Skip to main content
Top
Published in: BMC Medical Informatics and Decision Making 1/2023

Open Access 01-12-2023 | Research

Procedure code overutilization detection from healthcare claims using unsupervised deep learning methods

Authors: Michael Suesserman, Samantha Gorny, Daniel Lasaga, John Helms, Dan Olson, Edward Bowen, Sanmitra Bhattacharya

Published in: BMC Medical Informatics and Decision Making | Issue 1/2023

Login to get access

Abstract

Background

Fraud, Waste, and Abuse (FWA) in medical claims have a negative impact on the quality and cost of healthcare. A major component of FWA in claims is procedure code overutilization, where one or more prescribed procedures may not be relevant to a given diagnosis and patient profile, resulting in unnecessary and unwarranted treatments and medical payments. This study aims to identify such unwarranted procedures from millions of healthcare claims. In the absence of labeled examples of unwarranted procedures, the study focused on the application of unsupervised machine learning techniques.

Methods

Experiments were conducted with deep autoencoders to find claims containing anomalous procedure codes indicative of FWA, and were compared against a baseline density-based clustering model. Diagnoses, procedures, and demographic data associated with healthcare claims were used as features for the models. A dataset of one hundred thousand claims sampled from a larger claims database is used to initially train and tune the models, followed by experimentations on a dataset with thirty-three million claims. Experimental results show that the autoencoder model, when trained with a novel feature-weighted loss function, outperforms the density-based clustering approach in finding potential outlier procedure codes.

Results

Given the unsupervised nature of our experiments, model performance was evaluated using a synthetic outlier test dataset, and a manually annotated outlier test dataset. Precision, recall and F1-scores on the synthetic outlier test dataset for the autoencoder model trained on one hundred thousand claims were 0.87, 1.0 and 0.93, respectively, while the results for these metrics on the manually annotated outlier test dataset were 0.36, 0.86 and 0.51, respectively. The model performance on the manually annotated outlier test dataset improved further when trained on the larger thirty-three million claims dataset with precision, recall and F1-scores of 0.48, 0.90 and 0.63, respectively.

