2011 IEEE/PES Power Systems Conference and Exposition 2011
DOI: 10.1109/psce.2011.5772466
|View full text |Cite
|
Sign up to set email alerts
|

Support vector machine based data classification for detection of electricity theft

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
62
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 143 publications
(62 citation statements)
references
References 17 publications
0
62
0
Order By: Relevance
“…Our choice of models for comparison is based on the wide use of these classification techniques, SVM and MLP, and wide acceptance as two well-known approaches for classification and prediction by the research community [53][54][55][56][57][58][59][60][61][62][63][64].…”
Section: Evaluation and Resultsmentioning
confidence: 99%
“…Our choice of models for comparison is based on the wide use of these classification techniques, SVM and MLP, and wide acceptance as two well-known approaches for classification and prediction by the research community [53][54][55][56][57][58][59][60][61][62][63][64].…”
Section: Evaluation and Resultsmentioning
confidence: 99%
“…Here the focus was on the detection of abnormal electricity traces that are highly correlated with electricity theft. This work used a variety of machine learning techniques, including Support Vector Machines and Extreme Learning Machines to identify suspicious energy traces [14], [15], [16]. More recent work has emphasized the need to consider consumption data anomalies as part of a diagnostic system with the aim of enabling sensor fusion at the scale of a electricity distribution network and reduce false positives [17].…”
Section: Related Workmentioning
confidence: 99%
“…To begin with, several contributions have gravitated on the use of machine learning models over supervised datasets, such as Support Vector Machines [13,14,15,16,17,18], Neural Networks [19,20,21], Extreme Learning Machines [22], Path Forests [23,24], Decision Trees [25,26,27], model ensembles [28], and statistical methods [29,30]. However, all such previous work builds upon the assumption that supervised datasets capture the entire casuistry of symptomatic anomalies of interest for fraud detection and/or electricity theft, which not only unrealistic in practice but also yields highly imbalanced datasets that subsequently jeopardize the model learning process.…”
Section: Introductionmentioning
confidence: 99%