Finlayson Et Al 2019
Finlayson Et Al 2019
Finlayson Et Al 2019
P OLICY FORUM ing images, audio, text, and other inputs (1).
Cutting-edge adversarial techniques gen-
MACHINE LEARNING erally use optimization theory to find small
data manipulations likely to fool a targeted
W
ith public and academic attention some of the most direct impacts of machine- “adversarial noise” was iteratively optimized
increasingly focused on the new learning algorithms come in the context of to have maximum disruptive effect on the
role of machine learning in the insurance claims approvals. Billions of medi- model’s interpretation of the image without
case of structured data such as billing codes, The anatomy of an adversarial attack
adversarial techniques could be used to au- Demonstration of how adversarial attacks against various medical AI systems might be
tomate the discovery of code combinations executed without requiring any overtly fraudulent misrepresentation of the data.
that maximize reimbursement or minimize
the probability of claims rejection. Original image Adversarial noise Adversarial example
Because adversarial attacks have been
demonstrated for virtually every class of ma-
chine-learning algorithms ever studied, from
simple and readily interpretable methods
such as logistic regression to more compli- + 0.04 𰀘 =
cated methods such as deep neural networks
(1), this is not a problem specific to medicine,
and every domain of machine-learning ap-
plication will need to contend with it. Re- Dermatoscopic image of a benign Perturbation computed Combined image of nevus and
searchers have sought to develop algorithms melanocytic nevus, along with the by a common adversarial attack perturbation and the
that are resilient to adversarial attacks, such diagnostic probability computed attack technique. diagnostic probabilities from
as by training algorithms with exposure to by a deep neural network. See (7) for details. the same deep neural network.
adversarial examples or using clever data Benign Benign
processing to mitigate potential tampering Malignant Malignant
(1). Early efforts in this area are promising,
adversarial attacks may already be in place. ample, are inclined to report exaggerated an- to achieve the same end result as upcoding
To illustrate existing behaviors, we look to esthesia times to increase revenue (12). without ever committing overt fraud.
the modern U.S. medical billing industry. In other circumstances, subtle billing
Medical claims codes determine reim- code adjustments fall within a gray zone A GROWTH INDUSTRY
bursement for a patient visit after they between fraud and well-intentioned best As the machine-learning tool kit used by
have been approved by a payer. To evaluate practices. In one striking example, the web- insurance companies and their contrac-
these claims, payers typically leverage au- site of the Endocrine Society recommends tors continues to expand, the same dynam-
tomated fraud detectors, powered increas- that providers do not bill for the Interna- ics that favor creative billing practices in
ingly by machine learning. Health care tional Classification of Diseases (ICD) code the present may expand to include more
providers have long exerted influence on 277.77 (metabolic syndrome) in patients sophisticated adversarial attacks. Adver-
payers’ decisions (the algorithmic outputs) with obesity, as this combination of code sarial methods could allow billing teams to
by shaping their records (and accompany- and condition is likely to result in a denial scale up upcoding practices without getting
ing codes) of patient visits (the inputs) (5). of coverage (13). Instead, the Society recom- flagged by fraud detectors. Many insurance
Published by AAAS
companies are beginning to require other A PATH FORWARD original hash to that of the data fed through
data types such as imaging and text to prove An essential question remains: when and how a targeted algorithm would allow investi-
that claims are valid. As they do so, other to intervene. Here, the early history of the in- gators to determine if that data had been
styles of adversarial attacks may be used as ternet offers a lesson. The approach to net- tampered with or changed after acquisition.
well to try to continue to dodge detection. work architecture introduced at the advent of Such an intervention would rely on a health
For example, if an insurance company the internet was centered around the defer- IT infrastructure capable of supporting the
requires that an image from a mole be run ral of problems. In their essential 1984 paper, capture and secure storage of these hashes.
through a melanoma classifier before ap- Saltzer et al. describe a design ethos whereby But as a strictly regulated field with a focus
proving reimbursement for an excision, problems are to be solved at the end points on accountability and standards of proce-
fraudsters may at first be inclined to submit of a network by users rather than preemp- dure, health care may be very well suited to
moles from different patients to achieve ap- tively within the architecture of the network such adaptations.
proval. If insurance companies then begin itself (14). There is frequently an advantage The coalescence of strong motives to
utilizing human audits or technical tests (in terms of simplicity, flexibility, and scalabil- manipulate algorithms and the rapid pro-
to try to ensure that the images are com- ity) to leaving future problems unsolved until liferation of algorithms vulnerable to manip-
ing from the correct patient, the next round their time has come. Another description for ulation makes health care a plausible ground
would be to move to full adversarial attacks this is the “procrastination principle” (15). zero for the emergence of adversarial exam-
with imperceptible alterations, such as in The procrastination principle frames a dif- ples into real-world practice. As adversarial
the top figure. Simpler techniques such as ficult question: Should the adversarial-exam- examples emerge across a range of domains,
the rotation in the bottom ples problem in health care we will have to make choices again and again
figure could constitute an “An essential systems be addressed now— about whether and how to intervene early at
RELATED http://stm.sciencemag.org/content/scitransmed/10/457/eaar7939.full
CONTENT
http://stm.sciencemag.org/content/scitransmed/10/471/eaao5333.full
http://stm.sciencemag.org/content/scitransmed/3/102/102ra95.full
http://stm.sciencemag.org/content/scitransmed/7/274/274ra16.full
REFERENCES This article cites 8 articles, 1 of which you can access for free
http://science.sciencemag.org/content/363/6433/1287#BIBL
PERMISSIONS http://www.sciencemag.org/help/reprints-and-permissions
Science (print ISSN 0036-8075; online ISSN 1095-9203) is published by the American Association for the Advancement of
Science, 1200 New York Avenue NW, Washington, DC 20005. The title Science is a registered trademark of AAAS.
Copyright © 2019, American Association for the Advancement of Science
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: