2021
DOI: 10.1109/tsg.2020.3047864
|View full text |Cite
|
Sign up to set email alerts
|

Robust Electricity Theft Detection Against Data Poisoning Attacks in Smart Grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(22 citation statements)
references
References 22 publications
0
22
0
Order By: Relevance
“…However, the fluctuations and variations in the normal and theft load profiles are not properly detected, which yield poor detection results. Similarly, the authors in [20] analyze some traditional techniques that are applied to detect data poisoning attacks. However, these techniques add up an additional stage of data filtering, which first removes any available false label and then performs the detection step.…”
Section: Related Workmentioning
confidence: 99%
“…However, the fluctuations and variations in the normal and theft load profiles are not properly detected, which yield poor detection results. Similarly, the authors in [20] analyze some traditional techniques that are applied to detect data poisoning attacks. However, these techniques add up an additional stage of data filtering, which first removes any available false label and then performs the detection step.…”
Section: Related Workmentioning
confidence: 99%
“…MAP is typically used to estimate the quality of information retrieval. To calculate the MAP, we need to define P@S, as in (25).…”
Section: B Evaluation Metrics and Comparisonsmentioning
confidence: 99%
“…Second, deep learning-based methods demand massive, trustworthy samples for model training. However, the unbalanced dataset and contaminated samples [25] significantly affect their accuracies. Moreover, they may mistake some normal activities such as meter installation and climate change as theft behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…Takiddin et al in [8] provided answers to three major questions pertaining to the performance of electricity theft detectors in the presence of data poisoning attacks. By proposing a sequential ensemble detector based on a deep autoencoder with attention (AEA), gated recurrent units (GRUs), and feed forward neural networks.…”
Section: Related Workmentioning
confidence: 99%