{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T20:01:17Z","timestamp":1760385677419},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iecon.2018.8591459","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T22:30:15Z","timestamp":1547850615000},"source":"Crossref","is-referenced-by-count":20,"title":["AdaBoost-SVM for Electrical Theft Detection and GRNN for Stealing Time Periods Identification"],"prefix":"10.1109","author":[{"given":"Rongli","family":"Wu","sequence":"first","affiliation":[]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PECON.2008.4762604"},{"key":"ref11","first-page":"1","article-title":"Detection of abnormalities and electrical theft using genetic Support Vector Machines","author":"nagi","year":"2008","journal-title":"TENCON 2008 &#x2013; 2008 IEEE Region 10 Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2055670"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2543145"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref16","first-page":"137","article-title":"Boosting method","author":"li","year":"2012","journal-title":"Statistical Learning Methods"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178985"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.926431"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.7474800"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2013.6724264"},{"key":"ref8","first-page":"1","article-title":"Non-technical loss detection using state estimation and analysis of variance","author":"lu","year":"2013","journal-title":"2013 IEEE Power &amp; Energy Society General Meeting"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PEAM.2011.6134972"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1400905"},{"key":"ref1","article-title":"Electricity Theft and Non-Technical Losses: Global Markets, Solutions, and Vendors","year":"0","journal-title":"Northeast group"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2016.224"}],"event":{"name":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","location":"Washington, DC","start":{"date-parts":[[2018,10,21]]},"end":{"date-parts":[[2018,10,23]]}},"container-title":["IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8560606\/8591058\/08591459.pdf?arnumber=8591459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:36:43Z","timestamp":1598233003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8591459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iecon.2018.8591459","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}