{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:45:36Z","timestamp":1773215136843,"version":"3.50.1"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.compeleceng.2026.110974","type":"journal-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T23:18:44Z","timestamp":1773098324000},"page":"110974","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Deep Tasmanian Aquila quantized Shor Simon fractal network for intelligent energy theft detection in smart grids"],"prefix":"10.1016","volume":"134","author":[{"given":"Johncy","family":"G","sequence":"first","affiliation":[]},{"given":"Shaji","family":"R\u2024S\u2024","sequence":"additional","affiliation":[]},{"given":"Angelin Monisha Sharean","family":"T\u2024M\u2024","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.compeleceng.2026.110974_bib0001","doi-asserted-by":"crossref","first-page":"3220","DOI":"10.1109\/TSMC.2024.3357497","article-title":"Event-trigger-based resilient distributed energy management against FDI and DoS attack of cyber\u2013physical system of smart grid","volume":"54","author":"Zhang","year":"2024","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"13","key":"10.1016\/j.compeleceng.2026.110974_bib0002","doi-asserted-by":"crossref","first-page":"4623","DOI":"10.1080\/00207543.2023.2269565","article-title":"AI-based forecasting for optimised solar energy management and smart grid efficiency","volume":"62","author":"Bouquet","year":"2024","journal-title":"Int J Prod Res"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2023.121809","article-title":"Methodology for energy management strategies design based on predictive control techniques for smart grids","volume":"351","author":"Pajares","year":"2023","journal-title":"Appl Energy"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110974_bib0004","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.3390\/s24041148","article-title":"Smart grid security: an effective hybrid CNN-based approach for detecting energy theft using consumption patterns","volume":"24","author":"MZ","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0005","doi-asserted-by":"crossref","unstructured":"H. M, Khan L., Javaid N., Ullah Z. and Shaheen I. Enhancing smart City functions through the mitigation of electricity theft in smart grids: a stacked ensemble method. international transactions on electrical energy systems 2024; 2024(1): 5566402.","DOI":"10.1155\/2024\/5566402"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110974_bib0006","doi-asserted-by":"crossref","DOI":"10.1080\/09540091.2024.2403393","article-title":"Secure smart grid implementation with automatic data integrity attack location prediction and exalted energy theft detection","volume":"36","author":"Johncy","year":"2024","journal-title":"Conn Sci"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0007","doi-asserted-by":"crossref","first-page":"e1872","DOI":"10.7717\/peerj-cs.1872","article-title":"RNN-BiLSTM-CRF based amalgamated deep learning model for electricity theft detection to secure smart grids","volume":"10","author":"Khalid","year":"2024","journal-title":"PeerJ Comput Sci"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110974_bib0008","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s40866-024-00216-2","article-title":"Smart grid anomaly detection using MFDA and dilated GRU-based neural networks","volume":"10","author":"Ravinder","year":"2025","journal-title":"Smart Grids Sustain Energy"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.segan.2025.101639","article-title":"Contrastive learning for efficient anomaly detection in electricity load data","author":"Choubey","year":"2025","journal-title":"Sustain Energy Grids Netw"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110974_bib0010","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.3390\/app15042193","article-title":"PE-DOCC: a novel periodicity-enhanced deep one-class classification framework for electricity theft detection","volume":"15","author":"Wu","year":"2025","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2024.111149","article-title":"Spatio-temporal graph attention network-based detection of FDIA from smart meter data at geographically hierarchical levels","volume":"238","author":"Hasnat","year":"2025","journal-title":"Electr Power Syst Res"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0012","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/OAJPE.2024.3524268","article-title":"Graph neural network-based approach for detecting false data injection attacks on voltage stability","volume":"12","author":"Fahim","year":"2025","journal-title":"IEEE Open Access J Power Energy"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.110974_bib0013","doi-asserted-by":"crossref","first-page":"5851","DOI":"10.1007\/s00202-024-02327-6","article-title":"Anomaly detection in smart grid using a trace-based graph deep learning model","volume":"106","author":"Ida Evangeline","year":"2024","journal-title":"Electr Eng"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.110974_bib0014","article-title":"Electricity theft detection in a smart grid using hybrid deep learning-based data analysis technique","volume":"2024","author":"Mbey","year":"2024","journal-title":"J Electr Comput Eng"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0015","article-title":"CNN-AdaBoost