{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:36Z","timestamp":1750220256087,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MOST","award":["108-2221-E- 005-021-MY3"],"award-info":[{"award-number":["108-2221-E- 005-021-MY3"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506503","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"22-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft Detection"],"prefix":"10.1145","author":[{"given":"Chi-Tse","family":"Lu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan"}]},{"given":"Chun-Wei","family":"Tsai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Tech. Rep.","author":"Antmann P.","year":"2009","unstructured":"P. Antmann , \"Reducing technical and non-technical losses in the power sector,\" World Bank, Washington, DC, USA , Tech. Rep. , 2009 . P. Antmann, \"Reducing technical and non-technical losses in the power sector,\" World Bank, Washington, DC, USA, Tech. Rep., 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2697440"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.05.193"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"458","article-title":"Real-time anomaly detection based on long short-term memory and gaussian mixture model","volume":"79","author":"Ding N.","year":"2019","unstructured":"N. Ding , H. Ma , H. Gao , Y. Ma , and G. Tan , \" Real-time anomaly detection based on long short-term memory and gaussian mixture model ,\" Computers & Electrical Engineering , vol. 79 , no. 1 , pp. 106 458 - 106 469, 2019 . N. Ding, H. Ma, H. Gao, Y. Ma, and G. Tan, \"Real-time anomaly detection based on long short-term memory and gaussian mixture model,\" Computers & Electrical Engineering, vol. 79, no. 1, pp. 106 458-106 469, 2019.","journal-title":"Computers & Electrical Engineering"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2943115"},{"key":"e_1_3_2_1_6_1","volume-title":"Electricity theft detection with self-attention,\" arXiv preprint arXiv:2002.06219","author":"Finardi P.","year":"2020","unstructured":"P. Finardi , I. Campiotti , G. Plensack , R. D. de Souza , R. Nogueira , G. Pinheiro , and R. Lotufo , \" Electricity theft detection with self-attention,\" arXiv preprint arXiv:2002.06219 , 2020 . P. Finardi, I. Campiotti, G. Plensack, R. D. de Souza, R. Nogueira, G. Pinheiro, and R. Lotufo, \"Electricity theft detection with self-attention,\" arXiv preprint arXiv:2002.06219, 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10124378"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Electricity theft detection using empirical mode decomposition and k-nearest neighbors","author":"Aziz S.","year":"2020","unstructured":"S. Aziz , S. Z. H. Naqvi , M. U. Khan , and T. Aslam , \" Electricity theft detection using empirical mode decomposition and k-nearest neighbors ,\" in Proceedings of the International Conference on Emerging Trends in Smart Technologies , 2020 , pp. 1 -- 5 . S. Aziz, S. Z. H. Naqvi, M. U. Khan, and T. Aslam, \"Electricity theft detection using empirical mode decomposition and k-nearest neighbors,\" in Proceedings of the International Conference on Emerging Trends in Smart Technologies, 2020, pp. 1--5.","journal-title":"Proceedings of the International Conference on Emerging Trends in Smart Technologies"},{"key":"e_1_3_2_1_10_1","first-page":"233","article-title":"The relationship between precision-recall and ROC curves","author":"Davis J.","year":"2006","unstructured":"J. Davis and M. Goadrich , \" The relationship between precision-recall and ROC curves ,\" in Proceedings of the International Conference on Machine Learning , 2006 , pp. 233 -- 240 . J. Davis and M. Goadrich, \"The relationship between precision-recall and ROC curves,\" in Proceedings of the International Conference on Machine Learning, 2006, pp. 233--240.","journal-title":"Proceedings of the International Conference on Machine Learning"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-95128-x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2017.09.005"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.053"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2017.1363410"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/a13050121"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/en12173310"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"12","article-title":"Electricity theft detection in power grids with deep learning and