{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:38:53Z","timestamp":1759091933979,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7248420","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:40:36Z","timestamp":1441946436000},"page":"802-807","source":"Crossref","is-referenced-by-count":12,"title":["A difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids"],"prefix":"10.1109","author":[{"given":"Xiaofang","family":"Xia","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhifeng","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2019599.2019603","article-title":"Security seals on voting machines: A case study","volume":"14","author":"appel","year":"2011","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2229397"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400434"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883385"},{"key":"ref14","article-title":"System for accurately detecting electricity theft","author":"de buda","year":"2010","journal-title":"12\/351978"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260697"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref16"},{"journal-title":"Electric Light and Power Magazine","article-title":"Reducing revenue leakage","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2010.11.037"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2030890"},{"key":"ref5","first-page":"1","article-title":"Detection of abnormalities and electricity theft using genetic support vector machines","author":"nagi","year":"2009","journal-title":"Proc Conf IEEE Tencon Region 10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.926431"},{"key":"ref7","first-page":"1","article-title":"Identification and detection of electricity customer behavior irregularities","author":"nizar","year":"2009","journal-title":"Proc IEEE PES Power Systems Conference and Exposition"},{"key":"ref2","first-page":"176","article-title":"Energy theft in the advanced metering infrastructure","author":"mclaughlin","year":"2009","journal-title":"4th International Workshop on Critical Information Infrastructure Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref9","first-page":"1","article-title":"A data mining based NTL analysis method","author":"nizar","year":"2007","journal-title":"Proc IEEE Power Engineering Society General Meeting"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07248420.pdf?arnumber=7248420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T19:18:26Z","timestamp":1498245506000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7248420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7248420","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}