Conclusions

This study demonstrates the feasibility of leveraging unsupervised, deep-learning methods to identify potential procedure overutilization from healthcare claims.
Appendix
Available only for authorised users
Literature
4.
go back to reference Rosenbaum S, Lopez N, Stifler S. Health insurance fraud: an overview. Washington: Department of Health Policy, School of Public Health and Health Services, The George Washington University; 2009. Rosenbaum S, Lopez N, Stifler S. Health insurance fraud: an overview. Washington: Department of Health Policy, School of Public Health and Health Services, The George Washington University; 2009.
6.
go back to reference Bauder R, Khoshgoftaar TM, Seliya N. A survey on the state of healthcare upcoding fraud analysis and detection. Health Serv Outcomes Res Method. 2017;17:31–55.CrossRef Bauder R, Khoshgoftaar TM, Seliya N. A survey on the state of healthcare upcoding fraud analysis and detection. Health Serv Outcomes Res Method. 2017;17:31–55.CrossRef
7.
go back to reference Joudaki H, Rashidian A, Minaei-Bidgoli B, Mahmoodi M, Geraili B, Nasiri M, et al. Using data mining to detect health care fraud and abuse: a review of literature. GJHS. 2014;7:194.CrossRefPubMedPubMedCentral Joudaki H, Rashidian A, Minaei-Bidgoli B, Mahmoodi M, Geraili B, Nasiri M, et al. Using data mining to detect health care fraud and abuse: a review of literature. GJHS. 2014;7:194.CrossRefPubMedPubMedCentral
8.
go back to reference Johnson JM, Khoshgoftaar TM. Medicare fraud detection using neural networks. J Big Data. 2019;6:63.CrossRef Johnson JM, Khoshgoftaar TM. Medicare fraud detection using neural networks. J Big Data. 2019;6:63.CrossRef
9.
go back to reference Bauder R, da Rosa R, Khoshgoftaar T. Identifying medicare provider fraud with unsupervised machine learning. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI). Salt Lake City, UT: IEEE; 2018. p. 285–92.CrossRef Bauder R, da Rosa R, Khoshgoftaar T. Identifying medicare provider fraud with unsupervised machine learning. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI). Salt Lake City, UT: IEEE; 2018. p. 285–92.CrossRef
10.
go back to reference Kanksha, Bhaskar A, Pande S, Malik R, Khamparia A. An intelligent unsupervised technique for fraud detection in health care systems. IDT. 2021;15:127–39. Kanksha, Bhaskar A, Pande S, Malik R, Khamparia A. An intelligent unsupervised technique for fraud detection in health care systems. IDT. 2021;15:127–39.
11.
go back to reference Nassery N, Segal JB, Chang E, Bridges JFP. Systematic overuse of healthcare services: a conceptual model. Appl Health Econ Health Policy. 2015;13:1–6.CrossRefPubMedPubMedCentral Nassery N, Segal JB, Chang E, Bridges JFP. Systematic overuse of healthcare services: a conceptual model. Appl Health Econ Health Policy. 2015;13:1–6.CrossRefPubMedPubMedCentral
13.
go back to reference Best Care at Lower Cost. The path to continuously learning health care in America. Washington, D.C.: National Academies Press; 2013. Best Care at Lower Cost. The path to continuously learning health care in America. Washington, D.C.: National Academies Press; 2013.
16.
go back to reference Brownlee S, Chalkidou K, Doust J, Elshaug AG, Glasziou P, Heath I, et al. Evidence for overuse of medical services around the world. Lancet. 2017;390:156–68.CrossRefPubMedPubMedCentral Brownlee S, Chalkidou K, Doust J, Elshaug AG, Glasziou P, Heath I, et al. Evidence for overuse of medical services around the world. Lancet. 2017;390:156–68.CrossRefPubMedPubMedCentral
18.
go back to reference Lasaga D, Santhana P. Deep learning to detect medical treatment fraud. In: KDD 2017 Workshop on Anomaly Detection in Finance. Halifax: PMLR; 2018. p. 114–20. Lasaga D, Santhana P. Deep learning to detect medical treatment fraud. In: KDD 2017 Workshop on Anomaly Detection in Finance. Halifax: PMLR; 2018. p. 114–20.
23.
go back to reference Zhou C, Paffenroth RC. Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. 2017. p. 665–74.CrossRef Zhou C, Paffenroth RC. Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. 2017. p. 665–74.CrossRef
24.
go back to reference Ester M, Kriegel HP, Sander J, Xu X. A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. Portland: AAAI Press; 1996. p. 226–31. Ester M, Kriegel HP, Sander J, Xu X. A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining. Portland: AAAI Press; 1996. p. 226–31.
25.
go back to reference Zhang W, He X. An Anomaly Detection Method for Medicare Fraud Detection. In: 2017 IEEE International Conference on Big Knowledge (ICBK). Hefei, China: IEEE; 2017. p. 309–14. Zhang W, He X. An Anomaly Detection Method for Medicare Fraud Detection. In: 2017 IEEE International Conference on Big Knowledge (ICBK). Hefei, China: IEEE; 2017. p. 309–14.
27.
go back to reference Rakshit P, Zaballa O, Pérez A, Gómez-Inhiesto E, Acaiturri-Ayesta MT, Lozano JA. A machine learning approach to predict healthcare cost of breast cancer patients. Sci Rep. 2021;11:12441.CrossRefPubMedPubMedCentral Rakshit P, Zaballa O, Pérez A, Gómez-Inhiesto E, Acaiturri-Ayesta MT, Lozano JA. A machine learning approach to predict healthcare cost of breast cancer patients. Sci Rep. 2021;11:12441.CrossRefPubMedPubMedCentral
