2020
DOI: 10.1049/iet-smc.2020.0045
|View full text |Cite
|
Sign up to set email alerts
|

Online electricity theft detection and prevention scheme for smart cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Moreover, technology-based models have been Electricity 2024, 5 explored Yan and Wen [8], Tanwar, et al [9], Zheng, et al [10]. Regardless of these noble efforts to address electricity theft, Ballal, et al [11] stated that the challenge had reached alarming levels, as shown by the catastrophic impact that the challenge has had on people's lives and various economies across the world. It is on this basis that Mohanty, et al [12], Leninpugalhanthi, et al [13] contend for further exploration of technology-based solutions to curb the persistent electricity-theft phenomenon.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, technology-based models have been Electricity 2024, 5 explored Yan and Wen [8], Tanwar, et al [9], Zheng, et al [10]. Regardless of these noble efforts to address electricity theft, Ballal, et al [11] stated that the challenge had reached alarming levels, as shown by the catastrophic impact that the challenge has had on people's lives and various economies across the world. It is on this basis that Mohanty, et al [12], Leninpugalhanthi, et al [13] contend for further exploration of technology-based solutions to curb the persistent electricity-theft phenomenon.…”
Section: Introductionmentioning
confidence: 99%
“…To protect user privacy, it is necessary to perform privacy processing on user data before publishing it to the detector server [12]. Common data privacy processing technologies such as data aggregation [13,14] have well achieved privacy-preserving data collection, but they cannot be combined with the actual application of electricity theft detection [15,16]. For example, in [13], each user encrypts his/her own electricity consumption data into a ciphertext using a lifted ElGamal homomorphic cryptosystem before sending it to the aggregator [17].…”
Section: Introductionmentioning
confidence: 99%