{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:22:43Z","timestamp":1777591363723,"version":"3.51.4"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Industrial Cyber Security Centre of Excellence (ICSCoE) Core Human Resources Development Program, Japan"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3366493","type":"journal-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T18:54:04Z","timestamp":1707936844000},"page":"26023-26045","source":"Crossref","is-referenced-by-count":26,"title":["Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8243-2584","authenticated-orcid":false,"given":"Olufemi Abiodun","family":"Abraham","sequence":"first","affiliation":[{"name":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4568-6726","authenticated-orcid":false,"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[{"name":"Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan"}]},{"given":"Md. Delwar","family":"Hossain","sequence":"additional","affiliation":[{"name":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Yuzo","family":"Taenaka","sequence":"additional","affiliation":[{"name":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[{"name":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Electricity Theft, Exploring Social Dimensions","author":"Lashari","year":"2019"},{"key":"ref2","volume-title":"World Loses $89.3 Billion to Electricity Theft Annually, $58.7 Billion in Emerging Markets","author":"Northeast Group","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.esd.2018.12.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3136683"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2853162"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2892595"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS57264.2023.10144120"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447826"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2720726"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/su12083158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355148"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app8040542"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s21238036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2014.6873767"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2019.2918922"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2687865"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13057-2_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4136874"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106587"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3215532"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s22207818"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/en11020452"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056566"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2022.100833"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039050"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2543145"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.07.008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/en13153832"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE53047.2021.9569097"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106448"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5177-5"},{"key":"ref35","article-title":"Anomaly detection frameworks for identifying energy theft and meter irregularities in smart grids","author":"Chin","year":"2019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130714"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.37"},{"key":"ref38","article-title":"UMAP: Uniform manifold approximation and projection for dimension reduction","author":"McInnes","year":"2018","journal-title":"arXiv:1802.03426"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2017.06.042"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CIEEC54735.2022.9846688"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"issue":"1","key":"ref42","first-page":"9885","article-title":"A group-theoretic framework for data augmentation","volume":"21","author":"Chen","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref43","volume-title":"The Python Deep Learning Library","year":"2023"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106904"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6316"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029307"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/Eusipco47968.2020.9287764"},{"key":"ref49","volume-title":"Outliers Make Us Go Mad: Univariate Outlier Detection","author":"Rodrigues","year":"2018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3227370"},{"key":"ref51","volume-title":"Machine Learning and Data Science Blueprints for Finance","author":"Tatsat","year":"2020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00044"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107358"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10436697.pdf?arnumber=10436697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:31:45Z","timestamp":1710379905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10436697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3366493","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}