{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T03:57:48Z","timestamp":1767844668123,"version":"3.49.0"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1016\/j.is.2024.102457","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T16:47:39Z","timestamp":1725295659000},"page":"102457","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Electricity behaviors anomaly detection based on multi-feature fusion and contrastive learning"],"prefix":"10.1016","volume":"127","author":[{"given":"Yongming","family":"Guan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1824-4244","authenticated-orcid":false,"given":"Yuliang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.is.2024.102457_b1","doi-asserted-by":"crossref","first-page":"1796","DOI":"10.1109\/TCYB.2015.2490802","article-title":"Data randomization and cluster-based partitioning for botnet intrusion detection","volume":"46","author":"Al-Jarrah","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.is.2024.102457_b2","doi-asserted-by":"crossref","unstructured":"H. Zhang, B. Liu, P. Cui, Y. Sun, Y. Yang, An Outlier Detection Algorithm for Electric Power Data Based on DBSCAN and LOF, in: 2020 the 9th International Conference on Computer Engineering and Networks, 2020, pp. 1097\u20131106.","DOI":"10.1007\/978-981-15-3753-0_110"},{"issue":"008","key":"10.1016\/j.is.2024.102457_b3","article-title":"An adaptive anomaly detection algorithm based on CFSFDP","author":"Ren","year":"2021","journal-title":"Sichuan Electr. Power Technol."},{"key":"10.1016\/j.is.2024.102457_b4","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.inffus.2022.12.027","article-title":"A multi-source information fusion model for outlier detection","volume":"93","author":"Zhang","year":"2023","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.is.2024.102457_b5","series-title":"Analysis of 10kV Non-technical Loss Detection with Data-driven Approaches","first-page":"4154","author":"Wang","year":"2019"},{"issue":"2","key":"10.1016\/j.is.2024.102457_b6","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TPWRS.2019.2943115","article-title":"Hybrid deep neural networks for detection of non-technical losses in electricity smart meters","volume":"35","author":"Buzau","year":"2020","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.is.2024.102457_b7","article-title":"Anomaly detection based on joint spatio-temporal learning for building electricity consumption","author":"Kong","year":"2023","journal-title":"Appl. Energy"},{"key":"10.1016\/j.is.2024.102457_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2021.118078","article-title":"A data-driven strategy using long short term memory models and reinforcement learning to predict building electricity consumption","volume":"306","author":"Zhou","year":"2022","journal-title":"Appl. Energy"},{"issue":"10","key":"10.1016\/j.is.2024.102457_b9","first-page":"96","article-title":"Study on power data anomaly detection algorithm based on data intrinsic property and LSTM","volume":"16","author":"Gang","year":"2019","journal-title":"Wirel. Internet Technol."},{"issue":"10","key":"10.1016\/j.is.2024.102457_b10","article-title":"An abnormal behavior analysis algorithm for electricity consumption based on density clustering","volume":"2019","author":"Rao","year":"2019","journal-title":"J. Eng."},{"issue":"8","key":"10.1016\/j.is.2024.102457_b11","doi-asserted-by":"crossref","first-page":"1633","DOI":"10.1007\/s12053-020-09884-2","article-title":"A deep learning approach for anomaly detection and prediction in power consumption data","volume":"13","author":"Chahla","year":"2020","journal-title":"Energy Effic."},{"key":"10.1016\/j.is.2024.102457_b12","series-title":"2020 IEEE International Conference on Systems, Man, and Cybernetics","first-page":"3637","article-title":"An ensemble deep convolutional neural network model for electricity theft detection in smart grids","author":"Rouzbahani","year":"2020"},{"key":"10.1016\/j.is.2024.102457_b13","series-title":"2010 IEEE Conference on Cybernetics and Intelligent Systems","first-page":"231","article-title":"Short-term load forecasting using time series analysis: A case study for Singapore","author":"Deng","year":"2010"},{"key":"10.1016\/j.is.2024.102457_b14","series-title":"2018 10th International Conference on Wireless Communications and Signal Processing","first-page":"1","article-title":"3D convolutional generative adversarial networks for missing traffic data completion","author":"Li","year":"2018"},{"key":"10.1016\/j.is.2024.102457_b15","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.ins.2020.11.035","article-title":"Missing value imputation in multivariate time series with end-to-end generative adversarial networks","volume":"551","author":"Zhang","year":"2021","journal-title":"Inform. Sci."},{"key":"10.1016\/j.is.2024.102457_b16","unstructured":"Y. Luo, X. Cai, Y. Zhang, J. Xu, X. Yuan, Multivariate Time Series Imputation with Generative Adversarial Networks, in: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada, 2018, pp. 1603\u20131614."