{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T08:59:43Z","timestamp":1726477183024},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Education, India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1016\/j.eswa.2022.119259","type":"journal-article","created":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T23:35:22Z","timestamp":1668900922000},"page":"119259","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["WMTDBC: An unsupervised multivariate analysis model for fraud detection in health insurance claims"],"prefix":"10.1016","volume":"215","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9519-4826","authenticated-orcid":false,"given":"Lavanya","family":"Settipalli","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0764-2650","authenticated-orcid":false,"given":"G.R.","family":"Gangadharan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/j.eswa.2022.119259_b1","doi-asserted-by":"crossref","DOI":"10.5120\/21307-4126","article-title":"Techniques of data mining in healthcare: a review","volume":"120","author":"Ahmad","year":"2015","journal-title":"International Journal of Computer Applications"},{"issue":"2","key":"10.1016\/j.eswa.2022.119259_b2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/304181.304187","article-title":"OPTICS: Ordering points to identify the clustering structure","volume":"28","author":"Ankerst","year":"1999","journal-title":"ACM Sigmod Record"},{"key":"10.1016\/j.eswa.2022.119259_b3","article-title":"Intelligent fraud detection in financial statements using machine learning and data mining: A systematic literature review","author":"Ashtiani","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2022.119259_b4","series-title":"2016 15th IEEE international conference on machine learning and applications (ICMLA)","first-page":"347","article-title":"A probabilistic programming approach for outlier detection in healthcare claims","author":"Bauder","year":"2016"},{"issue":"3","key":"10.1016\/j.eswa.2022.119259_b5","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/s10742-017-0172-1","article-title":"Multivariate outlier detection in medicare claims payments applying probabilistic programming methods","volume":"17","author":"Bauder","year":"2017","journal-title":"Health Services and Outcomes Research Methodology"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10742-016-0154-8","article-title":"A survey on the state of healthcare upcoding fraud analysis and detection","volume":"17","author":"Bauder","year":"2017","journal-title":"Health Services and Outcomes Research Methodology"},{"key":"10.1016\/j.eswa.2022.119259_b7","first-page":"244","article-title":"Bayesian multinomial latent variable modeling for fraud and abuse detection in health insurance","volume":"71","author":"Bayerstadler","year":"2016","journal-title":"Insurance: Mathematics & Economics"},{"key":"10.1016\/j.eswa.2022.119259_b8","series-title":"2020 5th international conference on cloud computing and artificial intelligence: technologies and applications (CloudTech)","first-page":"1","article-title":"A review of credit card fraud detection using machine learning techniques","author":"Boutaher","year":"2020"},{"key":"10.1016\/j.eswa.2022.119259_b9","doi-asserted-by":"crossref","first-page":"186421","DOI":"10.1109\/ACCESS.2020.3026222","article-title":"Evaluation of deep neural networks for reduction of credit card fraud alerts","volume":"8","author":"Carrasco","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2022.119259_b10","doi-asserted-by":"crossref","unstructured":"Chandola,\u00a0V., Sukumar,\u00a0S. R., & Schryver,\u00a0J. C. (2013). Knowledge discovery from massive healthcare claims data. In Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 1312\u20131320).","DOI":"10.1145\/2487575.2488205"},{"key":"10.1016\/j.eswa.2022.119259_b11","first-page":"1","article-title":"A novel blockchain based electronic health record automation system for healthcare","author":"Chelladurai","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.1016\/j.eswa.2022.119259_b12","doi-asserted-by":"crossref","first-page":"58546","DOI":"10.1109\/ACCESS.2020.2983300","article-title":"A secure ai-driven architecture for automated insurance systems: Fraud detection and risk measurement","volume":"8","author":"Dhieb","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2022.119259_b13","series-title":"Kdd, Vol. 96","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"Ester","year":"1996"},{"key":"10.1016\/j.eswa.2022.119259_b14","doi-asserted-by":"crossref","DOI":"10.1108\/JFC-06-2014-0032","article-title":"Financial fraud in the private health insurance sector in Australia: Perspectives from the industry","author":"Flynn","year":"2015","journal-title":"Journal of Financial Crime"},{"issue":"4","key":"10.1016\/j.eswa.2022.119259_b15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00655-z","article-title":"Gradient boosted decision tree algorithms for medicare fraud detection","volume":"2","author":"Hancock","year":"2021","journal-title":"SN Computer Science"},{"key":"10.1016\/j.eswa.2022.119259_b16","article-title":"Identifying health insurance claim frauds using mixture of clinical concepts","author":"Haque","year":"2021","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.eswa.2022.119259_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijmedinf.2019.104040","article-title":"Blockchain in healthcare and health sciences\u2014A scoping review","volume":"134","author":"Hasselgren","year":"2020","journal-title":"International Journal of Medical Informatics"},{"key":"10.1016\/j.eswa.2022.119259_b18","series-title":"Asia-Pacific