{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:47:15Z","timestamp":1770490035758,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/ijcnn.2018.8489389","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T22:25:09Z","timestamp":1539987909000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["Electricity fraud detection using committee semi-supervised learning"],"prefix":"10.1109","author":[{"given":"Joaquim L.","family":"Viegas","sequence":"first","affiliation":[]},{"given":"Nuno M.","family":"Cepeda","sequence":"additional","affiliation":[]},{"given":"Susana M.","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Analytics for understanding customer behavior in the energy and utility industry","volume":"60","author":"aravkin","year":"2016","journal-title":"IBM Journal of Research and Development"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2282931"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.2017.10.1.51"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1109\/FUZZ-IEEE.2017.8015546","article-title":"Clustering-based Novelty Detection to Uncover Electricity Theft","author":"viegas","year":"2017","journal-title":"Proc of the 2017 IEEE International Conference on Fuzzy Systems (FuzzIEEE)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2011.09.009"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-319-22264-6_5","article-title":"PCA-based method for detecting integrity attacks on advanced metering infrastructure","author":"krishna","year":"2015","journal-title":"International Conference on Quantitative Evaluation of Systems"},{"key":"ref16","first-page":"176","article-title":"Energy theft in the advanced metering infrastructure","volume":"6027","author":"mclaughlin","year":"2010","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref17","first-page":"1319","article-title":"A multi-sensor energy theft detection framework for advanced metering infrastructures","volume":"31","author":"mclaughlin","year":"2013","journal-title":"2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)"},{"key":"ref18","first-page":"1","article-title":"Detecting and Locating Non-technical Losses in Modern Distribution Networks","volume":"3053","author":"leite","year":"2016"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/978-3-642-33338-5_11","article-title":"Evaluating electricity theft detectors in smart grid networks","volume":"7462","author":"mashima","year":"2012","journal-title":"Lecture Notes in Computer Science"},{"key":"ref28","article-title":"Semisupervised Learning with Deep Generative Models","author":"kingma","year":"2014","journal-title":"Proceedings of Neural Information Processing Systems (NIPS) 2014"},{"key":"ref4","year":"2007","journal-title":"Energy Theft Kills Costs Innocent Pennsylvanians Millions"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"ref3","year":"2012","journal-title":"Energy theft incentives to change"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6787363"},{"key":"ref8","first-page":"3730","article-title":"Fraud identification in electricity company costumers using decision tree","volume":"4","author":"filho","year":"2004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.05.193"},{"key":"ref2","year":"0","journal-title":"Frequently Asked Questions How much energy is stolen?"},{"key":"ref9","article-title":"Performance evaluation of a sensorbased system devised to minimize commercial losses in street lighting networks","author":"soares","year":"2014","journal-title":"IEEE Instrumentation and Measurement Technology Conference (I2MTC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2015.07.009"},{"key":"ref20","first-page":"1","article-title":"Self-labeled techniques for semi-supervised learning: taxonomy, software and empirical study","year":"2013","journal-title":"Knowledge and Information Systems"},{"key":"ref22","author":"louppe","year":"2014","journal-title":"Understanding random forests From theory to practice"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2008.27"},{"key":"ref24","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref26","author":"hastie","year":"2008","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref25","year":"0","journal-title":"Data from the Commission for Energy Regulation"}],"event":{"name":"2018 International Joint Conference on Neural Networks (IJCNN)","location":"Rio de Janeiro","start":{"date-parts":[[2018,7,8]]},"end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8465565\/8488986\/08489389.pdf?arnumber=8489389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:13:19Z","timestamp":1598238799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8489389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2018.8489389","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}