based hybrid model for electricity theft detection in smart grid. E-Prime-advances in Electrical engineering","volume":"7","author":"Nirmal","year":"2024","journal-title":"Electron Energy"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.110974_bib0016","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1049\/rpg2.12846","article-title":"A novel deep learning technique to detect electricity theft in smart grids using AlexNet","volume":"18","author":"Khan","year":"2024","journal-title":"IET Renew Power Gener"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0017","doi-asserted-by":"crossref","first-page":"15477","DOI":"10.1109\/ACCESS.2024.3358683","article-title":"Electricity theft detection in smart grids based on omni-scale cnn and autoxgb","volume":"12","author":"Zhu","year":"2024","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.110974_bib0018","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.3390\/s24041148","article-title":"Smart grid security: an effective hybrid CNN-based approach for detecting energy theft using consumption patterns","volume":"24","author":"Gunduz","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0019","doi-asserted-by":"crossref","first-page":"187027","DOI":"10.1109\/ACCESS.2024.3498733","article-title":"Unsupervised learning with hybrid models for detecting electricity theft in smart grids","volume":"12","author":"Almalki","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0020","doi-asserted-by":"crossref","first-page":".42737","DOI":"10.1109\/ACCESS.2024.3379201","article-title":"Dynamic generative residual graph convolutional neural networks for electricity theft detection","volume":"12","author":"Zhuang","year":"2024","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110974_bib0021","doi-asserted-by":"crossref","first-page":"275","DOI":"10.3390\/en17020275","article-title":"A novel electricity theft detection strategy based on dual-time feature fusion and deep learning methods","volume":"17","author":"Huang","year":"2024","journal-title":"Energies"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2024.110428","article-title":"Electricity theft detection in integrated energy systems considering multi-energy loads","volume":"164","author":"Liao","year":"2025","journal-title":"Int J Electr Power Energy Syst"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.110974_bib0023","first-page":"1","article-title":"Smart transmission line protection system with transformer monitoring and power theft detection","volume":"2","author":"Shawona","year":"2025","journal-title":"J Sustain"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0024","doi-asserted-by":"crossref","unstructured":"Martinez D., Koff M.A. and George T. Individual differences in subtractive thinking and creative problem-solving: evidence for an association with convergent but not divergent thinking 2024.","DOI":"10.31234\/osf.io\/vd87w"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0025","unstructured":"Zhang Z. Deep analysis of time series data for smart grid startup strategies: a transformer-LSTM-PSO model approach 2024. arXiv preprint arXiv:2408.12129."},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110974_bib0026","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11760-023-02813-7","article-title":"Detection of cyber-attacks on smart grids using improved VGG19 deep neural network architecture and Aquila optimizer algorithm","volume":"18","author":"Mhmood","year":"2024","journal-title":"Signal Image Video Process"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.110974_bib0027","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s10586-024-04790-z","article-title":"Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems","volume":"28","author":"Farhat","year":"2025","journal-title":"Clust Comput"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.110974_bib0028","doi-asserted-by":"crossref","first-page":"3575","DOI":"10.1002\/ese3.1541","article-title":"Electricity theft detection for energy optimization using deep learning models","volume":"11","author":"Pamir Javaid","year":"2023","journal-title":"Energy Sci Eng"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.110974_bib0029","doi-asserted-by":"crossref","first-page":"5710","DOI":"10.3390\/app13095710","article-title":"Smart grid theft detection based on hybrid multi-time scale neural network","volume":"13","author":"Sun","year":"2023","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2026.110974_bib0030","unstructured":"https:\/\/www.kaggle.com\/datasets\/bensalem14\/sgcc-dataset\/data."}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S004579062600042X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S004579062600042X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T09:51:59Z","timestamp":1773136319000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S004579062600042X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":30,"alternative-id":["S004579062600042X"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.110974","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Deep Tasmanian Aquila quantized Shor Simon fractal network for intelligent energy theft detection in smart grids","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.110974","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"110974"}}