{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T23:28:36Z","timestamp":1775863716394,"version":"3.50.1"},"reference-count":176,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002367","name":"Special Fund for Strategic Pilot Technology of Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["XDC02020600"],"award-info":[{"award-number":["XDC02020600"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2019YFB1707401"],"award-info":[{"award-number":["2019YFB1707401"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2021YFB3301001"],"award-info":[{"award-number":["2021YFB3301001"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902299"],"award-info":[{"award-number":["61902299"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976168"],"award-info":[{"award-number":["61976168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022088"],"award-info":[{"award-number":["62022088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Liaoning Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020JH2\/10500002"],"award-info":[{"award-number":["2020JH2\/10500002"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005047","name":"Liaoning Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019-YQ-09"],"award-info":[{"award-number":["2019-YQ-09"]}],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018617","name":"Liaoning Revitalization Talents Program","doi-asserted-by":"publisher","award":["XLYC1902110"],"award-info":[{"award-number":["XLYC1902110"]}],"id":[{"id":"10.13039\/501100018617","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2019CGXNG-023"],"award-info":[{"award-number":["2019CGXNG-023"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"name":"S&T Program of Hebei","award":["20310102D"],"award-info":[{"award-number":["20310102D"]}]},{"DOI":"10.13039\/501100002367","name":"International Partnership Program of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["173321KYSB20200002"],"award-info":[{"award-number":["173321KYSB20200002"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019TQ0239"],"award-info":[{"award-number":["2019TQ0239"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M663636"],"award-info":[{"award-number":["2019M663636"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1109\/jproc.2021.3139754","type":"journal-article","created":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T20:29:51Z","timestamp":1642624191000},"page":"273-319","source":"Crossref","is-referenced-by-count":131,"title":["Detection Methods in Smart Meters for Electricity Thefts: A Survey"],"prefix":"10.1109","volume":"110","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2953-2313","authenticated-orcid":false,"given":"Xiaofang","family":"Xia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8549-6794","authenticated-orcid":false,"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4730-017X","authenticated-orcid":false,"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5569-0780","authenticated-orcid":false,"given":"Jiangtao","family":"Cui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b17228"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2017.083410"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5210-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2017.086791"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRERA.2012.6477421"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1393"},{"key":"ref8","volume-title":"People Who Steal Edison\u2019s Electricity","year":"1886"},{"key":"ref9","volume-title":"Smart Meters: Electricity Meters Solutions From Texas Instruments","year":"2018"},{"key":"ref10","volume-title":"FBI: Smart Meter Hacks Likely to Spread","author":"Krebs","year":"2012"},{"key":"ref11","volume-title":"World Loses $89.3 Billion to Electricity Theft Annually, $58.7 Billion in Emerging Markets","year":"2014"},{"key":"ref12","volume-title":"96 Billion Dollars Is Lost Every Year to Electricity Theft","year":"2017"},{"key":"ref13","volume-title":"Reducing Technical and Non-Technical Losses in the Power Sector","author":"Antmann","year":"2009"},{"key":"ref14","volume-title":"How Middle-Class Families Are Turning to Crime by Getting Specialist Gangs to \u2018Hotwire\u2019 Their Gas and Electricity Supplies to Beat Soaring Energy Bills","author":"Arkell","year":"2014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2010.11.037"},{"key":"ref16","volume-title":"Fighting Electricity Theft With Advanced Metering Infrastructure","year":"2011"},{"key":"ref17","volume-title":"Analysis: Electricity Theft in South Africa. Metering & Smart Energy International","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEUROPE.2010.5638852"},{"key":"ref19","volume-title":"Energy Theft in Brazil Out of Control","author":"Place","year":"2013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2030890"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jup.2015.06.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2015.07.009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2016.02.048"},{"key":"ref25","first-page":"20","article-title":"Power theft: The silent crime","volume":"57","author":"Seger","year":"1988","journal-title":"FBI Law Enforcement Bull."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2019.099233"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6787363"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2015.08.006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2018.01.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.10.040"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0301-4215(03)00182-4"},{"key":"ref32","first-page":"187","article-title":"Electricity theft\u2014A primary cause of high distribution losses in Indian state","volume":"5","author":"Saini","year":"2018","journal-title":"Int. Res. J. Manage. Commerce"},{"key":"ref33","volume-title":"Rural-Urban Inequality in China","author":"Park","year":"2018"},{"key":"ref34","first-page":"213","article-title":"Techno-economic analysis of illegal electricity usage in Turkey and policy proposals","volume":"5","author":"Onat","year":"2010","journal-title":"WSEAS Trans. Power Syst."},{"issue":"2","key":"ref35","first-page":"599","article-title":"Long run determinants of electricity theft in Pakistan: An empirical analysis","volume":"35","author":"Mirza","year":"2015","journal-title":"Pakistan J. Social Sci."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/sdr.4260030105"},{"key":"ref37","article-title":"Illegal electricity use in Turkey: Causes and policy implications","author":"Marangoz","year":"2013"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.30541\/v53i3pp.239-254"},{"key":"ref39","article-title":"Theft and loss of electricity in an Indian state","author":"Golden","year":"2012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/0032258x6804101203"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198082279.003.0001"},{"key":"ref42","volume-title":"Pakistan Penal Code Electricity Theft Amendment 2016","year":"2017"},{"key":"ref43","volume-title":"Turkey\u2014Criminal Code (Unofficial English Translation)","year":"2017"},{"key":"ref44","volume-title":"Theft\/Non-Technical Losses (Water and Electricity)","year":"2017"},{"key":"ref45","volume-title":"Electricity Theft May Attract N200,000 in Fines","author":"Nnodim","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-3706-3.ch002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF00138862"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1596\/9780821389096_ch03"},{"issue":"7","key":"ref49","first-page":"644","article-title":"Political economy of electricity theft in rural areas: A case study from Rajasthan","volume":"40","author":"Katiyar","year":"2005","journal-title":"Econ. Political Weekly"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3386\/w3838"},{"key":"ref51","volume-title":"The Effects of Unemployment on Crime Rates in the U.S.","author":"Ajimotokin","year":"2015"},{"key":"ref52","volume-title":"Types of Energy Meters and Their Working Principles","year":"2020"},{"key":"ref53","volume-title":"Basic Types of Energy Meters","author":"Sarwar","year":"2017"},{"key":"ref54","volume-title":"Smart Meter","year":"2019"},{"key":"ref55","volume-title":"Electricity Metering Accuracy Explained","year":"2020"},{"key":"ref56","volume-title":"Accuracy of Digital Electricity Meters","year":"2010"},{"key":"ref57","volume-title":"Updated ANSI Standards Address New Power Metering Capabilities and Challenges","author":"Przydatek","year":"2018"},{"key":"ref58","volume-title":"Common Methods for Electricity Theft"},{"key":"ref59","volume-title":"Theft