{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:15:19Z","timestamp":1766268919840,"version":"3.40.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Instrum. Meas."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tim.2025.3552857","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T19:28:55Z","timestamp":1742412535000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["MFFTD: A Multiscale Feature Fusion Transformer Detector for Electricity Theft Based on Semi-Supervised Learning"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0448-325X","authenticated-orcid":false,"given":"Yufeng","family":"Wang","sequence":"first","affiliation":[{"name":"School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6313-6174","authenticated-orcid":false,"given":"Zhijie","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4497-0407","authenticated-orcid":false,"given":"Jianhua","family":"Ma","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Information Sciences, Hosei University, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1325-4275","authenticated-orcid":false,"given":"Qun","family":"Jin","sequence":"additional","affiliation":[{"name":"Faculty of Human Sciences, Waseda University, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105404"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2916","DOI":"10.1016\/j.rser.2017.10.040","article-title":"Review of various modeling techniques for the detection of electricity theft in smart grid environment","volume":"82","author":"Ahmad","year":"2018","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.epsr.2018.01.005","article-title":"Review of non-technical loss detection methods","volume":"158","author":"Messinis","year":"2018","journal-title":"Electr. Power Syst. Res."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2965276"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3127649"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3139754"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2023.113544","article-title":"Systematic review of energy theft practices and autonomous detection through artificial intelligence methods","volume":"184","author":"Stracqualursi","year":"2023","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2022.108886","article-title":"An attention-based wide and deep CNN with dilated convolutions for detecting electricity theft considering imbalanced data","volume":"214","author":"Xia","year":"2023","journal-title":"Electric Power Syst. Res."},{"key":"ref9","first-page":"634","article-title":"Electricity-theft detection for smart grid security using smart meter data: A deep-CNN based approach","volume-title":"Energy Rep.","volume":"9","author":"Haq","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3201569"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3030238"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265884"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2022.108642","article-title":"A novel approach to detect electricity theft based on conv-attentional transformer neural network","volume":"145","author":"Shi","year":"2023","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.105964","article-title":"Time-series anomaly detection with stacked transformer representations and 1D convolutional network","volume":"120","author":"Kim","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/759"},{"article-title":"A time series is worth 64 words: Long-term forecasting with transformers","volume-title":"Proc. 11th Int. Conf. Learn. Rep.","author":"Nie","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.bdr.2024.100457","article-title":"A multiscale electricity theft detection model based on feature engineering","volume":"36","author":"Zhang","year":"2024","journal-title":"Big Data Res."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467401"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3179243"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2943115"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2020.106448","article-title":"Electricity theft detection based on stacked sparse denoising autoencoder","volume":"125","author":"Huang","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3136683"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2890663"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26317"},{"key":"ref27","first-page":"5998","article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Vaswani"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"volume-title":"Cer Smart Metering Project-Electricity Customer Behaviour Trial, 2009\u20132010","year":"2012","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3189748"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["IEEE Transactions on Instrumentation and Measurement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/19\/10764799\/10934042.pdf?arnumber=10934042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T05:52:18Z","timestamp":1743573138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10934042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/tim.2025.3552857","relation":{},"ISSN":["0018-9456","1557-9662"],"issn-type":[{"type":"print","value":"0018-9456"},{"type":"electronic","value":"1557-9662"}],"subject":[],"published":{"date-parts":[[2025]]}}}