{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T23:06:05Z","timestamp":1774479965670,"version":"3.50.1"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":4,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s12530-025-09698-6","type":"journal-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T21:50:55Z","timestamp":1749073855000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Healthcare fraud detection using adaptive learning and deep learning techniques"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5425-2321","authenticated-orcid":false,"given":"Irum","family":"Matloob","sequence":"first","affiliation":[]},{"given":"Shoab","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Rukaiya","family":"Rukaiya","sequence":"additional","affiliation":[]},{"given":"Hessa","family":"Alfraihi","sequence":"additional","affiliation":[]},{"given":"Javed","family":"Ali Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"issue":"9","key":"9698_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.36347\/sjet.2023.v11i09.003","volume":"11","author":"S Agarwal","year":"2023","unstructured":"Agarwal S (2023) An intelligent machine learning approach for fraud detection in medical claim insurance: a comprehensive study. Scholars J Eng Technol 11(9):191\u2013200","journal-title":"Scholars J Eng Technol"},{"key":"9698_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad AYAB (2024) Fraud prevention in insurance: Biometric identity verification and ai-based risk assessment. In: 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), volume\u00a01, pages 1\u20136","DOI":"10.1109\/ICKECS61492.2024.10616613"},{"key":"9698_CR3","unstructured":"Alliance CH (2023) Commonwell health alliance. https:\/\/www.commonwellalliance.org"},{"issue":"3","key":"9698_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10462-016-9483-9","volume":"47","author":"W Altaf","year":"2017","unstructured":"Altaf W, Shahbaz M, Guergachi A (2017) Applications of association rule mining in health informatics: a survey. Artif Intell Rev 47(3):313\u2013340","journal-title":"Artif Intell Rev"},{"key":"9698_CR5","doi-asserted-by":"crossref","unstructured":"Anbarasi M, Dhivya S (2017) Fraud detection using outlier predictor in health insurance data. In: 2017 International Conference on Information Communication and Embedded Systems (ICICES), pp 1\u20136. IEEE","DOI":"10.1109\/ICICES.2017.8070750"},{"issue":"4","key":"9698_CR6","first-page":"99","volume":"13","author":"A Bara","year":"2009","unstructured":"Bara A, Botha I, Diaconita V, Lungu I, Velicanu A, Velicanu M (2009) A model for business intelligence systems\u2019 development. Inf Econ 13(4):99","journal-title":"Inf Econ"},{"key":"9698_CR7","first-page":"25","volume":"2","author":"B Baran","year":"1987","unstructured":"Baran B (1987) The technological transformation of white-collar work: a case study of the insurance industry. Comput Chips Pap Clips 2:25\u201362","journal-title":"Comput Chips Pap Clips"},{"key":"9698_CR8","doi-asserted-by":"crossref","unstructured":"Bauder RA, Khoshgoftaar TM (2016a) A novel method for fraudulent medicare claims detection from expected payment deviations (application paper). In: 2016 IEEE 17th international conference on information reuse and integration (IRI), pp. 11\u201319, IEEE","DOI":"10.1109\/IRI.2016.11"},{"key":"9698_CR9","doi-asserted-by":"crossref","unstructured":"Bauder RA, Khoshgoftaar TM (2016b) A probabilistic programming approach for outlier detection in healthcare claims. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA), pp 347\u2013354, IEEE","DOI":"10.1109\/ICMLA.2016.0063"},{"key":"9698_CR10","doi-asserted-by":"crossref","unstructured":"Bauder RA, Khoshgoftaar TM (2018) The detection of medicare fraud using machine learning methods with excluded provider labels. In: The Thirty-First International Flairs Conference","DOI":"10.1109\/ICMLA.2017.00-48"},{"key":"9698_CR11","doi-asserted-by":"crossref","unstructured":"Bauder RA, Khoshgoftaar TM, Richter A, Herland M (2016). Predicting medical provider specialties to detect anomalous insurance claims. In: 2016 IEEE 28th international conference on tools with artificial intelligence (ICTAI), pp 784\u2013790, IEEE","DOI":"10.1109\/ICTAI.2016.0123"},{"key":"9698_CR12","unstructured":"Bieberstein N (2006) Service-oriented architecture compass: business value, planning, and enterprise roadmap. FT Press"},{"key":"9698_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.artmed.2017.01.004","volume":"76","author":"R Cai","year":"2017","unstructured":"Cai R, Liu M, Hu Y, Melton BL, Matheny ME, Xu H, Duan L, Waitman LR (2017) Identification of adverse drug-drug interactions through causal association rule discovery from spontaneous adverse event reports. Artif Intell Med 76:7\u201315","journal-title":"Artif Intell Med"},{"key":"9698_CR14","first-page":"13","volume":"46","author":"S Carta","year":"2019","unstructured":"Carta S, Fenu G, Recupero DR, Saia R (2019) Fraud detection for e-commerce transactions by employing a prudential multiple consensus model. J Inf Secur Appl 46:13\u201322","journal-title":"J Inf Secur Appl"},{"key":"9698_CR15","doi-asserted-by":"crossref","unstructured":"Chandola V, Sukumar SR, Schryver JC (2013) Knowledge discovery from massive healthcare claims data. In: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1312\u20131320, ACM","DOI":"10.1145\/2487575.2488205"},{"key":"9698_CR16","unstructured":"Corporation C (2023a) Cerner electronic health records. https:\/\/www.cerner.com"},{"key":"9698_CR17","unstructured":"Corporation ES (2023b) Epic electronic health records. https:\/\/www.epic.com"},{"key":"9698_CR18","doi-asserted-by":"crossref","unstructured":"Cui H, Li Q, Li H, Yan Z (2016) Healthcare fraud detection based on trustworthiness of doctors. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp 74\u201381, IEEE","DOI":"10.1109\/TrustCom.2016.0048"},{"issue":"2","key":"9698_CR19","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1002\/sam.11408","volume":"12","author":"T Ekin","year":"2019","unstructured":"Ekin T, Lakomski G, Musal RM (2019) An unsupervised bayesian hierarchical method for medical fraud assessment. Stat Anal Data Min: ASA Data Sci J 12(2):116\u2013124","journal-title":"Stat Anal Data Min: ASA Data Sci J"},{"issue":"2","key":"9698_CR20","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1057\/s41288-020-00201-7","volume":"47","author":"M Eling","year":"2022","unstructured":"Eling M, Nuessle D, Staubli J (2022) The impact of artificial intelligence along the insurance value chain and on the insurability of risks. The Geneva Papers on Risk and Insurance-Issues and Practice 47(2):205\u2013241","journal-title":"The Geneva Papers on Risk and Insurance-Issues and Practice"},{"issue":"2","key":"9698_CR21","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1089\/big.2014.0060","volume":"3","author":"K Feldman","year":"2015","unstructured":"Feldman K, Chawla NV (2015) Does medical school training relate to practice? evidence from big data. Big data 3(2):103\u2013113","journal-title":"Big data"},{"key":"9698_CR22","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/34.192473","volume":"7","author":"I Gath","year":"1989","unstructured":"Gath I, Geva AB (1989) Unsupervised optimal fuzzy clustering. IEEE Transactions on Pattern Analysis & Machine Intelligence 7:773\u2013780","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"issue":"1","key":"9698_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-01905-0","volume":"5","author":"M Gupta","year":"2014","unstructured":"Gupta M, Gao J, Aggarwal C, Han J (2014) Outlier detection for temporal data. Synthesis Lectures on Data Mining and Knowledge Discovery 5(1):1\u2013129","journal-title":"Synthesis Lectures on Data Mining and Knowledge Discovery"},{"key":"9698_CR24","doi-asserted-by":"crossref","unstructured":"Herland M, Bauder RA, Khoshgoftaar TM (2017). Medical provider specialty predictions for the detection of anomalous medicare insurance claims. In 2017 IEEE International Conference on Information Reuse and Integration (IRI), pages 579\u2013588. IEEE","DOI":"10.1109\/IRI.2017.29"},{"key":"9698_CR25","doi-asserted-by":"publisher","DOI":"10.1201\/9781420090413","volume-title":"Information discovery on electronic health records","author":"V Hristidis","year":"2009","unstructured":"Hristidis V (2009) Information discovery on electronic health records. CRC Press"},{"key":"9698_CR26","unstructured":"Huang Z, Lu X, Duan H (2012). Anomaly detection in clinical processes. In AMIA Annual Symposium Proceedings, volume 2012, page 370. American Medical Informatics Association"},{"key":"9698_CR27","doi-asserted-by":"crossref","unstructured":"Itri B, Mohamed Y, Mohammed Q, Omar B (2019). Performance comparative study of machine learning algorithms for automobile insurance fraud detection. In 2019 Third International Conference on Intelligent Computing in Data Sciences (ICDS), pages 1\u20134. IEEE","DOI":"10.1109\/ICDS47004.2019.8942277"},{"key":"9698_CR28","doi-asserted-by":"crossref","unstructured":"Ivan M-L (2014). Characteristics of in-memory business intelligence. Informatica Economica, 18(3)","DOI":"10.12948\/issn14531305\/18.3.2014.02"},{"issue":"1","key":"9698_CR29","first-page":"194","volume":"7","author":"H Joudaki","year":"2015","unstructured":"Joudaki H, Rashidian A, Minaei-Bidgoli B, Mahmoodi M, Geraili B, Nasiri M, Arab M (2015) Using data mining to detect health care fraud and abuse: a review of literature. Global J Health Sci 7(1):194","journal-title":"Global J Health Sci"},{"key":"9698_CR30","unstructured":"Jr JBH, Tobin CE (2020) The false claims act and government healthcare programs: A comprehensive guide to legal liability. Journal of Health Law and Policy 12(3):145\u2013165"},{"key":"9698_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02490-0","volume-title":"Advances in Neuro-Information Processing: 15th International Conference, ICONIP 2008, Auckland, New Zealand, November 25\u201328, 2008, Revised Selected Papers,","author":"M K\u00f6ppen","year":"2009","unstructured":"K\u00f6ppen M, Kasabov N, Coghill G (2009) Advances in Neuro-Information Processing: 15th International Conference, ICONIP 2008, Auckland, New Zealand, November 25\u201328, 2008, Revised Selected Papers, vol 5507. Springer"},{"key":"9698_CR32","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.asoc.2015.07.018","volume":"36","author":"I Kose","year":"2015","unstructured":"Kose I, Gokturk M, Kilic K (2015) An interactive machine-learning-based electronic fraud and abuse detection system in healthcare insurance. Appl Soft Comput 36:283\u2013299","journal-title":"Appl Soft Comput"},{"key":"9698_CR33","doi-asserted-by":"crossref","unstructured":"Kowshalya G, Nandhini M (2018). Predicting fraudulent claims in automobile insurance. In 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pages 1338\u20131343. IEEE","DOI":"10.1109\/ICICCT.2018.8473034"},{"key":"9698_CR34","doi-asserted-by":"crossref","unstructured":"Lenard MJ, Alam P (2005). Application of fuzzy logic to fraud detection. In Encyclopedia of Information Science and Technology, First Edition, pages 135\u2013139. IGI Global","DOI":"10.4018\/978-1-59140-553-5.ch026"},{"issue":"3","key":"9698_CR35","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10729-007-9045-4","volume":"11","author":"J Li","year":"2008","unstructured":"Li J, Huang K, Jin J, Shi J (2008) A survey on statistical methods for health care fraud detection. Health Care Manag Sci 11(3):275\u2013287","journal-title":"Health Care Manag Sci"},{"key":"9698_CR36","doi-asserted-by":"crossref","unstructured":"Liu G, Guo J, Zuo Y, Wu J, Guo R-y (2020). Fraud detection via behavioral sequence embedding. Knowledge and Information Systems, pages 1\u201324","DOI":"10.1007\/s10115-019-01433-3"},{"issue":"2","key":"9698_CR37","first-page":"33","volume":"37","author":"J Liu","year":"2016","unstructured":"Liu J, Bier E, Wilson A, Guerra-Gomez JA, Honda T, Sricharan K, Gilpin L, Davies D (2016) Graph analysis