conference on simulated evolution and learning","first-page":"74","article-title":"Application of genetic algorithm and k-nearest neighbour method in medical fraud detection","author":"He","year":"1998"},{"issue":"2","key":"10.1016\/j.eswa.2022.119259_b19","doi-asserted-by":"crossref","first-page":"130","DOI":"10.20965\/jaciii.2000.p0130","article-title":"Application of genetic algorithm and K-nearest neighbour method in real world medical fraud detection problem","volume":"4","author":"He","year":"2000","journal-title":"Journal of the Advance Computer Intelligence and Intelligent Informatics"},{"issue":"4","key":"10.1016\/j.eswa.2022.119259_b20","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0957-4174(97)00045-6","article-title":"Application of neural networks to detection of medical fraud","volume":"13","author":"He","year":"1997","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b21","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10729-018-9460-8","article-title":"Approaches for identifying US medicare fraud in provider claims data","volume":"23","author":"Herland","year":"2020","journal-title":"Health Care Management Science"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-018-0138-3","article-title":"Big data fraud detection using multiple medicare data sources","volume":"5","author":"Herland","year":"2018","journal-title":"Journal of Big Data"},{"key":"10.1016\/j.eswa.2022.119259_b23","series-title":"Kdd, Vol. 98","first-page":"58","article-title":"An efficient approach to clustering in large multimedia databases with noise","author":"Hinneburg","year":"1998"},{"issue":"6","key":"10.1016\/j.eswa.2022.119259_b24","first-page":"1139","article-title":"Trajectory-based community detection","volume":"67","author":"Jiang","year":"2019","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"issue":"4","key":"10.1016\/j.eswa.2022.119259_b25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00656-y","article-title":"Medical provider embeddings for healthcare fraud detection","volume":"2","author":"Johnson","year":"2021","journal-title":"SN Computer Science"},{"issue":"3","key":"10.1016\/j.eswa.2022.119259_b26","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10729-015-9317-3","article-title":"Multi-stage methodology to detect health insurance claim fraud","volume":"19","author":"Johnson","year":"2016","journal-title":"Health Care Management Science"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b27","first-page":"194","article-title":"Using data mining to detect health care fraud and abuse: a review of literature","volume":"7","author":"Joudaki","year":"2015","journal-title":"Global Journal of Health Science"},{"year":"2014","series-title":"Medicare fraud, progress made, but more action needed to address medicare fraud, waste and abuse:.","author":"King","key":"10.1016\/j.eswa.2022.119259_b28"},{"key":"10.1016\/j.eswa.2022.119259_b29","doi-asserted-by":"crossref","unstructured":"Kumar,\u00a0M., Ghani,\u00a0R., & Mei,\u00a0Z.-S. (2010). Data mining to predict and prevent errors in health insurance claims processing. In Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 65\u201374).","DOI":"10.1145\/1835804.1835816"},{"key":"10.1016\/j.eswa.2022.119259_b30","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.future.2019.08.029","article-title":"Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs","volume":"102","author":"Lucas","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2022.119259_b31","series-title":"2010 IEEE international conference on data mining workshops","first-page":"600","article-title":"Unsupervised DRG upcoding detection in healthcare databases","author":"Luo","year":"2010"},{"key":"10.1016\/j.eswa.2022.119259_b32","doi-asserted-by":"crossref","first-page":"143256","DOI":"10.1109\/ACCESS.2020.3013962","article-title":"Sequence mining and prediction-based healthcare fraud detection methodology","volume":"8","author":"Matloob","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2022.119259_b33","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.jnca.2019.02.027","article-title":"Blockchain in healthcare applications: Research challenges and opportunities","volume":"135","author":"McGhin","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b34","doi-asserted-by":"crossref","first-page":"42","DOI":"10.3758\/BRM.42.1.42","article-title":"Multitree: A computer program for the analysis of multinomial processing tree models","volume":"42","author":"Moshagen","year":"2010","journal-title":"Behavior Research Methods"},{"key":"10.1016\/j.eswa.2022.119259_b35","first-page":"1","article-title":"Design a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for health record transaction in block chain","author":"Mubarakali","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.1016\/j.eswa.2022.119259_b36","first-page":"419","article-title":"Unsupervised anomaly detection of healthcare providers using generative adversarial networks","volume":"12066","author":"Naidoo","year":"2020","journal-title":"Responsible Design, Implementation and Use of Information and Communication Technology"},{"key":"10.1016\/j.eswa.2022.119259_b37","series-title":"CHI\u201903 extended abstracts on human factors in computing systems","first-page":"650","article-title":"Using ethnography to design a mass detection tool (MDT) for the early discovery of insurance fraud","author":"Ormerod","year":"2003"},{"key":"10.1016\/j.eswa.2022.119259_b38","first-page":"26","article-title":"A medical claim fraud\/abuse detection system based on data mining: A case study in