2019 Third International Conference on Inventive Systems and Control (ICISC) 2019
DOI: 10.1109/icisc44355.2019.9036460
|View full text |Cite
|
Sign up to set email alerts
|

A Naive Bayes Classifier for Detecting Unusual Customer Consumption Profiles in Power Distribution Systems - APSPDCL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…These detectors can be categorized into two main groups. The first group comprises detectors that utilize shallow ML detection algorithms such as decision trees (DTs), logistic regression (LR), Naïve Bayes, autoregressive integrated moving average (ARIMA), and support vector machines (SVM) [13], [14], [17], [33], [41], [42]. The second group consists of detectors that leverage DL detection algorithms [18], [20], [31].…”
Section: ) Machine Learning-based Methodsmentioning
confidence: 99%
“…These detectors can be categorized into two main groups. The first group comprises detectors that utilize shallow ML detection algorithms such as decision trees (DTs), logistic regression (LR), Naïve Bayes, autoregressive integrated moving average (ARIMA), and support vector machines (SVM) [13], [14], [17], [33], [41], [42]. The second group consists of detectors that leverage DL detection algorithms [18], [20], [31].…”
Section: ) Machine Learning-based Methodsmentioning
confidence: 99%
“…Murthy et al [15] conducted a study using data mining techniques to investigate non-technical losses in the power distribution system. Their model consists of two stages; the first stage employs Fuzzy C-Means clustering to group consumers with similar con-sumption profiles, and the second stage applies a finely-tuned Naïve Bayes classification technique to identify potential fraudsters.…”
Section: Supervised False Data Detectormentioning
confidence: 99%
“…The supervised detectors undergo training and testing using both benign and malicious samples. These encompass shallow classifiers such as Naïve Bayes [15] and multiclass SVM [16], as well as deep classifiers like FF-RNN [22] and CNN-LSTM [26]. Conversely, the unsupervised detectors are trained exclusively on benign samples and subsequently tested on datasets comprising both benign and malicious instances.…”
Section: Benchmark Detectorsmentioning
confidence: 99%
“…In [24], the authors employed a gradient-boosting theft detector with feature engineering-based preprocessing. The work in [27] developed the APSPDCL NB classifier for detecting unexpected customer consumption trends in power distribution networks. Random forests [28] and AdaBoost [29] were utilized as ETD.…”
Section: A Electricity Theft In Consumption Domainmentioning
confidence: 99%
“…The classification approach [24,25,26,27,28,29], provides a high attack detection rate when a complex learning algorithm, such as deep learning (DL), is utilized to learn data patterns. However, a key bottleneck of this approach is the limited benign and malicious labeled dataset, which limits the ability to test how well the developed models generalize in larger or diverse malicious datasets.…”
Section: Introductionmentioning
confidence: 99%