for detecting fraud, waste, and abuse in healthcare data. AI Mag 37(2):33\u201346","journal-title":"AI Mag"},{"key":"9698_CR38","unstructured":"Liu Q, Vasarhelyi M (2013). Healthcare fraud detection: A survey and a clustering model incorporating geo-location information. In 29th world continuous auditing and reporting symposium (29WCARS), Brisbane, Australia"},{"issue":"15","key":"9698_CR39","doi-asserted-by":"publisher","first-page":"5144","DOI":"10.3390\/app10155144","volume":"10","author":"I Matloob","year":"2020","unstructured":"Matloob I, Khan S, Hussain F et al (2020) Medical health benefit management system for real-time notification of fraud using historical medical records. Appl Sci 10(15):5144","journal-title":"Appl Sci"},{"key":"9698_CR40","doi-asserted-by":"publisher","first-page":"143256","DOI":"10.1109\/ACCESS.2020.3013962","volume":"8","author":"I Matloob","year":"2020","unstructured":"Matloob I, Khan SA, Rahman HU (2020) Sequence mining and prediction-based healthcare fraud detection methodology. IEEE Access 8:143256\u2013143273","journal-title":"IEEE Access"},{"key":"9698_CR41","doi-asserted-by":"crossref","unstructured":"Kaushik Keshav, Akashdeep Bhardwaj, Ashutosh Dhar Dwivedi, Rajani Singh (2022) \"Machine learning-based regression framework to predict health insurance premiums.\" International Journal of Environmental Research and Public Health 19, no. 13 : 7898","DOI":"10.3390\/ijerph19137898"},{"key":"9698_CR42","doi-asserted-by":"crossref","unstructured":"Vuddanti Sowjanya, VGSK Rishi Kumar Jamili, Sadhvik Reddy Bommareddy, Vivek Rotta, and Vamsi Pagadala (2024) \"Machine Learning Insights into Personalized Insurance Pricing.\" In 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 923\u2013927. IEEE,","DOI":"10.1109\/ICSCSS60660.2024.10625562"},{"key":"9698_CR43","doi-asserted-by":"crossref","unstructured":"Jyothsna, Chaparala, K. Srinivas, Bandi Bhargavi, Akuri Eswar Sravanth, Atmuri Trinadh Kumar, JNVR Swarup Kumar (2022) \"Health insurance premium prediction using XGBoost Regressor.\" In 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), pp. 1645\u20131652. IEEE","DOI":"10.1109\/ICAAIC53929.2022.9793258"},{"key":"9698_CR44","doi-asserted-by":"publisher","first-page":"32060","DOI":"10.1109\/ACCESS.2022.3149480","volume":"10","author":"I Fursov","year":"2022","unstructured":"Fursov I, Kovtun E, Rivera-Castro R, Zaytsev A, Khasyanov R, Spindler M, Burnaev E (2022) Sequence embeddings help detect insurance fraud. IEEE Access 10:32060\u201332074","journal-title":"IEEE Access"},{"key":"9698_CR45","doi-asserted-by":"crossref","unstructured":"Mavundla Khulekani, Surendra Thakur, Emmanuel Adetiba, Abdultaofeek Abayomi (2024) \"Predicting Cross-Selling Health Insurance Products Using Machine-Learning Techniques.\" Journal of Computer Information Systems : 1\u201318","DOI":"10.1080\/08874417.2024.2395913"},{"issue":"1","key":"9698_CR46","doi-asserted-by":"publisher","first-page":"188","DOI":"10.32996\/jcsts.2025.7.1.14","volume":"7","author":"R Dey","year":"2025","unstructured":"Dey R, Roy A, Akter J, Mishra A, Sarkar M (2025) AI-driven machine learning for fraud detection and risk management in US healthcare billing and insurance. Journal of Computer Science and Technology Studies 7(1):188\u2013198","journal-title":"Journal of Computer Science and Technology Studies"},{"key":"9698_CR47","doi-asserted-by":"crossref","unstructured":"Zhang Guoming, Zhang Xuyun, Bilal, Muhammad, Dou, Wanchun, Xu, Xiaolong,Rodrigues, Joel JPC (2022) \"Identifying fraud in medical insurance based on blockchain and deep learning.\" Future Generation Computer Systems, vol. 130, pp. 140\u2013154, Elsevier","DOI":"10.1016\/j.future.2021.12.006"},{"key":"9698_CR48","unstructured":"MEDITECH (2023). Clinical decision support systems. https:\/\/www.meditech.com"},{"issue":"12","key":"9698_CR49","doi-asserted-by":"publisher","first-page":"8628","DOI":"10.1016\/j.eswa.2010.06.095","volume":"37","author":"RM Musal","year":"2010","unstructured":"Musal RM (2010) Two models to investigate medicare fraud within unsupervised databases. Expert Syst Appl 37(12):8628\u20138633","journal-title":"Expert Syst Appl"},{"issue":"2","key":"9698_CR50","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s00595-008-3821-8","volume":"39","author":"A Okita","year":"2009","unstructured":"Okita A, Yamashita M, Abe K, Nagai C, Matsumoto A, Akehi M, Yamashita R, Ishida N, Seike M, Yokota S et al (2009) Variance analysis of a clinical pathway of video-assisted single lobectomy for lung cancer. Surg Today 39(2):104\u2013109","journal-title":"Surg Today"},{"issue":"1","key":"9698_CR51","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.cmpb.2013.07.004","volume":"112","author":"C Ou-Yang","year":"2013","unstructured":"Ou-Yang C, Agustianty S, Wang H-C (2013) Developing a data mining approach to investigate association between physician prescription and patient outcome-a study on re-hospitalization in stevens-johnson syndrome. Comput Methods Programs Biomed 112(1):84\u201391","journal-title":"Comput Methods Programs Biomed"},{"issue":"2","key":"9698_CR52","first-page":"133","volume":"14","author":"JH Palmer","year":"2021","unstructured":"Palmer JH, Carter SM (2021) Misuse and fraud in the u.s. medicaid program: A case study of systemic challenges and policy responses. Journal of Health Policy and Management 14(2):133\u2013145","journal-title":"Journal of Health Policy and Management"},{"key":"9698_CR53","doi-asserted-by":"crossref","unstructured":"Peng J, Li Q, Li H, Liu L, Yan Z, Zhang S (2018). Fraud detection of medical insurance employing outlier analysis. In 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)), pages 341\u2013346. IEEE","DOI":"10.1109\/CSCWD.2018.8465273"},{"key":"9698_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100438","volume":"25","author":"S Ramalingam","year":"2024","unstructured":"Ramalingam S, Subramanian M, Sreevallabha Reddy A, Tarakaramu N, Ijaz Khan M, Abdullaev S, Dhahbi S (2024) Exploring business intelligence applications in the healthcare industry: A comprehensive analysis. Egyptian Informatics Journal 25:100438","journal-title":"Egyptian Informatics Journal"},{"issue":"1","key":"9698_CR55","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/bdcc7010004","volume":"7","author":"T Reis","year":"2022","unstructured":"Reis T, Kreibich A, Bruchhaus S, Krause T, Freund F, Bornschlegl MX, Hemmje ML (2022) An information system supporting insurance use cases by automated anomaly detection. Big Data and Cognitive Computing 7(1):4","journal-title":"Big Data and Cognitive Computing"},{"key":"9698_CR56","doi-asserted-by":"crossref","unstructured":"Savino JO, Turvey BE (2018). Medicaid\/medicare fraud. In False Allegations, pages 89\u2013108. Elsevier","DOI":"10.1016\/B978-0-12-801250-5.00005-7"},{"key":"9698_CR57","doi-asserted-by":"crossref","unstructured":"Seo J, Mendelevitch O (2017). Identifying frauds and anomalies in medicare-b dataset. In 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pages 3664\u20133667. IEEE","DOI":"10.1109\/EMBC.2017.8037652"},{"key":"9698_CR58","doi-asserted-by":"crossref","unstructured":"Sowah RA, Kuuboore M, Ofoli A, Kwofie S, Asiedu L, Koumadi KM, Apeadu KO (2019). Decision support system (dss) for fraud detection in health insurance claims using genetic support vector machines (gsvms). Journal of Engineering, 2019","DOI":"10.1155\/2019\/1432597"},{"key":"9698_CR59","unstructured":"Subudhi S, Panigrahi S (2017). Use of optimized fuzzy c-means clustering and supervised classifiers for automobile insurance fraud detection. Journal of King Saud University-Computer and Information Sciences"},{"key":"9698_CR60","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1016\/j.protcy.2013.12.140","volume":"9","author":"D Thornton","year":"2013","unstructured":"Thornton D, Mueller RM, Schoutsen P, Van Hillegersberg J (2013) Predicting healthcare fraud in medicaid: a multidimensional data model and analysis techniques for fraud detection. Procedia