Chile","volume":"6","author":"Ortega","year":"2006","journal-title":"DMIN"},{"key":"10.1016\/j.eswa.2022.119259_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106384","article-title":"Deep learning for financial applications: A survey","volume":"93","author":"Ozbayoglu","year":"2020","journal-title":"Applied Soft Computing"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b40","first-page":"6","article-title":"Employer strategies to combat health care plan fraud","volume":"7","author":"Pflaum","year":"1991","journal-title":"Benefits Quarterly"},{"issue":"5","key":"10.1016\/j.eswa.2022.119259_b41","doi-asserted-by":"crossref","first-page":"4943","DOI":"10.1007\/s12652-020-01934-y","article-title":"Comprehensive analysis for class imbalance data with concept drift using ensemble based classification","volume":"12","author":"Priya","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.1016\/j.eswa.2022.119259_b42","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.future.2019.07.069","article-title":"A general framework based on dynamic multi-objective evolutionary algorithms for handling feature drifts on data streams","volume":"102","author":"Sahmoud","year":"2020","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"10.1016\/j.eswa.2022.119259_b43","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1023\/A:1009745219419","article-title":"Density-based clustering in spatial databases: The algorithm gdbscan and its applications","volume":"2","author":"Sander","year":"1998","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"3","key":"10.1016\/j.eswa.2022.119259_b44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3068335","article-title":"DBSCAN revisited, revisited: why and how you should (still) use DBSCAN","volume":"42","author":"Schubert","year":"2017","journal-title":"ACM Transactions on Database Systems"},{"issue":"8","key":"10.1016\/j.eswa.2022.119259_b45","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.1007\/s00500-019-03857-z","article-title":"Medical big data analysis: preserving security and privacy with hybrid cloud technology","volume":"23","author":"Shanmugapriya","year":"2019","journal-title":"Soft Computing"},{"issue":"3","key":"10.1016\/j.eswa.2022.119259_b46","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1197\/jamia.M2672","article-title":"Healthcare fraud: whose problem is it anyway?","volume":"15","author":"Simborg","year":"2008","journal-title":"Journal of the American Medical Informatics Association"},{"key":"10.1016\/j.eswa.2022.119259_b47","series-title":"2017 international conference on inventive computing and informatics (ICICI)","first-page":"920","article-title":"Survey of density based clustering algorithms and its variants","author":"Singh","year":"2017"},{"key":"10.1016\/j.eswa.2022.119259_b48","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/1432597","article-title":"Decision support system (dss) for fraud detection in health insurance claims using genetic support vector machines (gsvms)","volume":"2019","author":"Sowah","year":"2019","journal-title":"Journal of Engineering"},{"key":"10.1016\/j.eswa.2022.119259_b49","article-title":"Holistic approach to fraud management in health insurance","volume":"32","author":"\u0160tefan","year":"2008","journal-title":"Journal of Information and Organizational Sciences"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b50","first-page":"1","article-title":"Distance-based clustering challenges for unbiased benchmarking studies","volume":"11","author":"Thrun","year":"2021","journal-title":"Scientific Reports"},{"key":"10.1016\/j.eswa.2022.119259_b51","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.accinf.2016.04.001","article-title":"Outlier detection in healthcare fraud: A case study in the medicaid dental domain","volume":"21","author":"van Capelleveen","year":"2016","journal-title":"International Journal of Accounting Information Systems"},{"issue":"3","key":"10.1016\/j.eswa.2022.119259_b52","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","article-title":"On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms","volume":"8","author":"Yamanishi","year":"2004","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"10.1016\/j.eswa.2022.119259_b53","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.eswa.2005.09.003","article-title":"A process-mining framework for the detection of healthcare fraud and abuse","volume":"31","author":"Yang","year":"2006","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2022.119259_b54","doi-asserted-by":"crossref","first-page":"25210","DOI":"10.1109\/ACCESS.2020.2970614","article-title":"A fraud detection method for low-frequency transaction","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2022.119259_b55","doi-asserted-by":"crossref","first-page":"129002","DOI":"10.1109\/ACCESS.2020.3009006","article-title":"Big data-driven abnormal behavior detection in healthcare based on association rules","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417422022771?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417422022771?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T06:09:56Z","timestamp":1714543796000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417422022771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":55,"alternative-id":["S0957417422022771"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2022.119259","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"WMTDBC: An unsupervised multivariate analysis model for fraud detection in health insurance claims","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2022.119259","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"119259"}}