{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:43:10Z","timestamp":1776883390811,"version":"3.51.2"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2021585"],"award-info":[{"award-number":["2021585"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01295-3","type":"journal-article","created":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T08:54:10Z","timestamp":1761209650000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A review of distinct machine learning classifiers for healthcare fraud detection"],"prefix":"10.1186","volume":"12","author":[{"given":"Ethan D.","family":"Curtis","sequence":"first","affiliation":[]},{"given":"Preston","family":"Billion-Polak","sequence":"additional","affiliation":[]},{"given":"Taghi M.","family":"Khoshgoftaar","sequence":"additional","affiliation":[]},{"given":"Borko","family":"Furht","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"1295_CR1","unstructured":"Association NHCA-F. The Challenge of Health Care Fraud\u2014NHCAA. https:\/\/www.nhcaa.org\/tools-insights\/about-health-care-fraud\/the-challenge-of-health-care-fraud\/ Accessed 05 Apr 2025."},{"key":"1295_CR2","unstructured":"Health USD, Services H. Health Care Fraud and Abuse Control Program Report (Fiscal Year 2020). Technical report, U.S. Department of Health and Human Services 2021. https:\/\/oig.hhs.gov\/reports\/all\/2021\/health-care-fraud-and-abuse-control-program-report-fiscal-year-2020\/ Accessed 02 Apr 2025."},{"key":"1295_CR3","unstructured":"SAS. Fraud detection and machine learning: what you need to know. Technical report, SAS. https:\/\/www.sas.com\/en_us\/insights\/articles\/risk-fraud\/fraud-detection-machine-learning.html Accessed 03 Apr 2025."},{"key":"1295_CR4","doi-asserted-by":"publisher","unstructured":"Leevy JL, Salekshahrezaee Z, Khoshgoftaar TM. A review of unsupervised anomaly detection techniques for health insurance fraud. In: 2024 IEEE 10th International Conference on Big Data Computing Service and Machine Learning Applications (BigDataService), 2024;141\u2013149. https:\/\/doi.org\/10.1109\/BigDataService62917.2024.00028 . ISSN: 2690-828X. https:\/\/ieeexplore.ieee.org\/document\/10729915 Accessed 02 Apr 2025.","DOI":"10.1109\/BigDataService62917.2024.00028"},{"issue":"1","key":"1295_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10742-016-0154-8","volume":"17","author":"R Bauder","year":"2017","unstructured":"Bauder R, Khoshgoftaar TM, Seliya N. A survey on the state of healthcare upcoding fraud analysis and detection. Health Serv Outcomes Res Method. 2017;17(1):31\u201355. https:\/\/doi.org\/10.1007\/s10742-016-0154-8.","journal-title":"Health Serv Outcomes Res Method"},{"key":"1295_CR6","doi-asserted-by":"crossref","unstructured":"Ikono R, Olaronke I, Oyegoke T, Olaleke, J. A meta-analysis of fraud, waste and abuse detection methods in healthcare. 2019.","DOI":"10.4314\/njt.v38i2.28"},{"issue":"C","key":"1295_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2024.103061","volume":"160","author":"A Preez","year":"2025","unstructured":"Preez A, Bhattacharya S, Beling P, Bowen E. Fraud detection in healthcare claims using machine learning: a systematic review. Artif Intell Med. 2025;160(C):103061. https:\/\/doi.org\/10.1016\/j.artmed.2024.103061.","journal-title":"Artif Intell Med"},{"issue":"1","key":"1295_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR. Induction of decision trees. Mach Learn. 