{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:44:09Z","timestamp":1775054649069,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031157769","type":"print"},{"value":"9783031157776","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_16","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"281-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5382-421X","authenticated-orcid":false,"given":"Arwa","family":"Alromih","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9230-9739","authenticated-orcid":false,"given":"John A.","family":"Clark","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2786-0273","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abuadbba, S., et al.: Can we use split learning on 1D CNN models for privacy preserving training? In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 305\u2013318 (2020)","DOI":"10.1145\/3320269.3384740"},{"issue":"12","key":"16_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JAS.2021.1004231","volume":"8","author":"M Ahmed","year":"2021","unstructured":"Ahmed, M., Abid Khan, M.A., Tahir, M., Jeon, G., Fortino, G., Piccialli, F.: Energy theft detection in smart grids: taxonomy, comparative analysis, challenges, and future research directions. IEEE\/CAA J. Autom. Sinica 8(12), 1\u201323 (2021)","journal-title":"IEEE\/CAA J. Autom. Sinica"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M., Chang, J.M.: Privacy-preserving machine learning: threats and solutions. IEEE Secur. Priv. 17(2), 49\u201358 (2019)","journal-title":"IEEE Secur. Priv."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Alromih, A., Clark, J.A., Gope, P.: Electricity theft detection in the presence of prosumers using a cluster-based multi-feature detection model. In: 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 339\u2013345. IEEE (2021)","DOI":"10.1109\/SmartGridComm51999.2021.9632322"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"159291","DOI":"10.1109\/ACCESS.2021.3131220","volume":"9","author":"A Althobaiti","year":"2021","unstructured":"Althobaiti, A., Jindal, A., Marnerides, A.K., Roedig, U.: Energy theft in smart grids: a survey on data-driven attack strategies and detection methods. IEEE Access 9, 159291\u2013159312 (2021)","journal-title":"IEEE Access"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Aygun, R.C., Yavuz, A.G.: Network anomaly detection with stochastically improved autoencoder based models. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 193\u2013198. IEEE (2017)","DOI":"10.1109\/CSCloud.2017.39"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Borghesi, A., Bartolini, A., Lombardi, M., Milano, M., Benini, L.: Anomaly detection using autoencoders in high performance computing systems. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 9428\u20139433 (2019)","DOI":"10.1609\/aaai.v33i01.33019428"},{"issue":"6","key":"16_CR8","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1109\/TIFS.2018.2881730","volume":"14","author":"P Gope","year":"2018","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids. IEEE Trans. Inf. Forensics Secur. 14(6), 1554\u20131566 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.05.003","volume":"116","author":"O Gupta","year":"2018","unstructured":"Gupta, O., Raskar, R.: Distributed learning of deep neural network over multiple agents. J. Netw. Comput. Appl. 116, 1\u20138 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/JIOT.2020.3026692","volume":"8","author":"MI Ibrahem","year":"2020","unstructured":"Ibrahem, M.I., Nabil, M., Fouda, M.M., Mahmoud, M.M., Alasmary, W., Alsolami, F.: Efficient privacy-preserving electricity theft detection with dynamic billing and load monitoring for AMI networks. IEEE Internet Things J. 8(2), 1243\u20131258 (2020)","journal-title":"IEEE Internet Things J."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Ishimaki, Y., Bhattacharjee, S., Yamana, H., Das, S.K.: Towards privacy-preserving anomaly-based attack detection against data falsification in smart grid. In: 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/SmartGridComm47815.2020.9303009"},{"issue":"4","key":"16_CR12","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TNSE.2018.2859420","volume":"6","author":"Q Jia","year":"2018","unstructured":"Jia, Q., Guo, L., Fang, Y., Wang, G.: Efficient privacy-preserving machine learning in hierarchical distributed system. IEEE Trans. Netw. Sci. Eng. 6(4), 599\u2013612 (2018)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSG.2015.2425222","volume":"7","author":"P Jokar","year":"2015","unstructured":"Jokar, P., Arianpoo, N., Leung, V.C.: Electricity theft detection in AMI using customers\u2019 consumption patterns. IEEE Trans. Smart Grid 7(1), 216\u2013226 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"16_CR14","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, vol. 54, pp. 1273\u20131282. PMLR (2017)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706. IEEE (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"96334","DOI":"10.1109\/ACCESS.2019.2925322","volume":"7","author":"M Nabil","year":"2019","unstructured":"Nabil, M., Ismail, M., Mahmoud, M.M., Alasmary, W., Serpedin, E.: PPETD: privacy-preserving electricity theft detection scheme with load monitoring and billing for AMI networks. IEEE Access 7, 96334\u201396348 (2019)","journal-title":"IEEE Access"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Pasquini, D., Ateniese, G., Bernaschi, M.: Unleashing the tiger: inference attacks on split learning. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2113\u20132129, CCS 2021. Association for Computing Machinery, New York (2021)","DOI":"10.1145\/3460120.3485259"},{"key":"16_CR18","unstructured":"Paszke, A., et al.: PyTorch: an imperative style, high-performance deep learning library. Adv. Neural Inf. Process. Syst. 32, 8024\u20138035 (2019)"},{"key":"16_CR19","unstructured":"Paverd, A., Martin, A., Brown, I.: Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Technical report (2014)"},{"issue":"1","key":"16_CR20","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"16_CR21","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-030-70604-3_4","volume-title":"Federated Learning Systems","author":"C Thapa","year":"2021","unstructured":"Thapa, C., Chamikara, M.A.P., Camtepe, S.A.: Advancements of federated learning towards privacy preservation: from federated learning to split learning. In: Rehman, M.H., Gaber, M.M. (eds.) Federated Learning Systems. SCI, vol. 965, pp. 79\u2013109. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-70604-3_4"},{"issue":"1","key":"16_CR22","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","volume":"17","author":"A Tharwat","year":"2020","unstructured":"Tharwat, A.: Classification assessment methods. Appl. Comput. Inform. 17(1), 168\u2013192 (2020)","journal-title":"Appl. Comput. Inform."},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Turina, V., Zhang, Z., Esposito, F., Matta, I.: Combining split and federated architectures for efficiency and privacy in deep learning. In: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, pp. 562\u2013563 (2020)","DOI":"10.1145\/3386367.3431678"},{"key":"16_CR24","unstructured":"Vepakomma, P., Gupta, O., Swedish, T., Raskar, R.: Split learning for health: distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564 (2018)"},{"issue":"8","key":"16_CR25","doi-asserted-by":"publisher","first-page":"6069","DOI":"10.1109\/JIOT.2021.3110784","volume":"9","author":"M Wen","year":"2022","unstructured":"Wen, M., Xie, R., Lu, K., Wang, L., Zhang, K.: FedDetect: a novel privacy-preserving federated learning framework for energy theft detection in smart grid. IEEE Internet Things J. 9(8), 6069\u20136080 (2022)","journal-title":"IEEE Internet Things J."},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Wen, M., Yao, D., Li, B., Lu, R.: State estimation based energy theft detection scheme with privacy preservation in smart grid. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422731"},{"issue":"5","key":"16_CR27","doi-asserted-by":"publisher","first-page":"7659","DOI":"10.1109\/JIOT.2019.2903312","volume":"6","author":"D Yao","year":"2019","unstructured":"Yao, D., Wen, M., Liang, X., Fu, Z., Zhang, K., Yang, B.: Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J. 6(5), 7659\u20137669 (2019)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:07:41Z","timestamp":1709831261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}