{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T07:00:43Z","timestamp":1762326043053,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_15","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"255-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ETD-SAC: A\u00a0Series-Wise Auto-correlation Mechanism Based Electricity Theft Detector for\u00a0Smart Grids"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Si","sequence":"first","affiliation":[]},{"given":"Zhaoqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Changchun","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Xiaofang","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"117617","DOI":"10.1016\/j.apenergy.2021.117617","volume":"303","author":"Y Ding","year":"2021","unstructured":"Ding, Y., Mao, M., Chang, L.: Conservative power theory and its applications in modern smart grid: review and prospect. Appl. Energy 303, 117617 (2021)","journal-title":"Appl. Energy"},{"key":"15_CR2","unstructured":"Agency, I.E.: Net zero emissions by 2050 scenario (NZE) (2023). https:\/\/www.iea.org\/reports\/global-energyand-climate-model\/net-zero-emissions-by-2050-scenario-nze"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/JPROC.2021.3139754","volume":"110","author":"X Xia","year":"2022","unstructured":"Xia, X., Xiao, Y., Liang, W., Cui, J.: Detection methods in smart meters for electricity thefts: a survey. Proc. IEEE 110(2), 273\u2013319 (2022)","journal-title":"Proc. IEEE"},{"issue":"7","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/JSAC.2013.130714","volume":"31","author":"S McLaughlin","year":"2013","unstructured":"McLaughlin, S., Holbert, B., Fawaz, A., Berthier, R., Zonouz, S.: A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J. Sel. Areas Commun. 31(7), 1319\u20131330 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-14379-3_15","volume-title":"Critical Information Infrastructures Security","author":"S McLaughlin","year":"2010","unstructured":"McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy theft in the advanced metering infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176\u2013187. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14379-3_15"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"107085","DOI":"10.1016\/j.ijepes.2021.107085","volume":"131","author":"J Pereira","year":"2021","unstructured":"Pereira, J., Saraiva, F.: Convolutional neural network applied to detect electricity theft: a comparative study on unbalanced data handling techniques. Int. J. Electr. Power Energy Syst. 131, 107085 (2021)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"3","key":"15_CR7","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1109\/TPWRS.2021.3114307","volume":"37","author":"X Cui","year":"2021","unstructured":"Cui, X., et al.: Two-step electricity theft detection strategy considering economic return based on convolutional autoencoder and improved regression algorithm. IEEE Trans. Power Syst. 37(3), 2346\u20132359 (2021)","journal-title":"IEEE Trans. Power Syst."},{"issue":"4","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TII.2017.2785963","volume":"14","author":"Z Zheng","year":"2017","unstructured":"Zheng, Z., Yang, Y., Niu, X., Dai, H.N., Zhou, Y.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606\u20131615 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"3428","DOI":"10.1109\/TSG.2020.2973681","volume":"11","author":"M Ismail","year":"2020","unstructured":"Ismail, M., Shaaban, M.F., Naidu, M., Serpedin, E.: Deep learning detection of electricity theft cyber-attacks in renewable distributed generation. IEEE Trans. Smart Grid 11(4), 3428\u20133437 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"17","key":"15_CR10","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.3390\/en12173310","volume":"12","author":"MN Hasan","year":"2019","unstructured":"Hasan, M.N., Toma, R.N., Nahid, A.A., Islam, M.M., Kim, J.M.: Electricity theft detection in smart grid systems: a CNN-LSTM based approach. Energies 12(17), 3310 (2019)","journal-title":"Energies"},{"key":"15_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-981-99-8979-9_13","volume-title":"Big Data","author":"S Chen","year":"2023","unstructured":"Chen, S., Yang, Y., You, S., Chen, W., Li, Z.: A study of electricity theft detection method based on anomaly transformer. In: Chen, E., et al. (eds.) BigData 2023. Communications in Computer and Information Science, vol. 2005, pp. 164\u2013180. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8979-9_13"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"108642","DOI":"10.1016\/j.ijepes.2022.108642","volume":"145","author":"J Shi","year":"2023","unstructured":"Shi, J., Gao, Y., Gu, D., Li, Y., Chen, K.: A novel approach to detect electricity theft based on conv-attentional transformer neural network. Int. J. Electr. Power Energy Syst. 145, 108642 (2023)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSG.2015.2425222","volume":"7","author":"P Jokar","year":"2015","unstructured":"Jokar, P., Arianpoo, N., Leung, V.C.: Electricity theft detection in AMI using customers\u2019 consumption patterns. IEEE Trans. Smart Grid 7(1), 216\u2013226 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Meira, J.A., et al.: Distilling provider-independent data for general detection of non-technical losses. In: 2017 IEEE Power and Energy Conference at Illinois (PECI), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/PECI.2017.7935765"},{"issue":"3","key":"15_CR15","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1109\/TSG.2018.2807925","volume":"10","author":"MM Buzau","year":"2018","unstructured":"Buzau, M.M., Tejedor-Aguilera, J., Cruz-Romero, P., G\u00f3mez-Exp\u00f3sito, A.: Detection of non-technical losses using smart meter data and supervised learning. IEEE Trans. Smart Grid 10(3), 2661\u20132670 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"key":"15_CR16","unstructured":"Energy, S.: Electricity theft causes another fire incident (2022). https:\/\/www.sarawakenergy.com\/media-info\/media-releases\/2022\/electricity-theft-causes-another-fire-incident"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.ijepes.2018.03.025","volume":"101","author":"SC Yip","year":"2018","unstructured":"Yip, S.C., Tan, W.N., Tan, C., Gan, M.T., Wong, K.: An anomaly detection framework for identifying energy theft and defective meters in smart grids. Int. J. Electr. Power Energy Syst. 101, 189\u2013203 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"9","key":"15_CR18","doi-asserted-by":"publisher","first-page":"6745","DOI":"10.1109\/JIOT.2021.3113348","volume":"9","author":"X Xia","year":"2021","unstructured":"Xia, X., Lin, J., Xiao, Y., Cui, J., Peng, Y., Ma, Y.: A control-chart-based detector for small-amount electricity theft (set) attack in smart grids. IEEE Internet Things J. 9(9), 6745\u20136762 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/00031305.2017.1380080","volume":"72","author":"SJ Taylor","year":"2018","unstructured":"Taylor, S.J., Letham, B.: Forecasting at scale. Am. Stat. 72(1), 37\u201345 (2018)","journal-title":"Am. Stat."},{"key":"15_CR20","unstructured":"Wu, H., Xu, J., Wang, J., Long, M.: Autoformer: decomposition transformers with auto-correlation for long-term series forecasting. In: Advances in Neural Information Processing Systems, vol. 34, pp. 22419\u201322430 (2021)"},{"key":"15_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BF02546511","volume":"55","author":"N Wiener","year":"1930","unstructured":"Wiener, N.: Generalized harmonic analysis. Acta Math. 55(1), 117\u2013258 (1930)","journal-title":"Acta Math."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:12:46Z","timestamp":1729156366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}