Technol 9:1252\u20131264","journal-title":"Procedia Technol"},{"key":"9698_CR61","first-page":"684","volume":"2","author":"D Thornton","year":"2014","unstructured":"Thornton D, van Capelleveen G, Poel M, van Hillegersberg J, Mueller RM (2014) Outlier-based health insurance fraud detection for us medicaid data. In ICEIS 2:684\u2013694","journal-title":"In ICEIS"},{"key":"9698_CR62","first-page":"26","volume":"6","author":"PA Ortega","year":"2006","unstructured":"Ortega PA, Figueroa CJ, Ruz GA (2006) A Medical Claim Fraud\/Abuse Detection System based on Data Mining: A Case Study in Chile. DMIN 6:26\u201329","journal-title":"DMIN"},{"key":"9698_CR63","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.artmed.2016.11.003","volume":"74","author":"G Toti","year":"2016","unstructured":"Toti G, Vilalta R, Lindner P, Lefer B, Macias C, Price D (2016) Analysis of correlation between pediatric asthma exacerbation and exposure to pollutant mixtures with association rule mining. Artif Intell Med 74:44\u201352","journal-title":"Artif Intell Med"},{"key":"9698_CR64","unstructured":"Travaille P, M\u00fcller RM, Thornton D, Van Hillegersberg J (2011). Electronic fraud detection in the us medicaid healthcare program: Lessons learned from other industries. In AMCIS"},{"issue":"6","key":"9698_CR65","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.jbi.2010.08.002","volume":"43","author":"J Van de Klundert","year":"2010","unstructured":"Van de Klundert J, Gorissen P, Zeemering S (2010) Measuring clinical pathway adherence. J Biomed Inform 43(6):861\u2013872","journal-title":"J Biomed Inform"},{"key":"9698_CR66","doi-asserted-by":"crossref","unstructured":"Verma A, Taneja A, Arora A (2017). Fraud detection and frequent pattern matching in insurance claims using data mining techniques. In 2017 Tenth International Conference on Contemporary Computing (IC3), pages 1\u20137. IEEE","DOI":"10.1109\/IC3.2017.8284299"},{"key":"9698_CR67","doi-asserted-by":"crossref","unstructured":"Vinora A, Surya V, Lloyds E, Kathir Pandian B, Deborah RN, Gobinath A (2023). An efficient health insurance prediction system using machine learning. In 2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pages 1\u20135","DOI":"10.1109\/ICSES60034.2023.10465334"},{"key":"9698_CR68","doi-asserted-by":"crossref","unstructured":"Vosseler A (2022). Unsupervised insurance fraud prediction based on anomaly detector ensembles. Risks, 10(7)","DOI":"10.3390\/risks10070132"},{"issue":"1","key":"9698_CR69","first-page":"23","volume":"11","author":"JT Wells","year":"2019","unstructured":"Wells JT (2019) Healthcare fraud: Understanding and combating provider and patient schemes. J Forensic Investig Account 11(1):23\u201340","journal-title":"J Forensic Investig Account"},{"issue":"1","key":"9698_CR70","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.eswa.2005.09.003","volume":"31","author":"W-S Yang","year":"2006","unstructured":"Yang W-S, Hwang S-Y (2006) A process-mining framework for the detection of healthcare fraud and abuse. Expert Syst Appl 31(1):56\u201368","journal-title":"Expert Syst Appl"},{"issue":"1","key":"9698_CR71","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.eswa.2005.09.003","volume":"31","author":"W-S Yang","year":"2006","unstructured":"Yang W-S, Hwang S-Y (2006) A process-mining framework for the detection of healthcare fraud and abuse. Expert Syst Appl 31(1):56\u201368","journal-title":"Expert Syst Appl"},{"issue":"3","key":"9698_CR72","first-page":"751","volume":"68","author":"B Zafari","year":"2019","unstructured":"Zafari B, Ekin T (2019) Topic modelling for medical prescription fraud and abuse detection. J Roy Stat Soc: Ser C (Appl Stat) 68(3):751\u2013769","journal-title":"J Roy Stat Soc: Ser C (Appl Stat)"},{"key":"9698_CR73","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.resourpol.2016.07.013","volume":"49","author":"L Zeng","year":"2016","unstructured":"Zeng L, Wang B, Fan L, Wu J (2016) Analyzing sustainability of chinese mining cities using