random forests","volume":"2019","author":"Li S.","year":"2019","unstructured":"S. Li , Y. Han , X. Yao , S. Yingchen , J. Wang , and Q. Zhao , \" Electricity theft detection in power grids with deep learning and random forests ,\" Journal of Electrical and Computer Engineering , vol. 2019 , no. 1 , pp. 12 -- 25 , 2019 . S. Li, Y. Han, X. Yao, S. Yingchen, J. Wang, and Q. Zhao, \"Electricity theft detection in power grids with deep learning and random forests,\" Journal of Electrical and Computer Engineering, vol. 2019, no. 1, pp. 12--25, 2019.","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2835523"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/en13215758"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.58871"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116037"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3013545.3013549"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"},{"key":"e_1_3_2_1_24_1","first-page":"867","article-title":"A novel feature design and stacking approach for non-technical electricity loss detection","author":"Aydin Z.","year":"2018","unstructured":"Z. Aydin and V. C. Gungor , \" A novel feature design and stacking approach for non-technical electricity loss detection ,\" in Proceedings of the Innovative Smart Grid Technologies-Asia , 2018 , pp. 867 -- 872 . Z. Aydin and V. C. Gungor, \"A novel feature design and stacking approach for non-technical electricity loss detection,\" in Proceedings of the Innovative Smart Grid Technologies-Asia, 2018, pp. 867--872.","journal-title":"Proceedings of the Innovative Smart Grid Technologies-Asia"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805908"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010173"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"issue":"10","key":"e_1_3_2_1_28_1","first-page":"1995","article-title":"Convolutional networks for images, speech, and time series","volume":"3361","author":"LeCun Y.","year":"1995","unstructured":"Y. LeCun and Y. Bengio , \" Convolutional networks for images, speech, and time series ,\" The Handbook of Brain Theory and Neural Networks , vol. 3361 , no. 10 , pp. 1995 -- 2009 , 1995 . Y. LeCun and Y. Bengio, \"Convolutional networks for images, speech, and time series,\" The Handbook of Brain Theory and Neural Networks, vol. 3361, no. 10, pp. 1995--2009, 1995.","journal-title":"The Handbook of Brain Theory and Neural Networks"},{"key":"e_1_3_2_1_29_1","first-page":"1026","article-title":"Delving deep into rectifiers: Surpassing human-level performance on imagenet classification","author":"He K.","year":"2015","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun , \" Delving deep into rectifiers: Surpassing human-level performance on imagenet classification ,\" in Proceedings of the IEEE International Conference on Computer Vision , 2015 , pp. 1026 -- 1034 . K. He, X. Zhang, S. Ren, and J. Sun, \"Delving deep into rectifiers: Surpassing human-level performance on imagenet classification,\" in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 1026--1034.","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_31_1","first-page":"364","volume-title":"Model Evaluation and Selection\" in Data Mining Concepts and Techniques","author":"Han J.","year":"2014","unstructured":"J. Han , K. Micheline , and J. Pei , \" Model Evaluation and Selection\" in Data Mining Concepts and Techniques . New York, NY, USA : Elsevier , 2014 , ch. 8, pp. 364 -- 377 . J. Han, K. Micheline, and J. Pei, \"Model Evaluation and Selection\" in Data Mining Concepts and Techniques. New York, NY, USA: Elsevier, 2014, ch. 8, pp. 364--377."},{"key":"e_1_3_2_1_32_1","first-page":"3286","article-title":"Attention augmented convolutional networks","author":"Bello I.","year":"2019","unstructured":"I. Bello , B. Zoph , A. Vaswani , J. Shlens , and Q. V. Le , \" Attention augmented convolutional networks ,\" in Proceedings of the IEEE\/CVF International Conference on Computer Vision , 2019 , pp. 3286 -- 3295 . I. Bello, B. Zoph, A. Vaswani, J. Shlens, and Q. V. Le, \"Attention augmented convolutional networks,\" in Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2019, pp. 3286--3295.","journal-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":32,"alternative-id":["10.1145\/3491396.3506503","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506503","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}