads\/ accessed on: 2019-04-11."},{"key":"e_1_3_2_1_11_1","unstructured":"\"Buy app downloads fast and easy \" https:\/\/www.ibuyfans.com\/app-downloads\/ accessed on: 2019-04-10.  \"Buy app downloads fast and easy \" https:\/\/www.ibuyfans.com\/app-downloads\/ accessed on: 2019-04-10."},{"key":"e_1_3_2_1_12_1","unstructured":"T.-F. Yen K. Yamaguchi D. Hsu and P. Murray \"The underworld of app install advertising \" Datavisor Threat Labs published on: 2018-04-13.  T.-F. Yen K. Yamaguchi D. Hsu and P. Murray \"The underworld of app install advertising \" Datavisor Threat Labs published on: 2018-04-13."},{"key":"e_1_3_2_1_13_1","volume-title":"Beyond google play: A large-scale comparative study of chinese android app markets,\" in IMC","author":"Wang H.","year":"2018","unstructured":"H. Wang , Z. Liu , J. Liang , N. Vallina-Rodriguez , Y. Guo , L. Li , J. Tapiador , J. Cao , and G. Xu , \" Beyond google play: A large-scale comparative study of chinese android app markets,\" in IMC , 2018 . H. Wang, Z. Liu, J. Liang, N. Vallina-Rodriguez, Y. Guo, L. Li, J. Tapiador, J. Cao, and G. Xu, \"Beyond google play: A large-scale comparative study of chinese android app markets,\" in IMC, 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"A longitudinal study of the google app market,\" in ASONAM","author":"Carbunar B.","year":"2015","unstructured":"B. Carbunar and R. Potharaju , \" A longitudinal study of the google app market,\" in ASONAM , 2015 . B. Carbunar and R. Potharaju, \"A longitudinal study of the google app market,\" in ASONAM, 2015."},{"key":"e_1_3_2_1_15_1","unstructured":"S. Young \"Is it worth it to buy app downloads on fiverr?\" https:\/\/appmasters.com\/worth-buy-app-downloads-fiverr\/ accessed on: 2016-05-11.  S. Young \"Is it worth it to buy app downloads on fiverr?\" https:\/\/appmasters.com\/worth-buy-app-downloads-fiverr\/ accessed on: 2016-05-11."},{"key":"e_1_3_2_1_16_1","volume-title":"Characterizing large-scale click fraud in zeroaccess,\" in CCS","author":"Pearce P.","year":"2014","unstructured":"P. Pearce , V. Dave , C. Grier , K. Levchenko , S. Guha , D. McCoy , V. Paxson , S. Savage , and G. M. Voelker , \" Characterizing large-scale click fraud in zeroaccess,\" in CCS , 2014 . P. Pearce, V. Dave, C. Grier, K. Levchenko, S. Guha, D. McCoy, V. Paxson, S. Savage, and G. M. Voelker, \"Characterizing large-scale click fraud in zeroaccess,\" in CCS, 2014."},{"key":"e_1_3_2_1_17_1","volume-title":"Nguyen et al., \"Detecting click fraud in online advertising: a data mining approach,\" JMLR","author":"Oentaryo R.","year":"2014","unstructured":"R. Oentaryo , E.-P. Lim , M. Finegold , D. Lo , F. Zhu , C. Phua , E.-Y. Cheu , G.-E. Yap , K. Sim , M. N. Nguyen et al., \"Detecting click fraud in online advertising: a data mining approach,\" JMLR , 2014 . R. Oentaryo, E.-P. Lim, M. Finegold, D. Lo, F. Zhu, C. Phua, E.-Y. Cheu, G.-E. Yap, K. Sim, M. N. Nguyen et al., \"Detecting click fraud in online advertising: a data mining approach,\" JMLR, 2014."},{"key":"e_1_3_2_1_18_1","volume-title":"Behavioral detection of spam url sharing: posting patterns versus click patterns,\" in ASONAM","author":"Cao C.","year":"2014","unstructured":"C. Cao and J. Caverlee , \" Behavioral detection of spam url sharing: posting patterns versus click patterns,\" in ASONAM , 2014 . C. Cao and J. Caverlee, \"Behavioral detection of spam url sharing: posting patterns versus click patterns,\" in ASONAM, 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"Serf and turf: crowdturfing for fun and profit,\" in WWW","author":"Wang G.","year":"2012","unstructured":"G. Wang , C. Wilson , X. Zhao , Y. Zhu , M. Mohanlal , H. Zheng , and B. Y. Zhao , \" Serf and turf: crowdturfing for fun and profit,\" in WWW , 2012 . G. Wang, C. Wilson, X. Zhao, Y. Zhu, M. Mohanlal, H. Zheng, and B. Y. Zhao, \"Serf and turf: crowdturfing for fun and profit,\" in WWW, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing.\" in ICWSM","author":"Lee K.","year":"2014","unstructured":"K. Lee , S. Webb , and H. Ge , \" The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing.\" in ICWSM , 2014 . K. Lee, S. Webb, and H. Ge, \"The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing.\" in ICWSM, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Detecting malicious campaigns in crowdsourcing platforms,\" in ASONAM","author":"Choi H.","year":"2016","unstructured":"H. Choi , K. Lee , and S. Webb , \" Detecting malicious campaigns in crowdsourcing platforms,\" in ASONAM , 2016 . H. Choi, K. Lee, and S. Webb, \"Detecting malicious campaigns in crowdsourcing platforms,\" in ASONAM, 2016."},{"key":"e_1_3_2_1_22_1","volume-title":"Combating crowdsourced review manipulators: A neighborhood-based approach,\" in WSDM","author":"Kaghazgaran P.","year":"2018","unstructured":"P. Kaghazgaran , J. Caverlee , and A. Squicciarini , \" Combating crowdsourced review manipulators: A neighborhood-based approach,\" in WSDM , 2018 . P. Kaghazgaran, J. Caverlee, and A. Squicciarini, \"Combating crowdsourced review manipulators: A neighborhood-based approach,\" in WSDM, 2018."