{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:10:09Z","timestamp":1766599809038,"version":"3.37.3"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFB0903000"],"award-info":[{"award-number":["2017YFB0903000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010880","name":"State Grid Corporation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010880","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/tnnls.2020.2994116","type":"journal-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T20:00:57Z","timestamp":1591300857000},"page":"1866-1880","source":"Crossref","is-referenced-by-count":29,"title":["Nontechnical Losses Detection Through Coordinated BiWGAN and SVDD"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9903-0696","authenticated-orcid":false,"given":"Tianyu","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1435-5796","authenticated-orcid":false,"given":"Qinglai","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5465-9818","authenticated-orcid":false,"given":"Hongbin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Tian-En","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0002-5502","authenticated-orcid":false,"given":"Jian","family":"Lan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1109\/TNN.2010.2053853","article-title":"Fast support vector data descriptions for novelty detection","volume":"21","author":"liu","year":"2010","journal-title":"IEEE Trans Neural Netw"},{"article-title":"A novel anomaly detection scheme based on principal component classifier","year":"2003","author":"shyu","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.037"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2006.1656136"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0020-z"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46145-0_17"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.07.009"},{"journal-title":"Tensorflow Implementation of AnoGAN (Anomaly GAN)","year":"2017","key":"ref60"},{"journal-title":"Yahoo Webscope","year":"2018","key":"ref61"},{"key":"ref28","first-page":"187","article-title":"Online outlier detection in sensor data using non-parametric models","author":"subramaniam","year":"2006","journal-title":"Proc 32nd Int Conf Very Large Data Bases"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2008.4670523"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0093-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.05.193"},{"journal-title":"$96 Billion is Lost Every Year to Electricity Theft","year":"2017","key":"ref1"},{"key":"ref20","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"arXiv 1701 07875"},{"key":"ref22","article-title":"Adversarial feature learning","author":"donahue","year":"2016","journal-title":"arXiv 1605 09782"},{"key":"ref21","first-page":"5769","article-title":"Improved training of Wasserstein GANs","author":"gulrajani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref23","article-title":"Adversarially learned inference","author":"dumoulin","year":"2016","journal-title":"arXiv 1606 00704"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-004-2174-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.595"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref59","article-title":"Introduction to machine learning: Class notes 67577","author":"shashua","year":"2009","journal-title":"arXiv 0904 3664"},{"journal-title":"Irish Social Science Data Archive","year":"2017","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/BF01589116"},{"key":"ref56","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2161621"},{"key":"ref52","article-title":"ArcFace: Additive angular margin loss for deep face recognition","author":"deng","year":"2018","journal-title":"arXiv 1801 07698"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref11","article-title":"Research study quantifies energy theft losses","author":"culwell","year":"2001","journal-title":"Metering International"},{"key":"ref40","first-page":"1025","article-title":"One-class novelty detection for seizure analysis from intracranial EEG","volume":"7","author":"gardner","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref12","first-page":"135","article-title":"Improving electric fraud detection using class imbalance strategies","author":"di martino","year":"2012","journal-title":"Proc ICPR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2016.05.036"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/978-3-642-33338-5_11","article-title":"Evaluating electricity theft detectors in smart grid networks","author":"mashima","year":"2012","journal-title":"Research in Attacks Intrusions and Defenses"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PECON.2006.346624"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref18","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510583"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130714"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2018.01.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.926431"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2009.5275809"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2006.873019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref47","first-page":"1988","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.07.002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379964"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.53"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/9420773\/09108593.pdf?arnumber=9108593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:16Z","timestamp":1652194396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":61,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2020.2994116","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"type":"print","value":"2162-237X"},{"type":"electronic","value":"2162-2388"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}