28.
go back to reference Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge: MIT press; 2016. Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge: MIT press; 2016.
29.
30.
go back to reference Baldi P. Autoencoders, unsupervised learning, and deep architectures. In: Proceedings of ICML workshop on unsupervised and transfer learning. Washington: JMLR Workshop and Conference Proceedings; 2012. p. 37–49. Baldi P. Autoencoders, unsupervised learning, and deep architectures. In: Proceedings of ICML workshop on unsupervised and transfer learning. Washington: JMLR Workshop and Conference Proceedings; 2012. p. 37–49.
31.
go back to reference Lyudchik O. Outlier detection using autoencoders. 2016. Lyudchik O. Outlier detection using autoencoders. 2016.
32.
go back to reference Kramer MA. Nonlinear principal component analysis using autoassociative neural networks. AIChE J. 1991;37:233–43.CrossRef Kramer MA. Nonlinear principal component analysis using autoassociative neural networks. AIChE J. 1991;37:233–43.CrossRef
33.
go back to reference Chen J, Sathe S, Aggarwal C, Turaga D. Outlier detection with autoencoder ensembles. In: Proceedings of the 2017 SIAM international conference on data mining. Houston: SIAM; 2017. p. 90–8. Chen J, Sathe S, Aggarwal C, Turaga D. Outlier detection with autoencoder ensembles. In: Proceedings of the 2017 SIAM international conference on data mining. Houston: SIAM; 2017. p. 90–8.
34.
go back to reference Xu W, Jang-Jaccard J, Singh A, Wei Y, Sabrina F. Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset. IEEE Access. 2021;9:140136–46.CrossRef Xu W, Jang-Jaccard J, Singh A, Wei Y, Sabrina F. Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset. IEEE Access. 2021;9:140136–46.CrossRef
35.
go back to reference Javaid A, Niyaz Q, Sun W, Alam M. A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). New York City: ACM; 2016. Javaid A, Niyaz Q, Sun W, Alam M. A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). New York City: ACM; 2016.
36.
go back to reference Shvetsova N, Bakker B, Fedulova I, Schulz H, Dylov DV. Anomaly detection in medical imaging with deep perceptual autoencoders. IEEE Access. 2021;9:118571–83.CrossRef Shvetsova N, Bakker B, Fedulova I, Schulz H, Dylov DV. Anomaly detection in medical imaging with deep perceptual autoencoders. IEEE Access. 2021;9:118571–83.CrossRef
37.
go back to reference Borghesi A, Bartolini A, Lombardi M, Milano M, Benini L. Anomaly detection using autoencoders in high performance computing systems. AAAI. 2019;33:9428–33.CrossRef Borghesi A, Bartolini A, Lombardi M, Milano M, Benini L. Anomaly detection using autoencoders in high performance computing systems. AAAI. 2019;33:9428–33.CrossRef
38.
go back to reference da Rosa RC. An evaluation of unsupervised machine learning algorithms for detecting fraud and abuse in the US Medicare Insurance Program. PhD Thesis. Boca Raton: Florida Atlantic University; 2018. da Rosa RC. An evaluation of unsupervised machine learning algorithms for detecting fraud and abuse in the US Medicare Insurance Program. PhD Thesis. Boca Raton: Florida Atlantic University; 2018.
39.
go back to reference Ho Y, Wookey S. The real-world-weight cross-entropy loss function: modeling the costs of mislabeling. IEEE Access. 2020;8:4806–13.CrossRef Ho Y, Wookey S. The real-world-weight cross-entropy loss function: modeling the costs of mislabeling. IEEE Access. 2020;8:4806–13.CrossRef
40.
go back to reference McNemar Q. Note on the sampling error of the difference between correlated proportions or percentages. Psychometrika. 1947;12:153–7.CrossRefPubMed McNemar Q. Note on the sampling error of the difference between correlated proportions or percentages. Psychometrika. 1947;12:153–7.CrossRefPubMed
41.
go back to reference Dietterich TG. Approximate statistical tests for comparing supervised classification learning algorithms. Neural Comput. 1998;10:1895–923.CrossRefPubMed Dietterich TG. Approximate statistical tests for comparing supervised classification learning algorithms. Neural Comput. 1998;10:1895–923.CrossRefPubMed
42.
go back to reference Steinbuss G, Böhm K. Benchmarking unsupervised outlier detection with realistic synthetic data. ACM Trans Knowl Discov Data (TKDD). 2021;15(4):1–20.CrossRef Steinbuss G, Böhm K. Benchmarking unsupervised outlier detection with realistic synthetic data. ACM Trans Knowl Discov Data (TKDD). 2021;15(4):1–20.CrossRef
Metadata
Title
Procedure code overutilization detection from healthcare claims using unsupervised deep learning methods
Authors
Michael Suesserman
Samantha Gorny
Daniel Lasaga
John Helms
Dan Olson
Edward Bowen
Sanmitra Bhattacharya
Publication date
01-12-2023
Publisher
BioMed Central
Published in
BMC Medical Informatics and Decision Making / Issue 1/2023
Electronic ISSN: 1472-6947
DOI
https://doi.org/10.1186/s12911-023-02268-3

Other articles of this Issue 1/2023

BMC Medical Informatics and Decision Making 1/2023 Go to the issue