{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:26:27Z","timestamp":1778347587532,"version":"3.51.4"},"reference-count":93,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Driven by industrial development and the rising population, the upward trend of electricity consumption is not going to curb. While the electricity suppliers make every endeavor to satisfy the needs of consumers, they are facing the plight of indirect losses caused by technical or non-technical factors. Technical losses are usually induced by short circuits, power outage, or grid failures. The non-technical losses result from humans\u2019 improper behaviors, e.g., electricity burglars. Due to the restrictions of the detection methods, the detection rate in the traditional power grid is lousy. To provide better electricity service for the customers and minimize the losses for the providers, a leap in the power grid is occurring, which is referred to as the smart grid. The smart grid is envisioned to increase the detection accuracy to an acceptable level by utilizing modern technologies, such as cloud computing. With the aim of obtaining achievements of anomaly detection for electricity consumption with cloud computing, we firstly introduce the basic definition of anomaly detection for electricity consumption. Next, we conduct the surveys on the proposed framework of anomaly detection for electricity consumption and propose a new framework with cloud computing. This is followed by centralized and decentralized detection methods. Then, the applications of centralized and decentralized detection methods for the anomaly electricity consumption are listed. Finally, the open challenges of the accuracy of detection and anomaly detection for electricity consumption with edge computing are discussed.<\/jats:p>","DOI":"10.1186\/s13638-020-01807-0","type":"journal-article","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T13:03:57Z","timestamp":1602075837000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Anomaly detection for electricity consumption in cloud computing: framework, methods, applications, and challenges"],"prefix":"10.1186","volume":"2020","author":[{"given":"Longji","family":"Feng","sequence":"first","affiliation":[]},{"given":"Shu","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Linghao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jidong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengbo","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1520-4917","authenticated-orcid":false,"given":"Haoyang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"issue":"18","key":"1807_CR1","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1016\/S0301-4215(03)00182-4","volume":"32","author":"T. B. Smith","year":"2004","unstructured":"T. B. Smith, Electricity theft: a comparative analysis. Energy policy. 32(18), 2067\u20132076 (2004).","journal-title":"Energy policy"},{"key":"1807_CR2","volume-title":"Electricity Consumption Anomaly Detection Model Using Deep Learning","author":"C. Banad Ramesh","year":"2019","unstructured":"C. Banad Ramesh, Electricity Consumption Anomaly Detection Model Using Deep Learning (National College of Ireland, Dublin, 2019)."},{"key":"1807_CR3","doi-asserted-by":"publisher","unstructured":"X. Chi, C. Yan, H. Wang, W. Rafique, L. Qi, Amplified locality-sensitive hashing-based recommender systems with privacy protection. Concurr. Comput. Pract. Experience (2020). https:\/\/doi.org\/10.1002\/cpe.5681.","DOI":"10.1002\/cpe.5681"},{"issue":"2","key":"1807_CR4","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/TPWRS.2017.2721435","volume":"33","author":"J. I. Guerrero","year":"2017","unstructured":"J. I. Guerrero, I. Monedero, F. Biscarri, J. Biscarri, R. Mill\u00e1n, C. Le\u00f3n, Non-technical losses reduction by improving the inspections accuracy in a power utility. IEEE Trans. Power Syst.33(2), 1209\u20131218 (2017).","journal-title":"IEEE Trans. Power Syst."},{"key":"1807_CR5","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.rser.2015.12.114","volume":"57","author":"Y. Kabalci","year":"2016","unstructured":"Y. Kabalci, A survey on smart metering and smart grid communication. Renew. Sust. Energ. Rev.57:, 302\u2013318 (2016).","journal-title":"Renew. Sust. Energ. Rev."},{"issue":"1","key":"1807_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TSG.2010.2046346","volume":"1","author":"K. Moslehi","year":"2010","unstructured":"K. Moslehi, R. Kumar, A reliability perspective of the smart grid. IEEE Trans. Smart Grid. 1(1), 57\u201364 (2010).","journal-title":"IEEE Trans. Smart Grid"},{"key":"1807_CR7","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.rser.2016.01.011","volume":"59","author":"M. L. Tuballa","year":"2016","unstructured":"M. L. Tuballa, M. L. Abundo, A review of the development of smart grid technologies. Renew. Sust. Energ. Rev.59:, 710\u2013725 (2016).","journal-title":"Renew. Sust. Energ. Rev."