{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T05:36:45Z","timestamp":1733981805112,"version":"3.30.2"},"reference-count":31,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2021,3,24]]},"abstract":"Healthcare is an essential part of people\u2019s lives, particularly for the elderly population, and also should be economical. Medicare is one particular healthcare plan. Claims fraud is a significant contributor to increased healthcare expenses, though the effect of it could be lessened by fraud detection. In this paper, an analysis of various machine learning techniques was done to identify Medicare fraud. The isolated forest an unsupervised machine learning algorithm which improves overall performance while detecting fraud based upon outliers. The goal of this specific paper is generally to show probable dishonest providers on the ground of their allegations. Obtained results were found more promising compared to existing techniques. Around 98.76% accuracy is obtained using an isolated forest algorithm.<\/jats:p>","DOI":"10.3233\/idt-200052","type":"journal-article","created":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T18:35:55Z","timestamp":1617129355000},"page":"127-139","source":"Crossref","is-referenced-by-count":8,"title":["An intelligent unsupervised technique for fraud detection in health care systems"],"prefix":"10.1177","volume":"15","author":[{"family":"Kanksha","sequence":"first","affiliation":[]},{"given":"Aman","family":"Bhaskar","sequence":"additional","affiliation":[]},{"given":"Sagar","family":"Pande","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Khamparia","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/IDT-200052_ref1","unstructured":"Aisha A, Mohd Aizaini M, Zainal A. Fraud detection system: A survey. Journal of Network and Computer Applications in Elsevier. 2016."},{"issue":"2","key":"10.3233\/IDT-200052_ref2","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1108\/lht-01-2019-0023","article-title":"Multi-level framework for anomaly detection in social networking","volume":"38","author":"Khamparia","year":"2020","journal-title":"LHT"},{"issue":"3","key":"10.3233\/IDT-200052_ref3","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10729-015-9317-3","article-title":"Multi-stage methodology to detect health insurance claim fraud","volume":"19","author":"Johnson","year":"2015","journal-title":"Health Care Manag Sci"},{"key":"10.3233\/IDT-200052_ref4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.vhri.2016.03.003","article-title":"Value and service quality assessment of the national health insurance scheme in Ghana: Evidence from ashiedu keteke district","volume":"10","author":"Nsiah-Boateng","year":"2016","journal-title":"Value in Health Regional Issues"},{"key":"10.3233\/IDT-200052_ref5","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/ICMLA.2017.00-48","article-title":"Medicare fraud detection using machine learning methods","author":"Bauder","year":"2017","journal-title":"2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)"},{"key":"10.3233\/IDT-200052_ref6","doi-asserted-by":"crossref","unstructured":"Bauder RA, Khoshgoftaar TM. The detection of medicare fraud using machine learning methods with excluded provider labels. Artificial Intelligence Research Society Conference. 2018.","DOI":"10.1109\/ICMLA.2017.00-48"},{"key":"10.3233\/IDT-200052_ref7","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","article-title":"Fraud detection system: A survey","volume":"68","author":"Abdallah","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"10.3233\/IDT-200052_ref8","unstructured":"Fursova I, Zaytseva A, Khasyanova R, Spindlerb M, Burnaeva E. Sequence embeddings help to identify fraudulent cases in healthcare insurance. Preprint submitted to Journal of Econometrics. 2018."},{"key":"10.3233\/IDT-200052_ref9","doi-asserted-by":"crossref","unstructured":"Farbmacher H, L\u00f6w L, Spindler M. An explainable attention network for fraud detection in claims management. Journal of Econometrics. 2020; Available from: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304407620302852.","DOI":"10.1016\/j.jeconom.2020.05.021"},{"key":"10.3233\/IDT-200052_ref10","first-page":"5","article-title":"A survey on SMOTE deep: Novel link based classifier for fraud detection","author":"Kruthika","year":"2020","journal-title":"International Journal of Computer Science Engineering Techniques"},{"key":"10.3233\/IDT-200052_ref11","unstructured":"Resa A, Hariman B. Fraud awareness in indonesian governmental Sector: Multi-agency responses. Fraud Awareness in Indonesian Governmental Sector: Multi-Agency Responses. 2020."},{"key":"10.3233\/IDT-200052_ref12","unstructured":"David A, Ricardo B, Jo\u00e3o B, Jo\u00e3o TA, Pedro B. ARMS: Automated rules management system for fraud detection. Computer Science. 2020."},{"key":"10.3233\/IDT-200052_ref13","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.3390\/app10031056","article-title":"Fraud detection of bulk cargo theft in port using bayesian network models","volume":"10","author":"Song","year":"2020","journal-title":"Applied Sciences"},{"key":"10.3233\/IDT-200052_ref14","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.future.2019.08.029","article-title":"Towards automated feature engineering for credit card fraud detection using multi-perspective HMMs","volume":"102","author":"Lucas","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/IDT-200052_ref15","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/978-981-32-9515-5_22","article-title":"Credit card fraud detection","author":"Janbandhu","year":"2020","journal-title":"Computing in Engineering and Technology"},{"key":"10.3233\/IDT-200052_ref16","unstructured":"Shanjiang T, Bingsheng H, Ce Y, Yusen L, Kun L. A survey on spark ecosystem: Big data processing in- frastructure, machine learning, and applications. IEEE Transactions on Knowledge and Data Engineering."