Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework

作者: Bing Hu , Bin Liu , Neil Zhenqiang Gong , Deguang Kong , Hongxia Jin

DOI: 10.1145/2806416.2806579

关键词:

摘要: Mobile applications (Apps) could expose children or adolescents to mature themes such as sexual content, violence and drug use, which results in an inappropriate security privacy risk for them. Therefore, mobile platforms provide rating policies label the maturity levels of Apps reasons why App has a given level, enables parents select maturity-appropriate their children. However, existing approaches implement these are either costly (because expensive manually labeling) inaccurate no centralized controls). In this work, we aim design build machine learning framework automatically predict associated with high accuracy low cost. To end, take multi-label classification approach contents then level according policy. Specifically, extract novel features from descriptions by leveraging deep technique capture semantic similarity pairwise words adapt Support Vector Machine correlations pearson correlation setting. Moreover, evaluate our various baseline methods using datasets that collected both Store Google Play. We demonstrate that, only descriptions, already achieves 85% Precision predicting 79% levels, substantially outperforms methods.

参考文章(28)
Ying Chen, Heng Xu, Yilu Zhou, Sencun Zhu, Is this app safe for children? Proceedings of the 22nd international conference on World Wide Web - WWW '13. pp. 201- 212 ,(2013) , 10.1145/2488388.2488407
Vincent Silenzio, Henry A. Kautz, Adam Sadilek, Sean Padraig Brennan, nEmesis: Which Restaurants Should You Avoid Today? national conference on artificial intelligence. ,(2013)
Tomas Mikolov, Greg S. Corrado, Kai Chen, Jeffrey Dean, Efficient Estimation of Word Representations in Vector Space international conference on learning representations. ,(2013)
Damien Octeau, Yves Le Traon, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Jacques Klein, Somesh Jha, Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis usenix security symposium. pp. 543- 558 ,(2013)
Shashi Shekhar, Michael Dietz, Anhei Shu, Dan S. Wallach, Yuliy Pisetsky, Quire: lightweight provenance for smart phone operating systems usenix security symposium. pp. 23- 23 ,(2011)
Alexander Moshchuk, Adrienne Porter Felt, Helen J. Wang, Erika Chin, Steven Hanna, Permission re-delegation: attacks and defenses usenix security symposium. pp. 22- 22 ,(2011)
Deguang Kong, Lei Cen, Hongxia Jin, AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications computer and communications security. pp. 530- 541 ,(2015) , 10.1145/2810103.2813689
Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, Hui Xiong, Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference web search and data mining. pp. 315- 324 ,(2015) , 10.1145/2684822.2685322