},{"key":"1807_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/GreenTech.2013.17","volume-title":"2013 IEEE Green Technologies Conference (GreenTech)","author":"J. Zheng","year":"2013","unstructured":"J. Zheng, D. W. Gao, L. Lin, in 2013 IEEE Green Technologies Conference (GreenTech). Smart meters in smart grid: an overview (IEEEDenver, 2013), pp. 57\u201364."},{"key":"1807_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s00450-017-0360-9","volume":"33","author":"E. Mengelkamp","year":"2018","unstructured":"E. Mengelkamp, B. Notheisen, C. Beer, D. Dauer, C. Weinhardt, A blockchain-based smart grid: towards sustainable local energy markets. Comput. Sci. Res. Dev.33:, 207\u2013214 (2018).","journal-title":"Comput. Sci. Res. Dev."},{"issue":"1","key":"1807_CR10","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSG.2015.2425222","volume":"7","author":"P. Jokar","year":"2015","unstructured":"P. Jokar, N. Arianpoo, V. C. Leung, Electricity theft detection in ami using customers\u2019 consumption patterns. IEEE Trans. Smart Grid. 7(1), 216\u2013226 (2015).","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"1807_CR11","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","volume":"24","author":"X. Chen","year":"2015","unstructured":"X. Chen, L. Jiao, W. Li, X. Fu, Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Trans. Netw.24(5), 2795\u20132808 (2015).","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"1807_CR12","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.comcom.2020.04.018","volume":"157","author":"W. Zhong","year":"2020","unstructured":"W. Zhong, X. Yin, X. Zhang, S. Li, W. Dou, R. Wang, L. Qi, Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment. Comput. Commun.157:, 116\u2013123 (2020).","journal-title":"Comput. Commun."},{"issue":"1","key":"1807_CR13","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/COMST.2016.2616442","volume":"19","author":"S. Tan","year":"2017","unstructured":"S. Tan, D. De, W. -Z. Song, J. Yang, S. K. Das, Survey of security advances in smart grid: a data driven approach. IEEE Commun. Surv. Tutorials. 19(1), 397\u2013422 (2017).","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"1807_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TII.2012.2218253","volume":"9","author":"V. C. Gungor","year":"2012","unstructured":"V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, G. P. Hancke, A survey on smart grid potential applications and communication requirements. IEEE Trans. Ind. inform.9(1), 28\u201342 (2012).","journal-title":"IEEE Trans. Ind. inform."},{"issue":"9","key":"1807_CR15","doi-asserted-by":"publisher","first-page":"6172","DOI":"10.1109\/TII.2019.2959258","volume":"16","author":"X. Xu","year":"2019","unstructured":"X. Xu, R. Mo, F. Dai, W. Lin, S. Wan, W. Dou, Dynamic resource provisioning with fault tolerance for data-intensive meteorological workflows in cloud. IEEE Trans. Ind. inform.16(9), 6172\u20136181 (2019).","journal-title":"IEEE Trans. Ind. inform."},{"key":"1807_CR16","doi-asserted-by":"publisher","first-page":"113361","DOI":"10.1016\/j.eswa.2020.113361","volume":"151","author":"C. Zhou","year":"2020","unstructured":"C. Zhou, A. Li, A. Hou, Z. Zhang, Z. Zhang, P. Dai, F. Wang, Modeling methodology for early warning of chronic heart failure based on real medical big data. Expert Syst. Appl.151:, 113361 (2020).","journal-title":"Expert Syst. Appl."},{"key":"1807_CR17","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.eswa.2016.06.013","volume":"62","author":"L. Baldacci","year":"2016","unstructured":"L. Baldacci, M. Golfarelli, D. Lombardi, F. Sami, Natural gas consumption forecasting for anomaly detection. Expert Syst. Appl.62:, 190\u2013201 (2016).","journal-title":"Expert Syst. Appl."},{"key":"1807_CR18","doi-asserted-by":"publisher","first-page":"101522","DOI":"10.1016\/j.is.2020.101522","volume":"92","author":"J. Li","year":"2020","unstructured":"J. Li, T. Cai, K. Deng, X. Wang, T. Sellis, F. Xia, Community-diversified influence maximization in social networks. Inf. Syst.92:, 101522 (2020).","journal-title":"Inf. Syst."},{"key":"1807_CR19","doi-asserted-by":"crossref","unstructured":"L. Decker, D. Leite, L. Giommi, D. Bonacorsi, Real-time anomaly detection in data centers for log-based predictive maintenance using an evolving fuzzy-rule-based approach. arXiv preprint arXiv:2004.13527 (2020).","DOI":"10.1109\/FUZZ48607.2020.9177762"},{"key":"1807_CR20","first-page":"1","volume":"PP","author":"X. Xu","year":"2020","unstructured":"X. Xu, X. Zhang, X. Liu, J. Jiang, L. Qi, M. Z. A. Bhuiyan, Adaptive computation offloading with edge for 5g-envisioned internet of connected vehicles. IEEE Trans. Intell. Transp. Syst.PP:, 1\u201310 (2020).","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"1807_CR21","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V. Hodge","year":"2004","unstructured":"V. Hodge, J. Austin, A survey of outlier detection methodologies. Artif. Intell. Rev.22(2), 85\u2013126 (2004).","journal-title":"Artif. Intell. Rev."