2020
DOI: 10.1016/j.epsr.2020.106258
|View full text |Cite
|
Sign up to set email alerts
|

Detection and identification of energy theft in advanced metering infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(26 citation statements)
references
References 12 publications
1
23
0
2
Order By: Relevance
“…Zhang [16] proposed a system that detects intrusions by learning network packet data with an Extreme Learning Machine (ELM). Furthermore, Souza [17] proposed a method by which to detect energy theft by modeling residential and commercial consumers using Self-Organizing Maps (SOM) and Multiplayer Perceptron (MP)-ANN and learning the consumers' energy consumption rates per hour. Bendiab [18] proposed a framework that visualizes AMI network traffic in images using the Binivis technique and detects malicious codes through classification algorithms.…”
Section: Security On Advanced Metering Infrastructurementioning
confidence: 99%
“…Zhang [16] proposed a system that detects intrusions by learning network packet data with an Extreme Learning Machine (ELM). Furthermore, Souza [17] proposed a method by which to detect energy theft by modeling residential and commercial consumers using Self-Organizing Maps (SOM) and Multiplayer Perceptron (MP)-ANN and learning the consumers' energy consumption rates per hour. Bendiab [18] proposed a framework that visualizes AMI network traffic in images using the Binivis technique and detects malicious codes through classification algorithms.…”
Section: Security On Advanced Metering Infrastructurementioning
confidence: 99%
“…Although the experimental accuracy was 89%, in practice, energy thieves are often far less accurate than normal users. e work in [23] developed a new method to detect and identify energy theft in distribution systems using a multilayer perceptron artificial neural network (MP-ANN) algorithm. ey successfully classified malicious users and normal users with an average accuracy of 93.4%.…”
Section: Related Workmentioning
confidence: 99%
“…However, it is unavoidable to use an adequate preprocessing method. These researchers in [14] developed a regression model using hybrid structures such as a CNN-LSTM model on energy consumption datasets. This article solved the classification issue by combining the CNN-LSTM hybrid model with a preprocessing method on the power consumption pattern dataset.…”
Section: A Problem Statementmentioning
confidence: 99%