an association rule mining approach. Resour Policy 49:394\u2013404","journal-title":"Resour Policy"},{"key":"9698_CR74","volume":"110","author":"W Li","year":"2025","unstructured":"Li W, Zhang H, Chen M (2025) A short-term wind power prediction method via self-adaptive spatiotemporal graph neural networks. Computers & Electrical Engineering 110:110106","journal-title":"Computers & Electrical Engineering"},{"key":"9698_CR75","volume":"110","author":"W Li","year":"2025","unstructured":"Li W, Zhang H, Chen M (2025) A short-term wind power prediction method via self-adaptive spatiotemporal graph neural networks. Computers & Electrical Engineering 110:110106","journal-title":"Computers & Electrical Engineering"},{"key":"9698_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.107221","volume":"101","author":"A Hekmat","year":"2024","unstructured":"Hekmat A, Li Z (2024) An attention-fused architecture for brain tumor diagnosis. Biomed Signal Process Control 101:107221","journal-title":"Biomed Signal Process Control"},{"key":"9698_CR77","volume":"150","author":"L Zhang","year":"2024","unstructured":"Zhang L, Wang Q, Liu Y (2024) Adaptive decision-making with deep Q-network for heterogeneous UAV swarms. Appl Soft Comput 150:112366","journal-title":"Appl Soft Comput"},{"key":"9698_CR78","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1007\/s12530-024-09616-2","volume":"6","author":"MA Khan","year":"2024","unstructured":"Khan MA, Khan S, Haider S, Khan SA, Bilal O (2024) Evolving knowledge representation learning with the dynamic asymmetric embedding model. Evol Syst 6:2323\u20132338","journal-title":"Evol Syst"},{"key":"9698_CR79","volume":"220","author":"T Alrawili","year":"2025","unstructured":"Alrawili T, Alzahrani B, Khan MA (2025) Comprehensive survey: Biometric user authentication application, evaluation, and discussion. J Netw Comput Appl 220:103652","journal-title":"J Netw Comput Appl"},{"key":"9698_CR80","first-page":"11845","volume":"12","author":"F Arif","year":"2024","unstructured":"Arif F, Mehmood R, Katib I, Albeshri A (2024) Towards Efficient Energy Utilization Using Big Data Analytics in Smart Cities for Electricity Theft Detection. IEEE Access 12:11845\u201311859","journal-title":"IEEE Access"},{"key":"9698_CR81","volume":"245","author":"L Si-Ahmed","year":"2024","unstructured":"Si-Ahmed L, Hafid A, Samhat AE (2024) Survey of Machine Learning based intrusion detection methods for Internet of Medical Things. Comput Netw 245:110947","journal-title":"Comput Netw"},{"key":"9698_CR82","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111668","volume":"294","author":"S Khan","year":"2024","unstructured":"Khan S, Ali H, Ahmad I, Shah MA, Lee S (2024) Evolving knowledge representation learning with the dynamic asymmetric embedding model. Knowl-Based Syst 294:110309","journal-title":"Knowl-Based Syst"}],"updated-by":[{"DOI":"10.1007\/s12530-025-09741-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000}}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-025-09698-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-025-09698-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-025-09698-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T18:02:42Z","timestamp":1758564162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-025-09698-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":82,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["9698"],"URL":"https:\/\/doi.org\/10.1007\/s12530-025-09698-6","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"23 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised due to change in fourth author name and deletion of first affiliation for all co-authors.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2025","order":7,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":8,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s12530-025-09741-6","URL":"https:\/\/doi.org\/10.1007\/s12530-025-09741-6","order":10,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"72"}}