{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:01:56Z","timestamp":1764997316352,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030504533"},{"type":"electronic","value":"9783030504540"}],"license":[{"start":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T00:00:00Z","timestamp":1591833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T00:00:00Z","timestamp":1591833600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50454-0_22","type":"book-chapter","created":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T08:02:38Z","timestamp":1591776158000},"page":"233-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Electricity Theft Detection Using Machine Learning Techniques to Secure Smart Grid"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Adil","sequence":"first","affiliation":[]},{"given":"Nadeem","family":"Javaid","sequence":"additional","affiliation":[]},{"given":"Zia","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Mahad","family":"Maqsood","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Daud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,11]]},"reference":[{"key":"22_CR1","unstructured":"Glauner, P., Meira, J.A., Valtchev, P., State, R., Bettinger, F.: The challenge of non-technical loss detection using artificial intelligence: a survey (2016). arXiv preprint arXiv:1606.00626"},{"key":"22_CR2","unstructured":"Northeast Group LLC: Electricity theft and non-technical losses: global markets, solutions, and vendors (2017). http:\/\/www.northeast-group.com"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Maamar, A., Benahmed, K.: A hybrid model for anomalies detection in AMI system combining K-means clustering and deep neural network (2019)","DOI":"10.32604\/cmc.2019.06497"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Figueroa, G., Chen, Y. S., Avila, N., Chu, C.C.: Improved practices in machine learning algorithms for NTL detection with imbalanced data. In: 2017 IEEE Power Energy Society General Meeting, pp. 1\u20135. IEEE, July 2017","DOI":"10.1109\/PESGM.2017.8273852"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Glauner, P., Boechat, A., Dolberg, L., State, R., Bettinger, F., Rangoni, Y., Duarte, D.: Large-scale detection of non-technical losses in imbalanced data sets. In: 2016 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135. IEEE, September 2016","DOI":"10.1109\/ISGT.2016.7781159"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1016\/j.apenergy.2017.12.005","volume":"211","author":"C Fan","year":"2018","unstructured":"Fan, C., Xiao, F., Zhao, Y., Wang, J.: Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data. Appl. Energy 211, 1123\u20131135 (2018)","journal-title":"Appl. Energy"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.ijepes.2018.03.031","volume":"101","author":"JL Viegas","year":"2018","unstructured":"Viegas, J.L., Esteves, P.R., Vieira, S.M.: Clustering-based novelty detection for identification of non-technical losses. Int. J. Electr. Power Energy Syst. 101, 301\u2013310 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"8","key":"22_CR8","doi-asserted-by":"publisher","first-page":"860","DOI":"10.3390\/electronics8080860","volume":"8","author":"MS Saeed","year":"2019","unstructured":"Saeed, M.S., Mustafa, M.W., Sheikh, U.U., Jumani, T.A., Mirjat, N.H.: Ensemble bagged tree based classification for reducing non-technical losses in multan electric power company of Pakistan. Electronics 8(8), 860 (2019)","journal-title":"Electronics"},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/TPWRS.2017.2721435","volume":"33","author":"JI Guerrero","year":"2017","unstructured":"Guerrero, J.I., Monedero, I., Biscarri, F., Biscarri, J., Millan, R., Leon, C.: Non-technical losses reduction by improving the inspections accuracy in a power utility. IEEE Trans. Power Syst. 33(2), 1209\u20131218 (2017)","journal-title":"IEEE Trans. Power Syst."},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"106458","DOI":"10.1016\/j.compeleceng.2019.106458","volume":"79","author":"N Ding","year":"2019","unstructured":"Ding, N., Ma, H., Gao, H., Ma, Y., Tan, G.: Real-time anomaly detection based on long short-Term memory and Gaussian Mixture Model. Comput. Electr. Eng. 79, 106458 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"139712","DOI":"10.1109\/ACCESS.2019.2943667","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang, X., Yang, I., Ahn, S.H.: Sample efficient home power anomaly detection in real time using semi-supervised learning. IEEE Access 7, 139712\u2013139725 (2019)","journal-title":"IEEE Access"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/j.ijepes.2017.09.019","volume":"95","author":"JV