of Electricity","year":"2018"},{"key":"ref60","volume-title":"U.K. Smart Meters Arrive in 2020. Hackers Have Already Found a Flaw","author":"Hamill","year":"2014"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2014.12.007"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14379-3_15"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2574714"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596535"},{"key":"ref65","volume-title":"CMS-India Corruption Study 2017 Perception and Experience With Public Services & Snapshot View for 2005\u20132017","year":"2017"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0_16"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2406311"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260697"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113348"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.44"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.10.011"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2229397"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427841"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2717781"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CIASG.2014.7011557"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.926431"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2543145"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.09.013"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051823"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2009.5352910"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2560801"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2014.05.004"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-LA.2013.6554383"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2721435"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2011.5772466"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2013.4602"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2016.7536744"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2006.1635791"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0048"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2019.101239"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45477-1_18"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355148"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22264-6_5"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.19"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.10.031"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2008.4766403"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2055670"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.11.001"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2170182"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25751-8_11"},{"key":"ref102","volume-title":"RBF SVM Parameters. Scikit-Learn.Org","year":"2020"},{"key":"ref103","first-page":"1","article-title":"Improving electric fraud detection using class imbalance strategies","volume-title":"Proc. ICPRAM","author":"Martino"},{"key":"ref104","volume-title":"One-Class SVM With Non-Linear Kernel (RBF). Scikit-Learn.Org","year":"2020"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.115440"},{"key":"ref106","volume-title":"Wikipedia. Deep Learning","year":"2021"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.115911"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/en12173310"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2943115"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130714"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2011.09.009"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2519506"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364711"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2327809"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2727878"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/c2012-0-06106-6"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1002\/ima.20188"},{"key":"ref118","first-page":"1233","article-title":"Speeding up optimum-path forest training by path-cost propagation","volume-title":"Proc. 21st Int. Conf. Pattern Recognit. (ICPR2012)","author":"Iwashita"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1142\/9789814656535_0006"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2011.5937748"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/LASCAS.2015.7250405"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2821765"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2015.7232685"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2017.07.008"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.03.031"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2161621"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2016.7580882"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2282931"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.014"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-017-0268-1"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_11"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2256939"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-LA.2015.7381272"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2705192"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400434"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134414"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249480"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.004"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854703"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2855139"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2921232"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2484841"},{"key":"ref143","volume-title":"Systems of Equations","year":"2020"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1682"},{"key":"ref145","volume-title":"Part A: Technical Specifications of FRTU for Remote Controlled Switches (FRTUS), no. ASD-FRTU-001\/2007","year":"2007"},{"key":"ref146","volume-title":"Digital Protective Relay DPR 1000","year":"2020"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"ref148","volume-title":"Dynamic Programming","year":"2020"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2020.107875"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1177\/0193841X7700100304"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9930.1980.tb00219.x"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1086\/449107"},{"key":"ref153","volume-title":"Prediction in Criminology","author":"Farrington","year":"1985"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-3772-3"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1177\/0011128706294439"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9133.2006.00397.x"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731363"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883385"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.009"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2903185.2903188"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2003.1335175"},{"key":"ref162","volume-title":"Recursive Least Squares Filter","year":"2020"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.04.005"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-62521-7_6"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42836-9_5"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2223531"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2224891"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3390\/en13082039"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106904"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3047864"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2274043"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513023"},{"key":"ref173","volume-title":"Dozens Jailed for Electricity Theft Over Three Years","year":"2018"},{"key":"ref174","volume-title":"8,836 Cases of Electricity Theft Recorded in First Half of 2019","year":"2019"},{"key":"ref175","volume-title":"Illegal Cannabis Cultivators Stole 60 Million Electricity Last Year","year":"2020"},{"key":"ref176","volume-title":"How Cannabis Farms Steal Megawatts to Grow Mega-Weed","year":"2020"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/9702902\/09686052.pdf?arnumber=9686052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:19:25Z","timestamp":1705184365000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9686052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":176,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2021.3139754","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2]]}}}