},{"issue":"6","key":"1807_CR22","doi-asserted-by":"publisher","first-page":"4187","DOI":"10.1109\/TII.2019.2936869","volume":"16","author":"X. Xue","year":"2019","unstructured":"X. Xue, X. Zhang, H. Gao, Y. Xue, L. Qi, W. Dou, Become: blockchain-enabled computation offloading for iot in mobile edge computing. IEEE Trans. Ind. Inform. 16(6), 4187\u20134195 (2019).","journal-title":"IEEE Trans. Ind. Inform"},{"key":"1807_CR23","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/3297280.3297326","volume-title":"Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing","author":"S. Pauwels","year":"2019","unstructured":"S. Pauwels, T. Calders, in Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing. An anomaly detection technique for business processes based on extended dynamic Bayesian networks (ACMLafayette, 2019), pp. 494\u2013501."},{"key":"1807_CR24","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.apenergy.2019.02.025","volume":"240","author":"R. Moghaddass","year":"2019","unstructured":"R. Moghaddass, S. Sheng, An anomaly detection framework for dynamic systems using a Bayesian hierarchical framework. Appl. Energy. 240:, 561\u2013582 (2019).","journal-title":"Appl. Energy"},{"issue":"4","key":"1807_CR25","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TCYB.2018.2804940","volume":"49","author":"X. Miao","year":"2018","unstructured":"X. Miao, Y. Liu, H. Zhao, C. Li, Distributed online one-class support vector machine for anomaly detection over networks. IEEE Trans. Cybern.49(4), 1475\u20131488 (2018).","journal-title":"IEEE Trans. Cybern."},{"key":"1807_CR26","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.cviu.2018.02.006","volume":"172","author":"M. Sabokrou","year":"2018","unstructured":"M. Sabokrou, M. Fayyaz, M. Fathy, Z. Moayed, R. Klette, Deep-anomaly: fully convolutional neural network for fast anomaly detection in crowded scenes. Comp. Vision Image Underst.172:, 88\u201397 (2018).","journal-title":"Comp. Vision Image Underst."},{"issue":"6","key":"1807_CR27","first-page":"339","volume":"9","author":"S. K. Patel","year":"2016","unstructured":"S. K. Patel, A. Sonker, Rule-based network intrusion detection system for port scanning with efficient port scan detection rules using snort. Int. J. Futur. Gener. Commun. Netw.9(6), 339\u2013350 (2016).","journal-title":"Int. J. Futur. Gener. Commun. Netw."},{"key":"1807_CR28","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/978-3-030-24271-8_56","volume-title":"International Conference on Artificial Intelligence and Security","author":"L. Wang","year":"2019","unstructured":"L. Wang, J. Li, U. A. Bhatti, Y. Liu, in International Conference on Artificial Intelligence and Security. Anomaly detection in wireless sensor networks based on knn (SpringerNew York, 2019), pp. 632\u2013643."},{"key":"1807_CR29","first-page":"1","volume":"PP","author":"M. R. Khosravi","year":"2020","unstructured":"M. R. Khosravi, X. Xu, B. Shen, X. Yin, H. Wu, L. Qi, S. Wan, Edge server quantification and placement for offloading social media services in industrial cognitive iov. IEEE Trans. Ind. Inform.PP:, 1\u20131 (2020).","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"02","key":"1807_CR30","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1142\/S0218194020500114","volume":"30","author":"B. Wang","year":"2020","unstructured":"B. Wang, S. Ying, G. Cheng, R. Wang, Z. Yang, B. Dong, Log-based anomaly detection with the improved k-nearest neighbor. Int. J. Softw. Eng. Knowl. Eng.30(02), 239\u2013262 (2020).","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"5","key":"1807_CR31","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1007\/s11390-015-1585-3","volume":"30","author":"W. Yang","year":"2015","unstructured":"W. Yang, G. -W. Shen, W. Wang, L. -Y. Gong, M. Yu, G. -Z. Dong, Anomaly detection in microblogging via co-clustering. J. Comput. Sci. Technol.30(5), 1097\u20131108 (2015).","journal-title":"J. Comput. Sci. Technol."},{"key":"1807_CR32","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/IHMSC.2018.00040","volume-title":"2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)","author":"Z. Gan","year":"2018","unstructured":"Z. Gan, X. Zhou, in 2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 1. Abnormal network traffic detection based on improved lof algorithm (IEEEHangzhou, 2018), pp. 142\u2013145."