Spiri\u0107","year":"2018","unstructured":"Spiri\u0107, J.V., Stankovi\u0107, S.S., Do\u010di\u0107, M.B.: Identification of suspicious electricity customers. Int. J. Electr. Power Energy Syst. 95, 635\u2013643 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1109\/TII.2018.2873814","volume":"15","author":"K Zheng","year":"2018","unstructured":"Zheng, K., Chen, Q., Wang, Y., Kang, C., Xia, Q.: A novel combined data-driven approach for electricity theft detection. IEEE Trans. Industr. Inf. 15(3), 1809\u20131819 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Buzau, M.M., Tejedor-Aguilera, J., Cruz-Romero, P., Gomez-Exposito, A.: Hybrid deep neural networks for detection of non-technical losses in electricity smart meters. IEEE Trans. Power Syst. (2019)","DOI":"10.1109\/TPWRS.2019.2943115"},{"issue":"4","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TII.2017.2785963","volume":"14","author":"Z Zheng","year":"2017","unstructured":"Zheng, Z., Yang, Y., Niu, X., Dai, H.N., Zhou, Y.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606\u20131615 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"17","key":"22_CR16","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.3390\/en12173310","volume":"12","author":"M Hasan","year":"2019","unstructured":"Hasan, M., Toma, R.N., Nahid, A.A., Islam, M.M., Kim, J.M.: Electricity theft detection in smart grid systems: a CNN-LSTM based approach. Energies 12(17), 3310 (2019)","journal-title":"Energies"},{"issue":"18","key":"22_CR17","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.3390\/en12183452","volume":"12","author":"X Lu","year":"2019","unstructured":"Lu, X., Zhou, Y., Wang, Z., Yi, Y., Feng, L., Wang, F.: Knowledge embedded semi-supervised deep learning for detecting non-technical losses in the smart grid. Energies 12(18), 3452 (2019)","journal-title":"Energies"},{"issue":"2","key":"22_CR18","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1049\/iet-cps.2017.0063","volume":"3","author":"SK Singh","year":"2018","unstructured":"Singh, S.K., Bose, R., Joshi, A.: Entropy-based electricity theft detection in AMI network. IET Cyber Phys. Syst. Theor. Appl. 3(2), 99\u2013105 (2018)","journal-title":"IET Cyber Phys. Syst. Theor. Appl."},{"issue":"2","key":"22_CR19","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1049\/iet-cps.2018.5050","volume":"4","author":"SK Singh","year":"2019","unstructured":"Singh, S.K., Bose, R., Joshi, A.: Energy theft detection for AMI using principal component analysis based reconstructed data. IET Cyber Phys. Syst. Theor. Appl. 4(2), 179\u2013185 (2019)","journal-title":"IET Cyber Phys. Syst. Theor. Appl."},{"issue":"2","key":"22_CR20","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TSG.2016.2560801","volume":"9","author":"CC Ramos","year":"2016","unstructured":"Ramos, C.C., Rodrigues, D., de Souza, A.N., Papa, J.P.: On the study of commercial losses in Brazil: a binary black hole algorithm for theft characterization. IEEE Trans. Smart Grid 9(2), 676\u2013683 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"22_CR21","unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Advances in Neural Information Processing Systems, pp. 7333\u20137343 (2019)"},{"key":"22_CR22","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Ghemawat, S.: Tensorflow: large-scale machine learning on heterogeneous distributed systems (2016). arXiv preprint arXiv:1603.04467"},{"issue":"1","key":"22_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"C Seiffert","year":"2009","unstructured":"Seiffert, C., Khoshgoftaar, T.M., Van Hulse, J., Napolitano, A.: RUSBoost: a hybrid approach to alleviating class imbalance. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(1), 185\u2013197 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"issue":"4","key":"22_CR24","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1111\/2041-210X.13140","volume":"10","author":"HR Sofaer","year":"2019","unstructured":"Sofaer, H.R., Hoeting, J.A., Jarnevich, C.S.: The area under the precision-recall curve as a performance metric for rare binary events. Methods Ecol. Evol. 10(4), 565\u2013577 (2019)","journal-title":"Methods Ecol. Evol."}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50454-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T16:53:06Z","timestamp":1616172786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50454-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,11]]},"ISBN":["9783030504533","9783030504540"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50454-0_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,11]]},"assertion":[{"value":"11 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}