},{"issue":"12","key":"10.1016\/j.is.2024.102457_b17","doi-asserted-by":"crossref","first-page":"7474","DOI":"10.1109\/TITS.2020.3003310","article-title":"Spatial origin-destination flow imputation using graph convolutional networks","volume":"22","author":"Yao","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"10.1016\/j.is.2024.102457_b18","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1109\/TSG.2018.2807925","article-title":"Detection of non-technical losses using smart meter data and supervised learning","volume":"10","author":"Buzau","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.is.2024.102457_b19","series-title":"Anomaly detection for power consumption pattern based on deep learning","author":"Wenqing","year":"2018"},{"issue":"99","key":"10.1016\/j.is.2024.102457_b20","first-page":"1","article-title":"Deep anomaly detection for time series data in industrial IoT: A communication-efficient on-device federated learning approach","volume":"PP","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.is.2024.102457_b21","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TPWRS.2019.2943115","article-title":"Hybrid deep neural networks for detection of non-technical losses in electricity smart meters","volume":"35","author":"Buzau","year":"2020","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.is.2024.102457_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.106705","article-title":"ST-LBAGAN: spatio-temporal learnable bidirectional attention generative adversarial networks for missing traffic data imputation","volume":"215","author":"Yang","year":"2021","journal-title":"Knowl.-Based Syst."},{"issue":"3","key":"10.1016\/j.is.2024.102457_b23","doi-asserted-by":"crossref","first-page":"2378","DOI":"10.1109\/TSG.2020.3046602","article-title":"Real-time synchrophasor data anomaly detection and classification using isolation forest, KMeans, and LoOP","volume":"12","author":"Khaledian","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.is.2024.102457_b24","series-title":"AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture","first-page":"209","article-title":"A study of intelligent analysis of abnormal power consumption behavior based on daily load curve","author":"Long","year":"2020"},{"key":"10.1016\/j.is.2024.102457_b25","series-title":"Proceedings of the 28th International Conference on Computational Linguistics","first-page":"5223","article-title":"Auto-encoding variational Bayes for inferring topics and visualization","author":"Pham","year":"2020"},{"key":"10.1016\/j.is.2024.102457_b26","series-title":"Generative adversarial NETS","author":"Treat","year":"2018"},{"key":"10.1016\/j.is.2024.102457_b27","series-title":"Artificial Neural Networks and Machine Learning - ICANN 2021 - 30th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 14-17, 2021, Proceedings, Part I","first-page":"129","article-title":"Attention-based bi-LSTM for anomaly detection on time-series data","volume":"vol. 12891","author":"Mishra","year":"2021"},{"key":"10.1016\/j.is.2024.102457_b28","series-title":"2020 IEEE International Conference on Big Data","first-page":"5068","article-title":"An autocorrelation-based LSTM-autoencoder for anomaly detection on time-series data","author":"Homayouni","year":"2020"},{"key":"10.1016\/j.is.2024.102457_b29","first-page":"11106","article-title":"Informer: Beyond efficient transformer for long sequence time-series forecasting","author":"Zhou","year":"2021"},{"key":"10.1016\/j.is.2024.102457_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107751","article-title":"Temporal convolutional autoencoder for unsupervised anomaly detection in time series","volume":"112","author":"Thill","year":"2021","journal-title":"Appl. Soft Comput."},{"issue":"6","key":"10.1016\/j.is.2024.102457_b31","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.14778\/3514061.3514067","article-title":"TranAD: Deep transformer networks for anomaly detection in multivariate time series data","volume":"15","author":"Tuli","year":"2022","journal-title":"Proc. VLDB Endow."},{"issue":"12","key":"10.1016\/j.is.2024.102457_b32","doi-asserted-by":"crossref","first-page":"9179","DOI":"10.1109\/JIOT.2021.3100509","article-title":"Learning graph structures with transformer for multivariate time-series anomaly detection in IoT","volume":"9","author":"Chen","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.is.2024.102457_b33","doi-asserted-by":"crossref","first-page":"15855","DOI":"10.1007\/s10489-022-04324-3","article-title":"Probabilistic autoencoder with multi-scale feature extraction for multivariate time series anomaly detection","volume":"53","author":"Zhang","year":"2023","journal-title":"Appl. Intell."},{"issue":"5","key":"10.1016\/j.is.2024.102457_b34","first-page":"6074","article-title":"Semisupervised anomaly detection of multivariate time series based on a variational autoencoder","volume":"53","author":"Chen","year":"2023","journal-title":"Appl. Intell."}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437924001157?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437924001157?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T19:06:17Z","timestamp":1729278377000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306437924001157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":34,"alternative-id":["S0306437924001157"],"URL":"https:\/\/doi.org\/10.1016\/j.is.2024.102457","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Electricity behaviors anomaly detection based on multi-feature fusion and contrastive learning","name":"articletitle","label":"Article Title"},{"value":"Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.is.2024.102457","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102457"}}