},{"key":"1807_CR33","doi-asserted-by":"publisher","first-page":"2003","DOI":"10.1109\/iSPEC48194.2019.8974951","volume-title":"2019 IEEE Sustainable Power and Energy Conference (iSPEC)","author":"Y. Ou","year":"2019","unstructured":"Y. Ou, B. Deng, X. Liu, K. Zhou, in 2019 IEEE Sustainable Power and Energy Conference (iSPEC). Local outlier factor based false data detection in power systems (IEEEBeijing, 2019), pp. 2003\u20132007."},{"key":"1807_CR34","unstructured":"K. Babaei, Z. Chen, T. Maul, Detecting point outliers using prune-based outlier factor (plof). arXiv preprint arXiv:1911.01654. abs\/1911.01654: (2019)."},{"issue":"4","key":"1807_CR35","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1007\/s11277-016-3433-3","volume":"90","author":"M. Wazid","year":"2016","unstructured":"M. Wazid, A. K. Das, An efficient hybrid anomaly detection scheme using k-means clustering for wireless sensor networks. Wirel. Pers. Commun.90(4), 1971\u20132000 (2016).","journal-title":"Wirel. Pers. Commun."},{"key":"1807_CR36","doi-asserted-by":"publisher","first-page":"104335","DOI":"10.1016\/j.cageo.2019.104335","volume":"134","author":"R. Ghezelbash","year":"2020","unstructured":"R. Ghezelbash, A. Maghsoudi, E. J. M. Carranza, Optimization of geochemical anomaly detection using a novel genetic k-means clustering (GKMC) algorithm. Comput. Geosci.134:, 104335 (2020).","journal-title":"Comput. Geosci."},{"key":"1807_CR37","unstructured":"A. Schmutz, J. Jacques, C. Bouveyron, L. Bozzi, L. Cheze, P. Martin, Detection of energy waste in French households thanks to a co-clustering model for multivariate functional data (2019)."},{"key":"1807_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0199-9_62","volume-title":"Anomaly-based intrusion detection system using support vector machine","author":"S. Krishnaveni","year":"2020","unstructured":"S. Krishnaveni, P. Vigneshwar, S. Kishore, B. Jothi, S. Sivamohan, Anomaly-based intrusion detection system using support vector machine (Springer, Lucca, 2020)."},{"issue":"10","key":"1807_CR39","doi-asserted-by":"publisher","first-page":"3798","DOI":"10.1080\/01431161.2019.1708504","volume":"41","author":"P. Xiang","year":"2020","unstructured":"P. Xiang, H. Zhou, H. Li, S. Song, W. Tan, J. Song, L. Gu, Hyperspectral anomaly detection by local joint subspace process and support vector machine. Int. J. Remote. Sens.41(10), 3798\u20133819 (2020).","journal-title":"Int. J. Remote. Sens."},{"key":"1807_CR40","doi-asserted-by":"crossref","unstructured":"X. Zhai, K. Liu, W. Nash, D. Castineira, et al, in International Petroleum Technology Conference. Smart autopilot drone system for surface surveillance and anomaly detection via customizable deep neural network, (2020). International Petroleum Technology Conference.","DOI":"10.2523\/IPTC-20111-MS"},{"key":"1807_CR41","doi-asserted-by":"publisher","unstructured":"C. Greer, D. A. Wollman, D. E. Prochaska, P. A. Boynton, J. A. Mazer, C. T. Nguyen, G. J. FitzPatrick, T. L. Nelson, G. H. Koepke, A. R. Hefner Jr, et al., NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0 (National Institute of Standards and Technology, 2014). https:\/\/doi.org\/10.6028\/nist.sp.1108r3.","DOI":"10.6028\/nist.sp.1108r3"},{"issue":"2","key":"1807_CR42","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.enpol.2010.11.037","volume":"39","author":"S. S. S. R. Depuru","year":"2011","unstructured":"S. S. S. R. Depuru, L. Wang, V. Devabhaktuni, Electricity theft: overview, issues, prevention and a smart meter based approach to control theft. Energy Policy. 39(2), 1007\u20131015 (2011).","journal-title":"Energy Policy"},{"key":"1807_CR43","doi-asserted-by":"crossref","unstructured":"Y. Chen, N. Zhang, Y. Zhang, X. Chen, W. Wu, X. S. Shen, Energy efficient dynamic offloading in mobile edge computing for internet of things. IEEE Trans. Cloud Comput., 1\u20131 (2019).","DOI":"10.1109\/TCC.2019.2923692"},{"issue":"2","key":"1807_CR44","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/TPWRD.2009.2030890","volume":"25","author":"J. Nagi","year":"2009","unstructured":"J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, M. Mohamad, Nontechnical loss detection for metered customers in power utility using support vector machines. IEEE Trans. Power Deliv.25(2), 1162\u20131171 (2009).","journal-title":"IEEE Trans. Power Deliv."