{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:07:37Z","timestamp":1767337657215},"reference-count":43,"publisher":"Ubiquity Press, Ltd.","issue":"1","license":[{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CODATA"],"DOI":"10.5334\/dsj-2019-035","type":"journal-article","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T07:37:12Z","timestamp":1563349032000},"page":"35","source":"Crossref","is-referenced-by-count":9,"title":["Abnormal Pattern Prediction: Detecting Fraudulent Insurance Property Claims with Semi-Supervised Machine-Learning"],"prefix":"10.5334","volume":"18","author":[{"given":"Sebasti\u00e1n M.","family":"Palacio","sequence":"first","affiliation":[]}],"member":"3285","published-online":{"date-parts":[[2019,7,17]]},"reference":[{"key":"key20190717033705_B1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-319-14142-8_8","volume-title":"Data mining","year":"2015"},{"issue":"7","key":"key20190717033705_B2","first-page":"2509","article-title":"\u2018Online fraud detection-a review\u2019","volume":"4","year":"2017","journal-title":"International Research Journal of Engineering and Technology"},{"key":"key20190717033705_B3","first-page":"220","volume-title":"Computational Intelligence for Financial Engineering (CIFEr)","year":"1997"},{"key":"key20190717033705_B4","volume-title":"Outliers in statistical data","year":"1994"},{"issue":"4","key":"key20190717033705_B5","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1111\/1468-0440.00080","article-title":"\u2018A model for the detection of insurance fraud\u2019","volume":"25","year":"2000","journal-title":"The Geneva Papers on Risk and Insurance-Issues and Practice"},{"key":"key20190717033705_B6","first-page":"702","article-title":"Evolutionary, my dear Watson investigating committee-based evolution of fuzzy rules for the detection of suspicious insurance claims","year":"2000"},{"issue":"439","key":"key20190717033705_B7","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1080\/01621459.1997.10474038","article-title":"\u2018Modeling discrete choice with response error: Food stamp participation\u2019","volume":"92","year":"1997","journal-title":"Journal of the American Statistical Association"},{"issue":"1","key":"key20190717033705_B8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"\u2018Random forests\u2019","volume":"45","year":"2001","journal-title":"Machine learning"},{"issue":"3","key":"key20190717033705_B9","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1111\/1539-6975.00027","article-title":"\u2018Fraud classification using principal component analysis of ridits\u2019","volume":"69","year":"2002","journal-title":"Journal of Risk and insurance"},{"key":"key20190717033705_B10","first-page":"245","article-title":"\u2018Using Kohonen\u2019s self-organizing feature map to uncover automobile bodily injury claims fraud\u2019","year":"1998","journal-title":"Journal of Risk and Insurance"},{"key":"key20190717033705_B11","first-page":"111","article-title":"\u2018A fuzzy system for detecting anomalous behaviors in healthcare provider claims\u2019","year":"1995","journal-title":"Intelligent Systems for Finance and Business"},{"key":"key20190717033705_B12","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","year":"1996","journal-title":"Kdd"},{"key":"key20190717033705_B13","year":"2013"},{"issue":"3","key":"key20190717033705_B14","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/34.990138","article-title":"\u2018Unsupervised learning of finite mixture models\u2019","volume":"24","year":"2002","journal-title":"Transactions on pattern analysis and machine intelligence"},{"issue":"466","key":"key20190717033705_B15","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1198\/016214504000000287","article-title":"\u2018Variable selection in data mining: Building a predictive model for bankruptcy\u2019","volume":"99","year":"2004","journal-title":"Journal of the American Statistical Association"},{"key":"key20190717033705_B16","first-page":"148","volume-title":"ICML","year":"1996"},{"issue":"1","key":"key20190717033705_B17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","article-title":"\u2018Extremely randomized trees\u2019","volume":"63","year":"2006","journal-title":"Machine learning"},{"key":"key20190717033705_B18","first-page":"1322","volume-title":"IJCNN (World Congress on Computational Intelligence)","year":"2008"},{"issue":"2","key":"key20190717033705_B19","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","article-title":"\u2018A survey of outlier detection methodologies\u2019","volume":"22","year":"2004","journal-title":"Artificial intelligence review"},{"key":"key20190717033705_B20","first-page":"3146","article-title":"Lightgbm: A highly efficient gradient boosting decision tree","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"key20190717033705_B21","first-page":"405","volume-title":"Evolutionary Computation","year":"2003"},{"key":"key20190717033705_B22","first-page":"107","article-title":"On atypical database transactions: identification of probable frauds using machine learning for user profiling","year":"1997"},{"issue":"1","key":"key20190717033705_B23","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.neucom.2011.02.021","article-title":"\u2018Improved competitive learning neural networks for network intrusion and fraud detection\u2019","volume":"75","year":"2012","journal-title":"Neurocomputing"},{"key":"key20190717033705_B24","first-page":"413","article-title":"Isolation forest","year":"2008"},{"issue":"7","key":"key20190717033705_B25","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1002\/int.4550070709","article-title":"\u2018A hybrid knowledge\/statistical-based system for the detection of fraud\u2019","volume":"7","year":"1992","journal-title":"International Journal of Intelligent Systems"},{"key":"key20190717033705_B26","first-page":"139","article-title":"\u2018One-class svms for document classification\u2019","volume":"2","year":"2001","journal-title":"Journal of Machine Learning research"},{"key":"key20190717033705_B27","first-page":"251","article-title":"Unsupervised profiling for identifying superimposed fraud","year":"1999"},{"issue":"1","key":"key20190717033705_B28","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jfds.2016.03.001","article-title":"\u2018Auto insurance fraud detection using unsupervised spectral ranking for anomaly\u2019","volume":"2","year":"2016","journal-title":"The Journal of Finance and Data Science"},{"issue":"1","key":"key20190717033705_B29","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1007730.1007738","article-title":"\u2018Minority report in fraud detection: classification of skewed data\u2019","volume":"6","year":"2004","journal-title":"Acm sigkdd explorations newsletter"},{"key":"key20190717033705_B30","article-title":"\u2018A comprehensive survey of data mining-based fraud detection research\u2019","year":"2010","journal-title":"arXiv preprint arXiv:1009.6119"},{"issue":"3","key":"key20190717033705_B31","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1080\/00401706.1999.10485670","article-title":"\u2018A fast algorithm for the minimum covariance determinant estimator\u2019","volume":"41","year":"1999","journal-title":"Technometrics"},{"issue":"7","key":"key20190717033705_B32","article-title":"\u2018Estimating the support of a high-dimensional distribution\u2019","volume":"13","year":"2001","journal-title":"Neural computation"},{"key":"key20190717033705_B33","first-page":"1177","article-title":"Web-scale k-means clustering","year":"2010"},{"key":"key20190717033705_B34","first-page":"1491","article-title":"Insurance fraud evaluation: a fuzzy expert system","year":"2001"},{"key":"key20190717033705_B35","article-title":"\u2018The utility of clustering in prediction tasks\u2019","year":"2015","journal-title":"arXiv preprint arXiv:1509.06163"},{"issue":"66\u201371","key":"key20190717033705_B36","first-page":"13","article-title":"\u2018Dimensionality reduction: a comparative\u2019","volume":"10","year":"2009","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"key20190717033705_B37","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.ejor.2005.08.005","article-title":"\u2018Strategies for detecting fraudulent claims in the automobile insurance industry\u2019","volume":"176","year":"2007","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"key20190717033705_B38","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1007730.1007734","article-title":"\u2018Mining with rarity: a unifying framework\u2019","volume":"6","year":"2004","journal-title":"ACM Sigkdd Explorations Newsletter"},{"key":"key20190717033705_B39","first-page":"184","article-title":"Evolutionary hot spots data mining","year":"1999"},{"key":"key20190717033705_B40","first-page":"340","article-title":"Mining the knowledge mine","year":"1997"},{"key":"key20190717033705_B41","first-page":"1","article-title":"\u2018An analytical approach to detecting insurance fraud using logistic regression\u2019","volume":"1","year":"2009","journal-title":"Journal of Finance and Accountancy"},{"key":"key20190717033705_B42","first-page":"321","article-title":"\u2018Learning with local and global consistency\u2019","year":"2004","journal-title":"Advances in neural information processing systems"},{"key":"key20190717033705_B43","volume-title":"Technical report, CMU-CALD-02-107","year":"2002"}],"container-title":["Data Science Journal"],"original-title":[],"link":[{"URL":"https:\/\/doi.org\/10.5334\/dsj-2019-035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T09:34:18Z","timestamp":1695029658000},"score":1,"resource":{"primary":{"URL":"https:\/\/datascience.codata.org\/article\/10.5334\/dsj-2019-035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,17]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1,3]]}},"URL":"https:\/\/doi.org\/10.5334\/dsj-2019-035","relation":{},"ISSN":["1683-1470"],"issn-type":[{"value":"1683-1470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,17]]}}}