},{"issue":"3","key":"10.3233\/IDT-200052_ref17","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1016\/j.ejor.2019.10.015","article-title":"From one-class to two-class classification by incorporating expert knowledge: Novelty detection in human behaviour","volume":"282","author":"Oosterlinck","year":"2020","journal-title":"Eur J Oper Res"},{"key":"10.3233\/IDT-200052_ref18","first-page":"109","article-title":"Anonymized credit card transaction using machine learning techniques","author":"Padhi","year":"2020","journal-title":"Advances in Intelligent Computing and Communication Lecture Notes in Networks and Systems"},{"issue":"7","key":"10.3233\/IDT-200052_ref19","doi-asserted-by":"publisher","first-page":"2685","DOI":"10.1007\/s10115-019-01433-3","article-title":"Fraud detection via behavioral sequence embedding","volume":"62","author":"Liu","year":"2020","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"10.3233\/IDT-200052_ref20","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/tdsc.2009.11","article-title":"BLAST-SSAHA hybridization for credit card fraud detection","volume":"6","author":"Kundu","year":"2009","journal-title":"IEEE Trans Dependable and Secure Comput"},{"issue":"8","key":"10.3233\/IDT-200052_ref21","doi-asserted-by":"crossref","first-page":"3784","DOI":"10.1109\/TNNLS.2017.2736643","article-title":"Credit card fraud detection: A realistic modeling and a novel learning strategy","volume":"29","author":"Dal Pozzolo","year":"2018","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"3","key":"10.3233\/IDT-200052_ref22","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/tkde.2010.262","article-title":"Resilient identity crime detection","volume":"24","author":"Phua","year":"2012","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10.3233\/IDT-200052_ref23","doi-asserted-by":"crossref","first-page":"26893","DOI":"10.1109\/ACCESS.2020.2971604","article-title":"A Systematic literature review of fraud detection metrics in business processes","volume":"8","author":"Omair","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-200052_ref24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3350532","article-title":"Hybrid wolf-bat algorithm for optimization of connection weights in multi-layer perceptron","author":"Agrawal","year":"2020","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"issue":"11","key":"10.3233\/IDT-200052_ref25","doi-asserted-by":"publisher","first-page":"8590","DOI":"10.1007\/s11227-020-03159-4","article-title":"Internet of health things-driven deep learning system for detection and classification of cervical cells using transfer learning","volume":"76","author":"Khamparia","year":"2020","journal-title":"The Journal of Supercomputing"},{"key":"10.3233\/IDT-200052_ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-2101-0"},{"issue":"3","key":"10.3233\/IDT-200052_ref27","doi-asserted-by":"publisher","first-page":"e12400","DOI":"10.1111\/exsy.12400","article-title":"A systematic review on deep learning architectures and applications","volume":"36","author":"Khamparia","year":"2019","journal-title":"Expert Systems"},{"issue":"47-48","key":"10.3233\/IDT-200052_ref28","doi-asserted-by":"publisher","first-page":"35425","DOI":"10.1007\/s11042-019-07839-z","article-title":"KDSAE: Chronic kidney disease classification with multimedia data learning using deep stacked autoencoder network","volume":"79","author":"Khamparia","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/IDT-200052_ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app10020559"},{"issue":"15","key":"10.3233\/IDT-200052_ref30","doi-asserted-by":"publisher","first-page":"11083","DOI":"10.1007\/s00521-018-3896-0","article-title":"A novel deep learning-based multi-model ensemble method for the prediction of neuromuscular disorders","volume":"32","author":"Khamparia","year":"2018","journal-title":"Neural Computing and Applications"},{"key":"10.3233\/IDT-200052_ref31","first-page":"65","article-title":"An information security scheme for cloud based environment using 3DES encryption algorithm","volume":"2","author":"Pande","year":"2014","journal-title":"International Journal of Recent Development in Engineering and Technology"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-200052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T13:38:38Z","timestamp":1733924318000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-200052"}},"subtitle":[],"editor":[{"given":"Deepak","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Castillo","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Khanna","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":31,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/idt-200052","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"type":"print","value":"1872-4981"},{"type":"electronic","value":"1875-8843"}],"subject":[],"published":{"date-parts":[[2021,3,24]]}}}