{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T02:48:51Z","timestamp":1770691731546,"version":"3.49.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,1,14]],"date-time":"2024-01-14T00:00:00Z","timestamp":1705190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Project","award":["2019YFB2102300"],"award-info":[{"award-number":["2019YFB2102300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61936014"],"award-info":[{"award-number":["61936014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanghai Municipal Science and Technology Major Project","award":["2021SHZDZX0100"],"award-info":[{"award-number":["2021SHZDZX0100"]}]},{"name":"Shanghai Science and Technology InnovationAction Plan","award":["22511105300"],"award-info":[{"award-number":["22511105300"]}]},{"name":"Natural Science Foundation of Shanghai","award":["22ZR1462900"],"award-info":[{"award-number":["22ZR1462900"]}]},{"name":"Fundamental Research Funds"},{"name":"Central Universities"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>Electricity theft can cause economic damage and even increase the risk of outage. Recently, many methods have implemented electricity theft detection on smart meter data. However, how to conduct detection on the dataset without any label still remains challenging. In this article, we propose a novel unsupervised two-stage approach under the assumption that the training set is contaminated by attacks. Specifically, the method consists of two stages: (1) a Gaussian mixture model is employed to cluster consumption patterns with respect to different habits of electricity usage, and with the goal of improving the accuracy of the model in the posterior stage; (2) an attention-based bidirectional long short-term memory encoder-decoder scheme is employed to improve the robustness against the non-malicious changes in usage patterns leveraging the process of encoding and decoding. Quantifying the similarity of consumption patterns and reconstruction errors, the anomaly score is defined to improve detection performance. Experiments on a real dataset show that the proposed method outperforms the state-of-the-art unsupervised detectors.<\/jats:p>","DOI":"10.1145\/3604432","type":"journal-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T12:00:44Z","timestamp":1694779244000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3385-2758","authenticated-orcid":false,"given":"Qiushi","family":"Liang","sequence":"first","affiliation":[{"name":"Tongji University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6109-2522","authenticated-orcid":false,"given":"Shengjie","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tongji University, Engineering Research Center of Key Software Technologies for Smart City Perception and Planning, and Key Laboratory of Embedded System and Service Computing, Ministry of Education, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4815-9486","authenticated-orcid":false,"given":"Jiangfan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4627-9110","authenticated-orcid":false,"given":"Hao","family":"Deng","sequence":"additional","affiliation":[{"name":"Tongji University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,14]]},"reference":[{"key":"e_1_3_1_2_2","article-title":"Secure control of DC microgrids for instant detection and mitigation of cyber-attacks based on artificial intelligence","author":"Habibi Mohammad Reza","year":"2022","unstructured":"Mohammad Reza Habibi, Hamid Reza Baghaee, Frede Blaabjerg, and Tomislav Dragi\u010devi\u0107. 2022. Secure control of DC microgrids for instant detection and mitigation of cyber-attacks based on artificial intelligence. IEEE Systems Journal 16, 2 (2022), 2580\u20132591.","journal-title":"IEEE Systems Journal"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2019.0032"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3355300"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219712"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/WSCE51339.2020.9275580"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646424"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106946"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894819"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_1_11_2","first-page":"100111","article-title":"Security aspects of Internet of Things aided smart grids: A bibliometric survey","author":"Sakhnini Jacob","year":"2019","unstructured":"Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, and Gautam Srivastava. 2019. Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet of Things 14 (2019), 100111.","journal-title":"Internet of Things"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422731"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3467470"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2055670"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2543145"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100980"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2017.8378347"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.03.039"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1205438"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1242072"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873814"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2018.01.005"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2898171"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2018.8403355"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2020.2968243"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130714"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"e_1_3_1_31_2","unstructured":"Commission for Energy Regulation (CER). CER Smart Metering Project\u2014Electricity Customer Behaviour Trial 2009-2010 [dataset]. 1st Edition. Retrieved September 21 2023 from https:\/\/www.ucd.ie\/issda\/data\/commissionforenergyregulationcer\/"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/222"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2696050"},{"key":"e_1_3_1_34_2","volume-title":"Proceedings of the Anomaly Detection Workshop at the 33rd ICML Conference, Vol. 1607.","author":"Malhotra Pankaj","year":"2016","unstructured":"Pankaj Malhotra, Anusha Ramakrishnan, and Gaurangi Anand. 2016. LSTM-based encoder-decoder for multi-sensor anomaly detection. In Proceedings of the Anomaly Detection Workshop at the 33rd ICML Conference, Vol. 1607."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422402"},{"key":"e_1_3_1_36_2","unstructured":"Bo Zong Qi Song Martin Renqiang Min Wei Cheng Cristian Lumezanu Daeki Cho and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In Proceedings of the 6th International Conference on Learning Representations (ICLR\u201918) ."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/POWERCON.2018.8602251"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1236"},{"key":"e_1_3_1_39_2","unstructured":"Ann Cavoukian. 2009. Privacy by Design: The 7 Foundational Principles. Retrieved September 21 2023 from https:\/\/privacy.ucsc.edu\/resources\/privacy-by-design\u2014foundational-principles.pdf"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:18Z","timestamp":1750178838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,14]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3604432"],"URL":"https:\/\/doi.org\/10.1145\/3604432","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,14]]},"assertion":[{"value":"2021-08-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}