{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T09:17:26Z","timestamp":1774430246840,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380291","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"2264-2274","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Understanding Electricity-Theft Behavior via Multi-Source Data"],"prefix":"10.1145","author":[{"given":"Wenjie","family":"Hu","sequence":"first","affiliation":[{"name":"Zhejiang University"}]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Jianbo","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Taizhou Power Supply Co. Ltd."}]},{"given":"Xuanwen","family":"Huang","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Ziqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.01.100"},{"key":"e_1_3_2_1_2_1","volume-title":"A complexity-invariant distance measure for time series. SDM","author":"Batista EAPA","year":"2011"},{"key":"e_1_3_2_1_3_1","volume-title":"Using dynamic time warping to find patterns in time series. SIGKDD","author":"Berndt J","year":"1994"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00133357"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPEC.2013.6527720"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_7_1","volume-title":"ICML (2015)","author":"Chung Junyoung","year":"2015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2013.4602"},{"key":"e_1_3_2_1_9_1","volume-title":"Fast Computation of Wasserstein Barycenters. ICML","author":"Cuturi Marco","year":"2014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.030"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2010.11.037"},{"key":"e_1_3_2_1_12_1","volume-title":"Power Systems Conference and Exposition (PES). IEEE, 1\u20138.","author":"Sreenadh\u00a0Reddy Depuru Soma Shekara","year":"2011"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 1110\u20131118","author":"Du Yong","year":"2015"},{"key":"e_1_3_2_1_14_1","unstructured":"Engerati. 2018. Non-technical losses today: the business challenges. https:\/\/www.engerati.com\/transmission-and-distribution\/article\/theft-detection\/non-technical-losses-today-business-challenges  Engerati. 2018. Non-technical losses today: the business challenges. https:\/\/www.engerati.com\/transmission-and-distribution\/article\/theft-detection\/non-technical-losses-today-business-challenges"},{"key":"e_1_3_2_1_15_1","first-page":"404","article-title":"Pilfer proofing system and method for electric utility meter box","volume":"4","author":"Fennell B","year":"1983","journal-title":"US Patent"},{"key":"e_1_3_2_1_16_1","unstructured":"Robin Genuer Jeanmichel Poggi Christine Tuleaumalot and Nathalie Villavialaneix. 2015. Random Forests for Big Data. arXiv: Machine Learning(2015).  Robin Genuer Jeanmichel Poggi Christine Tuleaumalot and Nathalie Villavialaneix. 2015. Random Forests for Big Data. arXiv: Machine Learning(2015)."},{"key":"e_1_3_2_1_17_1","volume-title":"Applied Logistic Regression.Contemporary Sociology 23, 1","author":"Gortmaker L","year":"1994"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Acoustics, Speech, and Signal Processing (ICASSP) ([n.\u00a0d.]).","author":"Graves Alex"},{"key":"e_1_3_2_1_19_1","volume-title":"A survey of electric energy metering and countermeasures to electric power stealing [J]. High Voltage Apparatus 46, 5","author":"Guo Li-Cai","year":"2010"},{"key":"e_1_3_2_1_20_1","first-page":"10","article-title":"Talking about Products of Guard against Pilfering Electricity and Pilfering Electricity on the Contrary","volume":"39","author":"Songlin HAN","year":"2002","journal-title":"Electrical Measurement & Instrumentation"},{"key":"e_1_3_2_1_21_1","volume-title":"The analysis and discussion of electricity-stealing and precaution method. Electrical Measurement & Instrumentation 3","author":"Hanmei Hu","year":"2004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_23_1","volume-title":"Transportation Research Board 92nd Annual Meeting.","author":"Kamga Camille","year":"2013"},{"key":"e_1_3_2_1_24_1","volume-title":"Adam: A Method for Stochastic Optimization. ICLR","author":"Kingma P","year":"2015"},{"key":"e_1_3_2_1_25_1","article-title":"Efficient Power Theft Detection for Residential Consumers Using Mean Shift Data Mining Knowledge Discovery Process","volume":"10","author":"Konstantinos Blazakis","year":"2019","journal-title":"International Journal of Artificial Intelligence and Applications (IJAIA)"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Jason Lines Luke\u00a0M Davis Jon Hills and Anthony Bagnall. 2012. A shapelet transform for time series classification. In SIGKDD. ACM 289\u2013297.  Jason Lines Luke\u00a0M Davis Jon Hills and Anthony Bagnall. 2012. A shapelet transform for time series classification. In SIGKDD. ACM 289\u2013297.","DOI":"10.1145\/2339530.2339579"},{"key":"e_1_3_2_1_27_1","volume-title":"How Do Your Neighbors Disclose Your Information: Social-Aware Time Series Imputation. In The World Web Conference (WWW).","author":"Liu Zongtao","year":"2019"},{"key":"e_1_3_2_1_28_1","volume-title":"Conference of the International Speech Communication Association (INTERSPEECH) ([n.\u00a0d.]).","author":"Mikolov Tomas"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2030890"},{"key":"e_1_3_2_1_30_1","volume-title":"China Power\u00a0News Network","author":"Chen Zhiyu","year":"2018"},{"key":"e_1_3_2_1_31_1","unstructured":"PR Newswire. 2017. 96 Billion Is Lost Every Year To Electricity Theft: Utilities increasingly investing in solutions to combat theft and non-technical losses. https:\/\/www.prnewswire.com\/news-releases\/96-billion-is-lost-every-year-to-electricity-theft-300453411.html  PR Newswire. 2017. 96 Billion Is Lost Every Year To Electricity Theft: Utilities increasingly investing in solutions to combat theft and non-technical losses. https:\/\/www.prnewswire.com\/news-releases\/96-billion-is-lost-every-year-to-electricity-theft-300453411.html"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187918"},{"key":"e_1_3_2_1_34_1","volume-title":"Fast shapelets: A scalable algorithm for discovering time series shapelets. ICDM","author":"Rakthanmanon Thanawin","year":"2013"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.05.193"},{"key":"e_1_3_2_1_36_1","volume-title":"A brief view of preventing the electricity power stealing. Electrical Measurement & Instrumentation2","author":"Xiaomei Wu","year":"2003"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0179-5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2010.07.032"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:11Z","timestamp":1750199591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":39,"alternative-id":["10.1145\/3366423.3380291","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380291","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}