1986;1(1):81\u2013106. https:\/\/doi.org\/10.1007\/BF00116251.","journal-title":"Mach Learn"},{"key":"1295_CR9","doi-asserted-by":"publisher","unstructured":"Chawla NV. Data mining for imbalanced datasets: an overview. In: Maimon, O., Rokach, L. editors. Data mining and knowledge discovery handbook, pp. 875\u2013886. Springer, Boston, MA, 2010. https:\/\/doi.org\/10.1007\/978-0-387-09823-4_45 . Accessed 02 Apr 2025.","DOI":"10.1007\/978-0-387-09823-4_45"},{"key":"1295_CR10","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I. Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. NIPS\u201917, pp. 6000\u20136010. Curran Associates Inc., Red Hook, NY, USA, 2017."},{"issue":"8","key":"1295_CR11","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J. Long short-term memory. Neural Comput. 1997;9(8):1735\u201380. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735.","journal-title":"Neural Comput"},{"issue":"02","key":"1295_CR12","doi-asserted-by":"publisher","first-page":"2450005","DOI":"10.1142\/S1469026824500056","volume":"23","author":"Z Ding","year":"2024","unstructured":"Ding Z, Zhao X, Huan R. Credit evaluation model and its application in healthcare insurance fraud detection. Int J Comput Intell Appl. 2024;23(02):2450005. https:\/\/doi.org\/10.1142\/S1469026824500056.","journal-title":"Int J Comput Intell Appl"},{"key":"1295_CR13","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C. XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery And Data Mining, 2016;785\u2013794. https:\/\/doi.org\/10.1145\/2939672.2939785 . arXiv:1603.02754 [cs]. Accessed 05 Apr 2025.","DOI":"10.1145\/2939672.2939785"},{"key":"1295_CR14","unstructured":"Ke G, Meng Q, Finley T, Wang T, Chen W, Ma W, Ye Q, Liu T-Y. LightGBM: a highly efficient gradient boosting decision tree. In: Advances in neural information processing systems, 2017;vol. 30. https:\/\/papers.nips.cc\/paper_files\/paper\/2017\/hash\/6449f44a102fde848669bdd9eb6b76fa-Abstract.html Accessed 02 Apr 2025."},{"key":"1295_CR15","doi-asserted-by":"publisher","unstructured":"Yang W, Hu W, Liu Y, Huang Y, Liu X, Zhang S. Research on bootstrapping algorithm for health insurance data fraud detection based on decision tree. In: 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 2021;57\u201362. https:\/\/doi.org\/10.1109\/BigDataSecurityHPSCIDS52275.2021.00021 . https:\/\/ieeexplore.ieee.org\/document\/9463539 Accessed 12 Apr 2025.","DOI":"10.1109\/BigDataSecurityHPSCIDS52275.2021.00021"},{"issue":"2","key":"1295_CR16","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.jeconom.2020.05.021","volume":"228","author":"H Farbmacher","year":"2022","unstructured":"Farbmacher H, L\u00f6w L, Spindler M. An explainable attention network for fraud detection in claims management. J Econometr. 2022;228(2):244\u201358. https:\/\/doi.org\/10.1016\/j.jeconom.2020.05.021.","journal-title":"J Econometr"},{"key":"1295_CR17","doi-asserted-by":"crossref","unstructured":"Matschak T, Prinz C, Rampold F, Trang S. Show me your claims and i\u2019ll tell you your offenses: machine learning-based decision support for fraud detection on medical claim data. Hawaii International Conference on System Sciences 2022;2022 (HICSS-55).","DOI":"10.24251\/HICSS.2022.454"},{"key":"1295_CR18","doi-asserted-by":"publisher","unstructured":"Mayaki MZA, Riveill M. Multiple inputs neural networks for fraud detection. In: 2022 International Conference on Machine Learning, Control, and Robotics (MLCR), 2022;8\u201313. https:\/\/doi.org\/10.1109\/MLCR57210.2022.00011 . https:\/\/ieeexplore.ieee.org\/document\/10037065 Accessed 02 Apr 2025.","DOI":"10.1109\/MLCR57210.2022.00011"},{"key":"1295_CR19","unstructured":"Gupta RA. Healthcare provider fraud detection analysis, Kaggle. https:\/\/www.kaggle.com\/datasets\/rohitrox\/healthcare-provider-fraud-detection-analysis Accessed 03 Apr 2025."},{"key":"1295_CR20","unstructured":"Chen J-P, Lu P, Yang F, Chen R, Lin K. Medical insurance fraud detection using graph neural networks with spatio-temporal constraints, 2022."},{"issue":"1","key":"1295_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1186\/s12911-023-02152-0","volume":"23","author":"J Lu","year":"2023","unstructured":"Lu J, Lin K, Chen R, Lin M, Chen X, Lu P. Health insurance fraud detection by using an attributed heterogeneous information network with a hierarchical attention mechanism. BMC Med Inform Decis Mak. 2023;23(1):62. https:\/\/doi.org\/10.1186\/s12911-023-02152-0.","journal-title":"BMC Med Inform Decis Mak"},{"key":"1295_CR22","unstructured":"Lu J-T, Lin K-B, Chen X, Chen J-P. Multibehavioral pattern-based graph neural network with topology awareness to detect healthcare fraud, 2023."},{"issue":"9","key":"1295_CR23","doi-asserted-by":"publisher","first-page":"30045","DOI":"10.1016\/j.heliyon.2024.e30045","volume":"10","author":"B Hong","year":"2024","unstructured":"Hong B, Lu P, Xu H, Lu J, Lin K, Yang F. Health insurance fraud detection based on multi-channel heterogeneous graph structure learning. Heliyon. 2024;10(9):30045. https:\/\/doi.org\/10.1016\/j.heliyon.2024.e30045.","journal-title":"Heliyon"},{"issue":"4","key":"1295_CR24","doi-asserted-by":"publisher","first-page":"3408","DOI":"10.1109\/TDSC.2022.3187973","volume":"20","author":"J Chen","year":"2023","unstructured":"Chen J, Hu X, Yi D, Alazab M, Li J. A variational autoencoder-based relational model for cost-effective automatic medical fraud detection. IEEE Trans Dependable Secure Comput. 2023;20(4):3408\u201320. https:\/\/doi.org\/10.1109\/TDSC.2022.3187973.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1295_CR25","unstructured":"Kingma DP, Welling M. Auto-Encoding Variational Bayes, 2022. arXiv:1312.6114 [stat] . Accessed 03 Apr 2025."},{"key":"1295_CR26","unstructured":"Hamilton WL, Ying R, Leskovec J. Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. NIPS\u201917, pp. 1025\u20131035. Curran Associates Inc., Red Hook, NY, USA, 2017."},{"key":"1295_CR27","doi-asserted-by":"publisher","first-page":"132786","DOI":"10.1109\/ACCESS.2024.3425892","volume":"12","author":"S Mardani","year":"2024","unstructured":"Mardani S, Moradi H. Using graph attention networks in healthcare provider fraud detection. IEEE Access. 2024;12:132786\u2013800. https:\/\/doi.org\/10.1109\/ACCESS.2024.3425892.","journal-title":"IEEE Access"},{"key":"1295_CR28","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Li\u00f2 P, Bengio Y. Graph Attention Networks, 2018 . https:\/\/openreview.net\/forum?id=rJXMpikCZ Accessed 02 Apr 2025."},{"key":"1295_CR29","unstructured":"Yun S, Jeong M, Kim R, Kang J, Kim HJ. Graph transformer networks. In: Advances in neural information processing systems, 2019;32. https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/9d63484abb477c97640154d40595a3bb-Abstract.html. Accessed 03 Apr 2025."},{"key":"1295_CR30","doi-asserted-by":"publisher","unstructured":"Ho TK. Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition. 1995;1:278\u20132821. https:\/\/doi.org\/10.1109\/ICDAR.1995.598994. Accessed 03 Apr 2025.","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"1295_CR31","doi-asserted-by":"publisher","unstructured":"Yoo Y, Shin D, Han D, Kyeong S, Shin J. Medicare fraud detection using graph neural networks. In: 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2022;1\u20135. https:\/\/doi.org\/10.1109\/ICECET55527.2022.9872963 . Accessed 03 Apr 2025.","DOI":"10.1109\/ICECET55527.2022.9872963"},{"key":"1295_CR32","doi-asserted-by":"publisher","unstructured":"Zhang R, Cheng D, Yang J, Ouyang Y, Wu X, Zheng Y, et al. Pre-trained online contrastive learning for insurance fraud detection. In: Proceedings of the AAAI Conference on Artificial Intelligence. 2024;38(20):22511\u20139. https:\/\/doi.org\/10.1609\/aaai.v38i20.30259.","DOI":"10.1609\/aaai.v38i20.30259"},{"key":"1295_CR33","doi-asserted-by":"publisher","unstructured":"Ma J, Li F, Zhang R, Xu Z, Cheng D, Ouyang Y, et al. Fighting against organized fraudsters using risk diffusion-based parallel graph neural network. 2023;6:6138\u201346. https:\/\/doi.org\/10.24963\/ijcai.2023\/681.","DOI":"10.24963\/ijcai.2023\/681"},{"key":"1295_CR34","doi-asserted-by":"publisher","unstructured":"Hancock J, Khoshgoftaar TM. Medicare Fraud Detection using CatBoost. In: 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), 2020;97\u2013103. https:\/\/doi.org\/10.1109\/IRI49571.2020.00022 . https:\/\/ieeexplore.ieee.org\/document\/9191565. Accessed 03 Apr 2025.","DOI":"10.1109\/IRI49571.2020.00022"},{"key":"1295_CR35","unstructured":"Prokhorenkova L, Gusev G, Vorobev A, Dorogush AV, Gulin A. CatBoost: unbiased boosting with categorical features. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems. NIPS\u201918, pp. 6639\u20136649. Curran Associates Inc., Red Hook, NY, USA, 2018."},{"issue":"10","key":"1295_CR36","doi-asserted-by":"publisher","first-page":"10451","DOI":"10.1109\/TKDE.2023.3240431","volume":"35","author":"H Shi","year":"2023","unstructured":"Shi H, Tayebi MA, Pei J, Cao J. Cost-sensitive learning for medical insurance fraud detection with temporal information. IEEE Trans Knowl Data Eng. 2023;35(10):10451\u201363. https:\/\/doi.org\/10.1109\/TKDE.2023.3240431.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1295_CR37","doi-asserted-by":"publisher","unstructured":"Yao J, Yu S, Wang C, Ke T, Zheng H. Medicare Fraud Detection Using WTBagging Algorithm. In: 2021 7th International Conference on Computer and Communications (ICCC), 2021;1515\u20131519. https:\/\/doi.org\/10.1109\/ICCC54389.2021.9674545.","DOI":"10.1109\/ICCC54389.2021.9674545"},{"issue":"10","key":"1295_CR38","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y. Random search for hyper-parameter optimization. J Mach Learn Res. 2012;13(10):281\u2013305.","journal-title":"J Mach Learn Res"},{"key":"1295_CR39","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-05318-5_1","volume-title":"Automated machine learning: methods, systems, challenges","author":"M Feurer","year":"2019","unstructured":"Feurer M, Hutter F. Hyperparameter optimization. In: Hutter F, Kotthoff L, Vanschoren J, editors. Automated machine learning: methods, systems, challenges. Cham: Springer; 2019. p. 3\u201333. https:\/\/doi.org\/10.1007\/978-3-030-05318-5_1."},{"issue":"1","key":"1295_CR40","doi-asserted-by":"publisher","first-page":"756","DOI":"10.11591\/ijece.v13i1.pp756-769","volume":"13","author":"JM Arockiam","year":"2023","unstructured":"Arockiam JM, Pushpanathan ACS. Mapreduce-iterative support vector machine classifier: novel fraud detection systems in healthcare insurance industry. Int J Electr Comput Eng (IJECE). 2023;13(1):756\u201369. https:\/\/doi.org\/10.11591\/ijece.v13i1.pp756-769.","journal-title":"Int J Electr Comput Eng (IJECE)"},{"issue":"2","key":"1295_CR41","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard P. The distribution of the flora in the alpine zone. N Phytolog. 