},{"issue":"6","key":"1807_CR45","doi-asserted-by":"publisher","first-page":"5820","DOI":"10.1109\/TSG.2017.2697440","volume":"9","author":"R. Moghaddass","year":"2017","unstructured":"R. Moghaddass, J. Wang, A hierarchical framework for smart grid anomaly detection using large-scale smart meter data. IEEE Trans. Smart Grid. 9(6), 5820\u20135830 (2017).","journal-title":"IEEE Trans. Smart Grid"},{"key":"1807_CR46","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.ijepes.2018.03.025","volume":"101","author":"S. -C. Yip","year":"2018","unstructured":"S. -C. Yip, W. -N. Tan, C. Tan, M. -T. Gan, K. Wong, An anomaly detection framework for identifying energy theft and defective meters in smart grids. Int. J. Electr. Power Energy Syst.101:, 189\u2013203 (2018).","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"1","key":"1807_CR47","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/JSAC.2019.2952181","volume":"38","author":"J. Tao","year":"2019","unstructured":"J. Tao, G. Michailidis, A statistical framework for detecting electricity theft activities in smart grid distribution networks. IEEE J. Sel. Areas Commun. 38(1), 205\u2013216 (2019).","journal-title":"IEEE J. Sel. Areas Commun"},{"key":"1807_CR48","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/ICACI.2018.8377577","volume-title":"2018 Tenth International Conference on Advanced Computational Intelligence (ICACI)","author":"H. Qiu","year":"2018","unstructured":"H. Qiu, Y. Tu, Y. Zhang, in 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI). Anomaly detection for power consumption patterns in electricity early warning system (IEEEXiamen, 2018), pp. 867\u2013873."},{"issue":"7","key":"1807_CR49","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/JSAC.2013.130714","volume":"31","author":"S. McLaughlin","year":"2013","unstructured":"S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, S. Zonouz, A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J. Sel. Areas Commun.31(7), 1319\u20131330 (2013).","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"1807_CR50","doi-asserted-by":"publisher","first-page":"2844","DOI":"10.1109\/TIE.2019.2912789","volume":"67","author":"D. Abbasinezhad-Mood","year":"2019","unstructured":"D. Abbasinezhad-Mood, A. Ostad-Sharif, M. Nikooghadam, Novel anonymous key establishment protocol for isolated smart meters. IEEE Trans. Ind. Electron.67(4), 2844\u20132851 (2019).","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"3","key":"1807_CR51","first-page":"1636","volume":"9","author":"A. Ashok","year":"2016","unstructured":"A. Ashok, M. Govindarasu, V. Ajjarapu, Online detection of stealthy false data injection attacks in power system state estimation. IEEE Trans. Smart Grid. 9(3), 1636\u20131646 (2016).","journal-title":"IEEE Trans. Smart Grid"},{"key":"1807_CR52","unstructured":"J. Yeo, G. Papanicolaou, Random matrix approach to estimation of high-dimensional factor models. arXiv preprint arXiv:1611.05571 (2016)."},{"issue":"8","key":"1807_CR53","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TSP.2017.2649482","volume":"65","author":"M. Rahmani","year":"2017","unstructured":"M. Rahmani, G. K. Atia, High dimensional low rank plus sparse matrix decomposition. IEEE Trans. Sig. Process. 65(8), 2004\u20132019 (2017).","journal-title":"IEEE Trans. Sig. Process"},{"key":"1807_CR54","unstructured":"M. S. Advani, A. M. Saxe, High-dimensional dynamics of generalization error in neural networks. arXiv preprint arXiv:1710.03667 (2017)."},{"key":"1807_CR55","doi-asserted-by":"crossref","unstructured":"Z. Fan, I. M. Johnstone, Y. Sun, Spiked covariances and principal components analysis in high-dimensional random effects models. arXiv preprint arXiv:1806.09529 (2018).","DOI":"10.1214\/18-AOS1767"},{"issue":"5","key":"1807_CR56","doi-asserted-by":"publisher","first-page":"4084","DOI":"10.1109\/JIOT.2019.2959124","volume":"7","author":"X. Xu","year":"2019","unstructured":"X. Xu, X. Liu, Z. Xu, F. Dai, X. Zhang, L. Qi, Trust-oriented iot service placement for smart cities in edge computing. IEEE Internet of Things J.7(5), 4084\u20134091 (2019).","journal-title":"IEEE Internet of Things J."},{"key":"1807_CR57","first-page":"1","volume-title":"2006 10th IEEE Singapore International Conference on Communication Systems","author":"S. Rajasegarar","year":"2006","unstructured":"S. Rajasegarar, C. Leckie, M. Palaniswami, J. C. Bezdek, in 2006 10th IEEE Singapore International Conference on Communication Systems. Distributed anomaly detection in wireless sensor networks (IEEESingapore, 2006), pp. 1\u20135."},{"key":"1807_CR58","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.rser.2014.01.088","volume":"33","author":"J. -S. Chou","year":"2014","unstructured":"J. -S. Chou, A. S. Telaga, Real-time detection of anomalous power consumption. Renew. Sust. Energ. Rev.33:, 400\u2013411 (2014).","journal-title":"Renew. Sust. Energ. Rev."},{"key":"1807_CR59","first-page":"1","volume":"2020","author":"H. Liu","year":"2020","unstructured":"H. Liu, H. Kou, C. Yan, L. Qi, Keywords-driven and popularity-aware paper recommendation based on undirected paper citation graph. Complexity. 