{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T23:20:02Z","timestamp":1771543202823,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2020YFA0908700"],"award-info":[{"award-number":["2020YFA0908700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072315"],"award-info":[{"award-number":["62072315"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073225"],"award-info":[{"award-number":["62073225"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61836005"],"award-info":[{"award-number":["61836005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Guangdong Province-Outstanding Youth Program","award":["2019B151502018"],"award-info":[{"award-number":["2019B151502018"]}]},{"name":"Guangdong","award":["2019ZT08X603"],"award-info":[{"award-number":["2019ZT08X603"]}]},{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324093808021"],"award-info":[{"award-number":["JCYJ20210324093808021"]}]},{"DOI":"10.13039\/501100010877","name":"Shenzhen Science and Technology Innovation Commission","doi-asserted-by":"publisher","award":["R2020A045"],"award-info":[{"award-number":["R2020A045"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Nanshan People&#x0027;s Hospital of Nanshan District"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tdsc.2022.3187973","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T19:27:24Z","timestamp":1657654044000},"page":"3408-3420","source":"Crossref","is-referenced-by-count":7,"title":["A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9811-1694","authenticated-orcid":false,"given":"Jie","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9533-9282","authenticated-orcid":false,"given":"Xiaonan","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of FinTech, ByteDance, Shenzhen, China"}]},{"given":"Dongyi","family":"Yi","sequence":"additional","affiliation":[{"name":"Department of Network and Technology, Shenzhen Nanshan People&#x0027;s Hospital, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1928-3704","authenticated-orcid":false,"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[{"name":"College of Engineering, IT and Environment, Charles Darwin University, Casuarina, NT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2208-962X","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"National health expenditures 2013 highlights.","year":"2015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/21551197.2015.1031592"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.28.5.1351"},{"issue":"14","key":"ref5","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1001\/jama.2012.362","article-title":"Eliminating waste in us health care","volume":"307","author":"Berwick","year":"2012","journal-title":"J. Amer. Med. Assoc."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v37i2.2630"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5539\/gjhs.v7n1p194"},{"key":"ref8","first-page":"1","article-title":"Electricity fraud detection using committee semi-supervised learning","volume-title":"Proc. Int. Joint Conf. Neural Netw.","author":"Nuno"},{"key":"ref9","first-page":"93","article-title":"Discovering inappropriate billings with local density based outlier detection method","volume-title":"Proc. Australas. Data Mining Conf.","author":"Shan"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICBK.2017.47"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2019.00064"},{"key":"ref13","first-page":"26","article-title":"A. medical claim fraud\/abuse detection system based on data mining: A case study in Chile","volume-title":"Proc. Int. Conf. Data Mining","author":"Ortega"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2018.00019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5699-4_5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0306"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2340433"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SIPROCESS.2019.8868559"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2018.01.045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887119"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2017.8037652"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2017.56"},{"key":"ref23","first-page":"103","article-title":"Unsupervised fraud detection in medicare Australia","volume-title":"Proc. Australas. Data Mining Conf.","author":"Tang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489448"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2013.77"},{"key":"ref26","first-page":"1287","article-title":"A. hybrid approach for detecting fraudulent medical insurance claims","volume-title":"Proc. Int. Conf. Auton. Agents Multiagent Syst.","author":"Sun"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref28","first-page":"139","article-title":"One-class SVMs for document classification","volume":"2","author":"Manevitz","year":"2001","journal-title":"J. Mach. Learn. Res."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.05.007"},{"key":"ref30","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ruff"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.005"},{"key":"ref32","first-page":"155","article-title":"Uniform object generation for optimizing one-class classifiers","volume":"2","author":"Tax","year":"2001","journal-title":"J. Mach. Learn. Res."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"ref34","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2883970"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2953973"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"ref38","article-title":"Dynamic graph neural networks","author":"Ma","year":"2018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737631"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2920268"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2910416"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2496974"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2344674"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2855446"},{"key":"ref45","first-page":"3844","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Defferrard"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2010.04.005"},{"key":"ref47","article-title":"Auto-encoding variational bayes","author":"Kingma","year":"2013"},{"key":"ref48","article-title":"Effective techniques of the use of data augmentation in classification tasks","author":"Maestre","year":"2018"},{"key":"ref49","article-title":"Variational graph auto-encoders","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst. Workshop Bayesian Deep Learn.","author":"Kipf"},{"key":"ref50","first-page":"186","article-title":"An application of the principle of maximum information preservation to linear systems","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Linsker"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2590023"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.506"},{"key":"ref53","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref55","article-title":"Soumith chintala, and l\u00e9on bottou","author":"Arjovsky","year":"2017","journal-title":"Wasserstein Gan"},{"key":"ref56","author":"Musgrave","year":"2020","journal-title":"Pytorch Metric Learning"},{"issue":"1","key":"ref57","first-page":"3221","article-title":"Accelerating T-SNE using tree-based algorithms","volume":"15","author":"Maaten","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref58","first-page":"2951","article-title":"Practical Bayesian optimization of machine learning algorithms","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Jasper"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10177761\/09827573.pdf?arnumber=9827573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:53:38Z","timestamp":1706763218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9827573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":58,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3187973","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}