},{"key":"e_1_3_2_1_23_1","volume-title":"Appwatcher: Unveiling the underground market of trading mobile app reviews,\" in ACM WiSec","author":"Xie Z.","year":"2015","unstructured":"Z. Xie and S. Zhu , \" Appwatcher: Unveiling the underground market of trading mobile app reviews,\" in ACM WiSec , 2015 . Z. Xie and S. Zhu, \"Appwatcher: Unveiling the underground market of trading mobile app reviews,\" in ACM WiSec, 2015."},{"key":"e_1_3_2_1_24_1","volume-title":"Crowd fraud detection in internet advertising,\" in WWW","author":"Tian T.","year":"2015","unstructured":"T. Tian , J. Zhu , F. Xia , X. Zhuang , and T. Zhang , \" Crowd fraud detection in internet advertising,\" in WWW , 2015 . T. Tian, J. Zhu, F. Xia, X. Zhuang, and T. Zhang, \"Crowd fraud detection in internet advertising,\" in WWW, 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"Uncovering social spammers: social honeypots+ machine learning,\" in SIGIR","author":"Lee K.","year":"2010","unstructured":"K. Lee , J. Caverlee , and S. Webb , \" Uncovering social spammers: social honeypots+ machine learning,\" in SIGIR , 2010 . K. Lee, J. Caverlee, and S. Webb, \"Uncovering social spammers: social honeypots+ machine learning,\" in SIGIR, 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"Paying for likes?: Understanding facebook like fraud using honeypots,\" in IMC","author":"De Cristofaro E.","year":"2014","unstructured":"E. De Cristofaro , A. Friedman , G. Jourjon , M. A. Kaafar , and M. Z. Shafiq , \" Paying for likes?: Understanding facebook like fraud using honeypots,\" in IMC , 2014 . E. De Cristofaro, A. Friedman, G. Jourjon, M. A. Kaafar, and M. Z. Shafiq, \"Paying for likes?: Understanding facebook like fraud using honeypots,\" in IMC, 2014."},{"key":"e_1_3_2_1_27_1","volume-title":"What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild,\" in IMC","author":"Onaolapo J.","year":"2016","unstructured":"J. Onaolapo , E. Mariconti , and G. Stringhini , \" What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild,\" in IMC , 2016 . J. Onaolapo, E. Mariconti, and G. Stringhini, \"What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild,\" in IMC, 2016."},{"key":"e_1_3_2_1_28_1","volume-title":"Collective opinion spam detection: Bridging review networks and metadata,\" in KDD","author":"Rayana S.","year":"2015","unstructured":"S. Rayana and L. Akoglu , \" Collective opinion spam detection: Bridging review networks and metadata,\" in KDD , 2015 . S. Rayana and L. Akoglu, \"Collective opinion spam detection: Bridging review networks and metadata,\" in KDD, 2015."},{"key":"e_1_3_2_1_29_1","unstructured":"P. Geurts D. Ernst and L. Wehenkel \"Extremely randomized trees \" Machine learning.  P. Geurts D. Ernst and L. Wehenkel \"Extremely randomized trees \" Machine learning."},{"key":"e_1_3_2_1_30_1","volume-title":"The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race,\" in WWW","author":"Cresci S.","year":"2017","unstructured":"S. Cresci , R. Di Pietro , M. Petrocchi , A. Spognardi , and M. Tesconi , \" The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race,\" in WWW , 2017 . S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, \"The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race,\" in WWW, 2017."},{"key":"e_1_3_2_1_31_1","volume-title":"Xgboost: A scalable tree boosting system,\" in KDD","author":"Chen T.","year":"2016","unstructured":"T. Chen and C. Guestrin , \" Xgboost: A scalable tree boosting system,\" in KDD , 2016 . T. Chen and C. Guestrin, \"Xgboost: A scalable tree boosting system,\" in KDD, 2016."},{"key":"e_1_3_2_1_32_1","volume-title":"Smoke screener or straight shooter: Detecting elite sybil attacks in userreview social networks,\" NDSS","author":"Zheng H.","year":"2018","unstructured":"H. Zheng , M. Xue , H. Lu , S. Hao , H. Zhu , X. Liang , and K. Ross , \" Smoke screener or straight shooter: Detecting elite sybil attacks in userreview social networks,\" NDSS , 2018 . H. Zheng, M. Xue, H. Lu, S. Hao, H. Zhu, X. Liang, and K. Ross, \"Smoke screener or straight shooter: Detecting elite sybil attacks in userreview social networks,\" NDSS, 2018."}],"event":{"name":"ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Vancouver British Columbia Canada","acronym":"ASONAM '19"},"container-title":["Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341161.3345306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341161.3345306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:05Z","timestamp":1750206365000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341161.3345306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":32,"alternative-id":["10.1145\/3341161.3345306","10.1145\/3341161"],"URL":"https:\/\/doi.org\/10.1145\/3341161.3345306","relation":{},"subject":[],"published":{"date-parts":[[2019,8,27]]},"assertion":[{"value":"2020-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}