2020:, 1\u201315 (2020).","journal-title":"Complexity"},{"key":"1807_CR60","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.enbuild.2017.02.058","volume":"144","author":"D. B. Arayaa","year":"2017","unstructured":"D. B. Arayaa, K. Grolingera, H. F. ElYamanya, M. A. Capretza, G. Bitsuamlakb, An ensemble learning framework for anomaly detection in building energy consumption. Energy Build.144:, 191\u2013206 (2017). https:\/\/doi.org\/10.1016\/j.enbuild.2017.02.058.","journal-title":"Energy Build."},{"key":"1807_CR61","doi-asserted-by":"publisher","unstructured":"X. Xu, D. Zhu, X. Yang, S. Wang, L. Qi, W. Dou, Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain (Association for Computing Machinery (ACM), 2020). https:\/\/doi.org\/10.1145\/3395331.","DOI":"10.1145\/3395331"},{"issue":"10","key":"1807_CR62","doi-asserted-by":"publisher","first-page":"105204","DOI":"10.1088\/1751-8121\/aa5451","volume":"50","author":"S. Belinschi","year":"2017","unstructured":"S. Belinschi, M. A. Nowak, R. Speicher, W. Tarnowski, Squared eigenvalue condition numbers and eigenvector correlations from the single ring theorem. J. Phys. A Math. Theor.50(10), 105204 (2017).","journal-title":"J. Phys. A Math. Theor."},{"issue":"3","key":"1807_CR63","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TPAMI.2016.2554555","volume":"39","author":"G. Trigeorgis","year":"2016","unstructured":"G. Trigeorgis, K. Bousmalis, S. Zafeiriou, B. W. Schuller, A deep matrix factorization method for learning attribute representations. IEEE Trans. Pattern. Anal. Mach. Intell.39(3), 417\u2013429 (2016).","journal-title":"IEEE Trans. Pattern. Anal. Mach. Intell."},{"key":"1807_CR64","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1016\/j.jclepro.2017.02.028","volume":"149","author":"J. -S. Chou","year":"2017","unstructured":"J. -S. Chou, A. S. Telaga, W. K. Chong, G. E. Gibson Jr, Early-warning application for real-time detection of energy consumption anomalies in buildings. J. Clean. Prod.149:, 711\u2013722 (2017).","journal-title":"J. Clean. Prod."},{"key":"1807_CR65","first-page":"98","volume-title":"Mexican International Conference on Artificial Intelligence","author":"J. Garc\u00eda","year":"2018","unstructured":"J. Garc\u00eda, E. Zamora, H. Sossa, in Mexican International Conference on Artificial Intelligence. Supervised and unsupervised neural networks: experimental study for anomaly detection in electrical consumption (SpringerGuadalajara, 2018), pp. 98\u2013109."},{"key":"1807_CR66","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-319-43946-4_13","volume-title":"International Conference on Big Data Analytics and Knowledge Discovery","author":"X. Liu","year":"2016","unstructured":"X. Liu, N. Iftikhar, P. S. Nielsen, A. Heller, in International Conference on Big Data Analytics and Knowledge Discovery. Online anomaly energy consumption detection using lambda architecture (SpringerPorto, 2016), pp. 193\u2013209."},{"key":"1807_CR67","doi-asserted-by":"publisher","first-page":"114145","DOI":"10.1016\/j.apenergy.2019.114145","volume":"259","author":"S. -H. Ahn","year":"2020","unstructured":"S. -H. Ahn, X. Wang, Real-time prediction and anomaly detection of electrical load in a residential community. Appl. Energy. 259:, 114145 (2020).","journal-title":"Appl. Energy"},{"key":"1807_CR68","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.158","volume-title":"2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"N. L. Tasfi","year":"2017","unstructured":"N. L. Tasfi, W. A. Higashino, K. Grolinger, M. A. Capretz, in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Deep neural networks with confidence sampling for electrical anomaly detection (IEEEExeter, 2017), pp. 1038\u20131045."},{"key":"1807_CR69","doi-asserted-by":"publisher","first-page":"8325","DOI":"10.1109\/ICASSP.2019.8683792","volume-title":"ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"H. Rashid","year":"2019","unstructured":"H. Rashid, V. Stankovic, L. Stankovic, P. Singh, in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Evaluation of non-intrusive load monitoring algorithms for appliance-level anomaly detection (IEEEBrighton, 2019), pp. 8325\u20138329."