Abstract:
An online system extracts features from an application linked to the online system. The application is used by users of the online system and posts content to the online system. A trained model is applied to the extracted features to generate a quality score for the application. The trained model is trained using features extracted from a set of training applications and quality scores manually assigned to the training applications, wherein the manually assigned quality scores indicate whether each training application satisfies a set of criteria and the generated quality score represents a probability of the application satisfying the set of criteria. Based on the quality score, content provided by the application is ranked for presentation to a user of the online system in relation to other content of the online system. The online system presents the content provided by the application to the user according to the ranking
Abstract:
An online system extracts features from an application linked to the online system. The application is used by users of the online system and posts content to the online system. A trained model is applied to the extracted features to generate a quality score for the application. The trained model is trained using features extracted from a set of training applications and quality scores manually assigned to the training applications, wherein the manually assigned quality scores indicate whether each training application satisfies a set of criteria and the generated quality score represents a probability of the application satisfying the set of criteria. Based on the quality score, content provided by the application is ranked for presentation to a user of the online system in relation to other content of the online system. The online system presents the content provided by the application to the user according to the ranking.
Abstract:
An electronic device with a display detects an input in a user interface for a second application not associated with a server system. In response to detecting the first input, the device sends a first request from the second application to a first application associated with the server system. In response to the first request, the device sends a first command from the first application to the server system on behalf of the second application. The first command is a command for performance of a first operation at the server system. The first operation corresponds to the input detected by the device. The device receives a voucher, or an indication that a voucher has been created, at the second application pre-authorizing performance of a predefined second operation at the server system upon receipt, by the server system, of a second command from the second application.
Abstract:
Embodiments are disclosed for identifying a suspect application based on multiple operating factors from use of multiple applications. The embodiments can generate a representative distribution of a selected factor based on collected information corresponding to multiple operating factors from use of multiple applications. The embodiments can compare a representative distribution of a target factor with the representative distribution of the selected factor and identify a suspect application when these distributions are different.
Abstract:
Embodiments are disclosed for identifying a suspect application based on multiple operating factors from use of multiple applications. The embodiments can generate a representative distribution of a selected factor based on collected information corresponding to multiple operating factors from use of multiple applications. The embodiments can compare a representative distribution of a target factor with the representative distribution of the selected factor and identify a suspect application when these distributions are different.
Abstract:
A method of operation of a URL spam detection system includes: identifying a feature dimension of a user action on a social networking system to detect anomalies; extracting URL chunks from a content associated with the user action; aggregating a non-content feature of the user action along the feature dimension into a URL distribution store to produce a feature distribution for each of the URL chunks; determining whether the feature distribution of a particular URL chunk within the URL chunks exceeds an expectation threshold for the feature dimension; and classifying the particular URL chunk as an illegitimate URL when the feature distribution exceeds the expectation threshold to restrict access to a particular URL chunk on a social networking system.
Abstract:
An online system extracts features from an application linked to the online system. The application is used by users of the online system and posts content to the online system. A trained model is applied to the extracted features to generate a quality score for the application. The trained model is trained using features extracted from a set of training applications and quality scores manually assigned to the training applications, wherein the manually assigned quality scores indicate whether each training application satisfies a set of criteria and the generated quality score represents a probability of the application satisfying the set of criteria. Based on the quality score, content provided by the application is ranked for presentation to a user of the online system in relation to other content of the online system. The online system presents the content provided by the application to the user according to the ranking.
Abstract:
A method of operation of a URL spam detection system includes: identifying a feature dimension of a user action on a social networking system to detect anomalies; extracting URL chunks from a content associated with the user action; aggregating a non-content feature of the user action along the feature dimension into a URL distribution store to produce a feature distribution for each of the URL chunks; determining whether the feature distribution of a particular URL chunk within the URL chunks exceeds an expectation threshold for the feature dimension; and classifying the particular URL chunk as an illegitimate URL when the feature distribution exceeds the expectation threshold to restrict access to a particular URL chunk on a social networking system.
Abstract:
An online system extracts features from an application linked to the online system. The application is used by users of the online system and posts content to the online system. A trained model is applied to the extracted features to generate a quality score for the application. The trained model is trained using features extracted from a set of training applications and quality scores manually assigned to the training applications, wherein the manually assigned quality scores indicate whether each training application satisfies a set of criteria and the generated quality score represents a probability of the application satisfying the set of criteria. Based on the quality score, content provided by the application is ranked for presentation to a user of the online system in relation to other content of the online system. The online system presents the content provided by the application to the user according to the ranking.
Abstract:
An electronic device with a display detects an input in a user interface for a second application not associated with a server system. In response to detecting the first input, the device sends a first request from the second application to a first application associated with the server system. In response to the first request, the device sends a first command from the first application to the server system on behalf of the second application, for performance of a first operation at the server system. The first operation corresponds to the input detected by the device. The device receives a voucher, or an indication that a voucher has been created, at the second application pre-authorizing performance of a predefined second operation at the server system upon receipt, by the server system, of a second command from the second application.