ADI: Towards a Framework of App Developer Inspection

  • Kai Xing
  • Di Jiang
  • Wilfred Ng
  • Xiaotian Hao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8422)


With the popularity of smart mobile devices, the amount of mobile applications (or simply called apps) has been increasing dramatically in recent years. However, due to low threshold to enter app industry, app developers vary significantly with respect to their expertise and reputation in the production of apps. Currently, there is no well-recognized objective and effective means to profile app developers. As the mobile market grows, it already gives rise to the problem of finding appropriate apps from the user point of view. In this paper, we propose a framework called App Developer Inspector (ADI), which aims to effectively profile app developers in aspects of their expertise and reputation in developing apps. ADI is essentially founded on two underlying models: the App Developer Expertise (ADE) model and the App Developer Reputation (ADR) model. In a nutshell, ADE is a generative model that derives the latent expertise for each developer and ADR is a model that exploits multiple features to evaluate app developers’ reputation. Using the app developer profiles generated in ADI, we study two new applications which respectively facilitate app search and app development outsourcing. We conduct extensive experiments on a large real world dataset to evaluate the performance of ADI. The results of experiments demonstrate the effectiveness of ADI in profiling app developers as well as its boosting impact on the new applications.


App Developer Profiling App Searching App Development Outsourcing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alazab, M., Monsamy, V., Batten, L., Lantz, P., Tian, R.: Analysis of malicious and benign android applications. In: ICDCSW (2012)Google Scholar
  2. 2.
    Balog, K., Azzopardi, L., De Rijke, M.: Formal models for expert finding in enterprise corpora. In: SIGIR (2006)Google Scholar
  3. 3.
    Barbosa, L., Feng, J.: Robust sentiment detection on twitter from biased and noisy data. In: ACL (2010)Google Scholar
  4. 4.
    Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. The Journal of Machine Learning Research (2003)Google Scholar
  5. 5.
    Chia, P., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: WWW, pp. 311–320 (2012)Google Scholar
  6. 6.
    Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. of the National Academy of Sciences of the United States of America (2004)Google Scholar
  7. 7.
    Ha-Thuc, V., Mejova, Y., Harris, C., Srinivasan, P.: A relevance-based topic model for news event tracking. In: SIGIR (2009)Google Scholar
  8. 8.
    Jiang, D., Leung, K., Ng, W.: Context-aware search personalization with concept preference. In: CIKM (2011)Google Scholar
  9. 9.
    Jiang, D., Ng, W.: Mining web search topics with diverse spatiotemporal patterns. In: SIGIR (2013)Google Scholar
  10. 10.
    Jiang, D., Vosecky, J., Leung, K.W.-T., Ng, W.: G-wstd: A framework for geographic web search topic discovery. In: CIKM (2012)Google Scholar
  11. 11.
    Jiang, D., Vosecky, J., Leung, K.W.-T., Ng, W.: Panorama: A semantic-aware application search framework. In: EDBT (2013)Google Scholar
  12. 12.
    Joachims, T.: Optimizing search engines using clickthrough data. In: SIGKDD (2002)Google Scholar
  13. 13.
    Kang, D., Jiang, D., Pei, J., Liao, Z., Sun, X., Choi, H.J.: Multidimensional mining of large-scale search logs: A topic-concept cube approach. In: WSDM (2011)Google Scholar
  14. 14.
    Manning, C.D., Raghavan, P., Schutze, H.: Introduction to information retrieval. Cambridge University Press, Cambridge (2008)CrossRefzbMATHGoogle Scholar
  15. 15.
    Manning, C.D., Raghavan, P., Schütze, H.: Introduction to information retrieval, vol. 1. Cambridge University Press, Cambridge (2008)CrossRefzbMATHGoogle Scholar
  16. 16.
    Mazurek, J.: Evaluation of ranking similarity in ordinal ranking problems. Acta academica karviniensiaGoogle Scholar
  17. 17.
    Mei, Q., Liu, C., Su, H., Zhai, C.X.: A probabilistic approach to spatiotemporal theme pattern mining on weblogs. In: WWW (2006)Google Scholar
  18. 18.
    Newman, D., Asuncion, A., Smyth, P., Welling, M.: Distributed algorithms for topic models. The Journal of Machine Learning Research 10, 1801–1828 (2009)zbMATHMathSciNetGoogle Scholar
  19. 19.
    Renda, M., Straccia, U.: Web metasearch: Rank vs. score based rank aggregation methods. In: Proceedings of the 2003 ACM symposium on Applied Computing (2003)Google Scholar
  20. 20.
    Rosen-Zvi, M., Griffiths, T., Steyvers, M., Smyth, P.: The author-topic model for authors and documents. In: Proceedings of the UAI Conference (2004)Google Scholar
  21. 21.
    Salton, G., Wong, A., Yang, C.: A vector space model for automatic indexing. Communications of the ACM 18(11), 613–620 (1975)CrossRefzbMATHGoogle Scholar
  22. 22.
    Vosecky, J., Leung, K.W.-T., Ng, W.: Searching for quality microblog posts: Filtering and ranking based on content analysis and implicit links. In: Lee, S.-G., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012, Part I. LNCS, vol. 7238, pp. 397–413. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  23. 23.
    Wallach, H.M.: Structured topic models for language. Unpublished doctoral dissertation. Univ.of Cambridge (2008)Google Scholar
  24. 24.
    Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Malicious android applications in the enterprise: What do they do and how do we fix it? In: ICDEW, pp. 251–254. IEEE (2012)Google Scholar
  25. 25.
    Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In: NDSS (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Kai Xing
    • 1
  • Di Jiang
    • 1
  • Wilfred Ng
    • 1
  • Xiaotian Hao
    • 1
  1. 1.Department of Computer Science and EngineeringHong Kong University of Science and TechnologyHong KongChina

Personalised recommendations