},{"key":"1807_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijepes.2019.01.039","volume":"109","author":"S. Morris","year":"2019","unstructured":"S. Morris, S. W. Yen, M. A. Ezra, T. J. Huat, Effect of smart meter data collection frequency in an early detection of shorter-duration voltage anomalies in smart grids. Int. J. Electr. Power Energy Syst.109:, 1\u20138 (2019).","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"1807_CR71","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1016\/j.ijepes.2018.11.013","volume":"107","author":"S. Basumallik","year":"2019","unstructured":"S. Basumallik, R. Ma, S. Eftekharnejad, Packet-data anomaly detection in pmu-based state estimator using convolutional neural network. Int. J. Electr. Power Energy Syst.107:, 690\u2013702 (2019).","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"1807_CR72","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/ICBDA.2017.8078707","volume-title":"2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA)","author":"W. Cui","year":"2017","unstructured":"W. Cui, H. Wang, in 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA). Anomaly detection and visualization of school electricity consumption data (IEEEBeijing, 2017), pp. 606\u2013611."},{"key":"1807_CR73","first-page":"1","volume-title":"2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","author":"F. Eldali","year":"2017","unstructured":"F. Eldali, T. Kirk, D. Pinney, in 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Application of ami data to anomaly detection and dynamic power flow analysis (IEEEArlington, 2017), pp. 1\u20134."},{"key":"1807_CR74","first-page":"1","volume-title":"2019 IEEE International Symposium on Circuits and Systems (ISCAS)","author":"A. da Silva","year":"2019","unstructured":"A. da Silva, I. Guarany, B. Arruda, E. C. Gurj\u00e3o, R. Freire, in 2019 IEEE International Symposium on Circuits and Systems (ISCAS). A method for anomaly prediction in power consumption using long short-term memory and negative selection (IEEESapporo, 2019), pp. 1\u20135."},{"issue":"1","key":"1807_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-018-1318-8","volume":"2019","author":"H. Kou","year":"2019","unstructured":"H. Kou, H. Liu, C. Yan, L. Qi, Link prediction in paper citation network to construct paper correlation graph. EURASIP J. Wirel. Commun. Netw.2019(1), 1\u201312 (2019).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1807_CR76","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/IIH-MSP.2015.38","volume-title":"2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)","author":"Y. Yuan","year":"2015","unstructured":"Y. Yuan, K. Jia, in 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). A distributed anomaly detection method of operation energy consumption using smart meter data (IEEEAdelaide, 2015), pp. 310\u2013313."},{"key":"1807_CR77","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-030-03596-9_15","volume-title":"International Conference on Service-Oriented Computing","author":"P. Lai","year":"2018","unstructured":"P. Lai, Q. He, M. Abdelrazek, F. Chen, J. Hosking, J. Grundy, Y. Yang, in International Conference on Service-Oriented Computing. Optimal edge user allocation in edge computing with variable sized vector bin packing (SpringerHangzhou, 2018), pp. 230\u2013245."},{"issue":"2","key":"1807_CR78","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/TPWRS.2019.2943115","volume":"35","author":"M. -M. Buzau","year":"2019","unstructured":"M. -M. Buzau, J. Tejedor-Aguilera, P. Cruz-Romero, A. Gomez-Exposito, Hybrid deep neural networks for detection of non-technical losses in electricity smart meters. IEEE Trans. Power Syst.35(2), 1254\u20131263 (2019).","journal-title":"IEEE Trans. Power Syst."},{"key":"1807_CR79","first-page":"406","volume-title":"2011 IEEE Power Engineering and Automation Conference, vol. 1","author":"S. Zhu","year":"2011","unstructured":"S. Zhu, Y. Wang, L. Qiu, Z. Shao, in 2011 IEEE Power Engineering and Automation Conference, vol. 1. The effects analysis of measurement anomaly in electricity settlement of provincial generation power market (IEEEWuhan, 2011), pp. 406\u2013408."},{"issue":"10","key":"1807_CR80","doi-asserted-by":"crossref","first-page":"7250","DOI":"10.1049\/joe.2018.5123","volume":"2019","author":"M. Xiang","year":"2019","unstructured":"M. Xiang, H. Rao, T. Tan, Z. Wang, Y. Ma, Abnormal behaviour analysis algorithm for electricity consumption based on density clustering. J. Eng.2019(10), 7250\u20137255 (2019).","journal-title":"J. Eng."},{"key":"1807_CR81","first-page":"166","volume-title":"International Conference on Advanced Information Networking and Applications","author":"X. Liang","year":"2019","unstructured":"X. Liang, B. Zhao, Q. Ma, B. Sun, B. Cui, in International Conference on Advanced Information Networking and Applications. Terminal access data anomaly detection based on random forest for power user electric energy data acquisition system (SpringerKunibiki Messe, 2019), pp. 166\u2013175."},{"key":"1807_CR82","first-page":"1","volume":"PP","author":"Y. Zhou","year":"2015","unstructured":"Y. Zhou, L. Qi, W. Dou, J. Yu, C. Hu, A context-aware service evaluation approach over big data for cloud applications. IEEE Trans. Cloud Comput.PP:, 1\u20131 (2015).","journal-title":"IEEE Trans. Cloud Comput."