2016
DOI: 10.1007/978-3-319-45477-1_18
|View full text |Cite
|
Sign up to set email alerts
|

A New SVM-Based Fraud Detection Model for AMI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18]) C10. SG failures fault status detection [41], [46], [61], [62], [126], [127], [142], [176], fault type classification [197], power distribution reliability [149], [195] As it can be seen, there is large variability in the aspects covered by the research.…”
Section: B Rq2mentioning
confidence: 99%
See 1 more Smart Citation
“…The rapid growth of data has become a challenging task to find patterns and information from the data. ML has been successfully applied in many disciplines like fraud detection in credit card transaction and object recognition [1][2][3], face recognition [4,5], and decision making systems [6,7]. ML-based algorithms are developed based on the patterns learned from the data and used these patterns to conclude unseen data samples.…”
Section: Introductionmentioning
confidence: 99%
“…To address the issue of imbalanced data, researchers such as Zanetti et al [12], Rodriguez et al [13], and Martino et al [14] have proposed using one-class Support Vector Machines (SVM) for electricity theft detection. Unlike the classical SVM model that requires two classes of training samples (normal and abnormal), a one-class SVM only requires a specific course of training samples (in our case, using standard consumption patterns).…”
mentioning
confidence: 99%