1912;11(2):37\u201350.","journal-title":"N Phytolog"},{"key":"1295_CR42","doi-asserted-by":"publisher","unstructured":"Rongali AS, Nalluri M, Mupparaju CB, Bhuvanesh A. ChaoG-GRU: healthcare transaction fraud detection using chaotic iterative gazelle-based gated recurrent unit technique. In: 2024 Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), 2024;1\u20136. https:\/\/doi.org\/10.1109\/INCOS59338.2024.10527670. Accessed 03 Apr 2025.","DOI":"10.1109\/INCOS59338.2024.10527670"},{"key":"1295_CR43","doi-asserted-by":"publisher","unstructured":"Kotekani SS, Ilango V. HEMClust: an improved fraud detection model for health insurance using heterogeneous ensemble and k-prototype clustering. Int J Adv Comput Sci Appl (IJACSA) 2022. https:\/\/doi.org\/10.14569\/IJACSA.2022.0130318","DOI":"10.14569\/IJACSA.2022.0130318"},{"issue":"1","key":"1295_CR44","doi-asserted-by":"publisher","first-page":"1432597","DOI":"10.1155\/2019\/1432597","volume":"2019","author":"RA Sowah","year":"2019","unstructured":"Sowah RA, Kuuboore M, Ofoli A, Kwofie S, Asiedu L, Koumadi KM, et al. Decision support system (dss) for fraud detection in health insurance claims using genetic support vector machines (gsvms). J Eng. 2019;2019(1):1432597. https:\/\/doi.org\/10.1155\/2019\/1432597.","journal-title":"J Eng"},{"key":"1295_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122241","volume":"238","author":"N Kumaraswamy","year":"2024","unstructured":"Kumaraswamy N, Ekin T, Park C, Markey MK, Barner JC, Rascati K. Using a bayesian belief network to detect healthcare fraud. Expert Syst Appl. 2024;238:122241. https:\/\/doi.org\/10.1016\/j.eswa.2023.122241.","journal-title":"Expert Syst Appl"},{"key":"1295_CR46","doi-asserted-by":"publisher","unstructured":"Ormerod T, Morley N, Ball L, Langley C, Spenser C. Using ethnography to design a mass detection tool (MDT) for the early discovery of insurance fraud. In: CHI \u201903 Extended Abstracts on Human Factors in Computing Systems. CHI EA \u201903, pp. 650\u2013651. Association for Computing Machinery, New York, NY, USA, 2003. https:\/\/doi.org\/10.1145\/765891.765910. Accessed 02 Apr 2025.","DOI":"10.1145\/765891.765910"},{"issue":"1","key":"1295_CR47","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1186\/s40537-023-00825-1","volume":"10","author":"JL Leevy","year":"2023","unstructured":"Leevy JL, Hancock J, Khoshgoftaar TM, Abdollah Zadeh A. Investigating the effectiveness of one-class and binary classification for fraud detection. J Big Data. 2023;10(1):157. https:\/\/doi.org\/10.1186\/s40537-023-00825-1.","journal-title":"J Big Data"},{"key":"1295_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114750","volume":"175","author":"Z Li","year":"2021","unstructured":"Li Z, Huang M, Liu G, Jiang C. A hybrid method with dynamic weighted entropy for handling the problem of class imbalance with overlap in credit card fraud detection. Expert Syst Appl. 2021;175:114750. https:\/\/doi.org\/10.1016\/j.eswa.2021.114750.","journal-title":"Expert Syst Appl"},{"key":"1295_CR49","doi-asserted-by":"publisher","first-page":"143256","DOI":"10.1109\/ACCESS.2020.3013962","volume":"8","author":"I Matloob","year":"2020","unstructured":"Matloob I, Khan SA, Rahman HU. Sequence mining and prediction-based healthcare fraud detection methodology. IEEE Access. 2020;8:143256\u201373. https:\/\/doi.org\/10.1109\/ACCESS.2020.3013962.","journal-title":"IEEE Access"},{"issue":"6","key":"1295_CR50","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s10815-013-9991-3","volume":"30","author":"Y Tokura","year":"2013","unstructured":"Tokura Y, Yoshino O, Ogura-Nose S, Motoyama H, Harada M, Osuga Y, et al. The significance of serum anti-m\u00fcllerian hormone (amh) levels in patients over age 40 in first ivf treatment. J Assist Reprod Genet. 2013;30(6):821\u20135. https:\/\/doi.org\/10.1007\/s10815-013-9991-3.","journal-title":"J Assist Reprod Genet"},{"key":"1295_CR51","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.eswa.2018.01.037","volume":"100","author":"J Jurgovsky","year":"2018","unstructured":"Jurgovsky J, Granitzer M, Ziegler K, Calabretto S, Portier P-E, He-Guelton L, et al. Sequence classification for credit-card fraud detection. Expert Syst Appl. 2018;100:234\u201345. https:\/\/doi.org\/10.1016\/j.eswa.2018.01.037.","journal-title":"Expert Syst Appl"},{"key":"1295_CR52","doi-asserted-by":"publisher","unstructured":"Bauder RA, Khoshgoftaar TM. medicare fraud detection using machine learning methods. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 858\u2013865 (2017). https:\/\/doi.org\/10.1109\/ICMLA.2017.00-48 . https:\/\/ieeexplore.ieee.org\/document\/8260744. Accessed 04 Apr 2025.","DOI":"10.1109\/ICMLA.2017.00-48"},{"issue":"3","key":"1295_CR53","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/s10742-017-0172-1","volume":"17","author":"RA Bauder","year":"2017","unstructured":"Bauder RA, Khoshgoftaar TM. Multivariate outlier detection in medicare claims payments applying probabilistic programming methods. Health Serv Outcomes Res Method. 2017;17(3):256\u201389. https:\/\/doi.org\/10.1007\/s10742-017-0172-1.","journal-title":"Health Serv Outcomes Res Method"},{"issue":"2","key":"1295_CR54","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"BW Matthews","year":"1975","unstructured":"Matthews BW. Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochimica et Biophysica Acta (BBA) Protein Struct. 1975;405(2):442\u201351. https:\/\/doi.org\/10.1016\/0005-2795(75)90109-9.","journal-title":"Biochimica et Biophysica Acta (BBA) Protein Struct"},{"key":"1295_CR55","unstructured":"Centers for medicare and medicaid services: research, statistics, data, and systems, 2017. https:\/\/data.cms.gov\/. Accessed 18 Aug 2025."},{"key":"1295_CR56","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-36182-0_14","volume-title":"Discov Sci","author":"Y Peng","year":"2002","unstructured":"Peng Y, Flach PA, Soares C, Brazdil P. Improved dataset characterisation for meta-learning. In: Lange S, Satoh K, Smith CH, editors. Discov Sci. Berlin: Springer; 2002. p. 141\u201352. https:\/\/doi.org\/10.1007\/3-540-36182-0_14."},{"issue":"1","key":"1295_CR57","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss K, Khoshgoftaar TM, Wang D. A survey of transfer learning. J Big Data. 2016;3(1):9. https:\/\/doi.org\/10.1186\/s40537-016-0043-6.","journal-title":"J Big Data"},{"key":"1295_CR58","doi-asserted-by":"publisher","unstructured":"Islam Prova NN. Healthcare fraud detection using machine learning. In: 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet Of Things (ICoICI), 2024;1119\u20131123. https:\/\/doi.org\/10.1109\/ICoICI62503.2024.10696476. Accessed 04 Apr 2025.","DOI":"10.1109\/ICoICI62503.2024.10696476"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01295-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01295-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01295-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T21:02:15Z","timestamp":1761253335000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01295-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1295"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01295-3","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"26 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"238"}}