},{"key":"1807_CR83","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.apenergy.2017.10.014","volume":"208","author":"B. Yildiz","year":"2017","unstructured":"B. Yildiz, J. I. Bilbao, J. Dore, A. B. Sproul, Recent advances in the analysis of residential electricity consumption and applications of smart meter data. Appl. Energy. 208:, 402\u2013427 (2017).","journal-title":"Appl. Energy"},{"issue":"3","key":"1807_CR84","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1109\/TSG.2018.2818167","volume":"10","author":"Y. Wang","year":"2018","unstructured":"Y. Wang, Q. Chen, T. Hong, C. Kang, Review of smart meter data analytics: applications, methodologies, and challenges. IEEE Trans. Smart Grid. 10(3), 3125\u20133148 (2018).","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"1807_CR85","first-page":"225","volume":"10","author":"K. Tu","year":"2016","unstructured":"K. Tu, D. Vernatha, Application of building information modeling in energy management of individual departments occupying university facilities. World Acad. Sci. Eng Technol. Int. J. Archit. Environ. Eng.10(2), 225\u2013231 (2016).","journal-title":"World Acad. Sci. Eng Technol. Int. J. Archit. Environ. Eng."},{"key":"1807_CR86","doi-asserted-by":"crossref","unstructured":"X. Xia, F. Chen, Q. He, J. Grundy, M. Abdelrazek, H. Jin, Cost-effective app data distribution in edge computing. IEEE Trans. Parallel Distrib. Syst. (2020).","DOI":"10.1109\/TPDS.2020.3010521"},{"issue":"3","key":"1807_CR87","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TPDS.2019.2938944","volume":"31","author":"Q. He","year":"2019","unstructured":"Q. He, G. Cui, X. Zhang, F. Chen, S. Deng, H. Jin, Y. Li, Y. Yang, A game-theoretical approach for user allocation in edge computing environment. IEEE Trans. Parallel Distrib. Syst.31(3), 515\u2013529 (2019).","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"1807_CR88","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2017.08.057","volume":"105","author":"X. Xu","year":"2020","unstructured":"X. Xu, X. Zhang, M. Khan, W. Dou, S. Xue, S. Yu, A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems. Futur. Gener. Comput. Syst.105:, 789\u2013799 (2020). https:\/\/doi.org\/10.1016\/j.future.2017.08.057.","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1807_CR89","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ins.2019.11.021","volume":"515","author":"L. Qi","year":"2020","unstructured":"L. Qi, X. Zhang, S. Li, S. Wan, Y. Wen, W. Gong, Spatial-temporal data-driven service recommendation with privacy-preservation. Inf. Sci.515:, 91\u2013102 (2020).","journal-title":"Inf. Sci."},{"key":"1807_CR90","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1016\/j.jclepro.2017.10.123","volume":"171","author":"L. Sun","year":"2018","unstructured":"L. Sun, K. Zhou, S. Yang, Regional difference of household electricity consumption: an empirical study of Jiangsu, China. J. Clean. Prod.171:, 1415\u20131428 (2018).","journal-title":"J. Clean. Prod."},{"key":"1807_CR91","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.apenergy.2016.10.101","volume":"185","author":"C. A. Craig","year":"2017","unstructured":"C. A. Craig, S. Feng, Exploring utility organization electricity generation, residential electricity consumption, and energy efficiency: a climatic approach. Appl. Energy. 185:, 779\u2013790 (2017).","journal-title":"Appl. Energy"},{"issue":"1","key":"1807_CR92","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10586-017-0849-9","volume":"21","author":"P. Li","year":"2018","unstructured":"P. Li, J. Li, Z. Huang, C. -Z. Gao, W. -B. Chen, K. Chen, Privacy-preserving outsourced classification in cloud computing. Clust. Comput.21(1), 277\u2013286 (2018).","journal-title":"Clust. Comput."},{"key":"1807_CR93","doi-asserted-by":"crossref","unstructured":"X. Xu, X. Liu, Z. Xu, C. Wang, S. Wan, X. Yang, Joint optimization of resource utilization and load balance with privacy preservation for edge services in 5g networks. Mob. Netw. Appl., 1\u201312 (2019). Netherland.","DOI":"10.1007\/s11036-019-01448-8"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01807-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01807-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01807-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T01:19:07Z","timestamp":1633569547000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01807-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":93,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1807"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01807-0","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,7]]},"assertion":[{"value":"6 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"194"}}