{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T14:22:03Z","timestamp":1761747723199,"version":"build-2065373602"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"The study was supported by \"Inner Mongolia Electric Power Group Co., Ltd Technology Projects\".","award":["No.nmgdlkjxm20240410","No.nmgdlkjxm20240410","No.nmgdlkjxm20240410","No.nmgdlkjxm20240410"],"award-info":[{"award-number":["No.nmgdlkjxm20240410","No.nmgdlkjxm20240410","No.nmgdlkjxm20240410","No.nmgdlkjxm20240410"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"DOI":"10.1186\/s42162-025-00591-9","type":"journal-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:40:43Z","timestamp":1761741643000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A method for detecting high-risk electricity theft in low-voltage distribution network stations based on density clustering of IoT sensing data"],"prefix":"10.1186","volume":"8","author":[{"given":"Jianshu","family":"Hao","sequence":"first","affiliation":[]},{"given":"Ziyuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ruiqiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,29]]},"reference":[{"issue":"9","key":"591_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/2050-7038.13046","volume":"31","author":"RN Santos","year":"2021","unstructured":"Santos RN, Yamouni S, Albiero B, Vicente R, Lei LZ (2021) Gradient boosting and Shapley additive explanations for fraud detection in electricity distribution grids. Int Trans Electr Energy Syst 31(9):1\u201313","journal-title":"Int Trans Electr Energy Syst"},{"issue":"3","key":"591_CR2","doi-asserted-by":"publisher","first-page":"2675","DOI":"10.1109\/TSG.2020.3047864","volume":"12","author":"A Takiddin","year":"2021","unstructured":"Takiddin A, Ismail M, Zafar U, Serpedin E (2021) Robust electricity theft detection against data poisoning attacks in smart grids. IEEE Trans Smart Grid 12(3):2675\u20132684","journal-title":"IEEE Trans Smart Grid"},{"issue":"06","key":"591_CR3","first-page":"92","volume":"39","author":"MN Zhang","year":"2022","unstructured":"Zhang MN, Li HJ (2022) Electricity theft detection based on deep convolutional neural network and support vector classification. Comput Simul 39(06):92\u201397","journal-title":"Comput Simul"},{"issue":"1","key":"591_CR4","first-page":"1","volume":"160","author":"VE Arkorful","year":"2022","unstructured":"Arkorful VE (2022) Unravelling electricity theft whistleblowing antecedents using the theory of planned behavior and norm activation model. Energy Policy 160(1):1\u201312","journal-title":"Energy Policy"},{"issue":"6","key":"591_CR5","doi-asserted-by":"publisher","first-page":"4392","DOI":"10.1109\/TSG.2022.3182210","volume":"13","author":"A Campbell","year":"2022","unstructured":"Campbell A, Hariri ME, Parvania M (2022) Asynchronous distributed IoT-enabled customer characterization in distribution networks: theory and hardware implementation. IEEE Trans Smart Grid 13(6):4392\u20134404","journal-title":"IEEE Trans Smart Grid"},{"issue":"5","key":"591_CR6","first-page":"11","volume":"230","author":"AK Mishra","year":"2024","unstructured":"Mishra AK, Das B (2024) A scheme for electricity theft detection based on Ewma control chart. Electr Power Syst Res 230(5):11\u2013112","journal-title":"Electr Power Syst Res"},{"issue":"2","key":"591_CR7","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1109\/TSG.2021.3134018","volume":"13","author":"IU Khan","year":"2022","unstructured":"Khan IU, Javeid N, Taylor C, JamesGamage, Kelum AA, Ma XD (2022) A stacked machine and deep learning-based approach for analysing electricity theft in smart grids. IEEE Trans Smart Grid 13(2):1633\u20131644","journal-title":"IEEE Trans Smart Grid"},{"issue":"5","key":"591_CR8","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.1007\/s00202-023-01825-3","volume":"105","author":"ZC Lindani","year":"2023","unstructured":"Lindani ZC, Oliver D (2023) Real-time power theft monitoring and detection system with double connected data capture system. Electr Eng 105(5):3065\u20133083","journal-title":"Electr Eng"},{"issue":"4","key":"591_CR9","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1007\/s00202-020-01196-z","volume":"103","author":"G Yogarajan","year":"2021","unstructured":"Yogarajan G, Vinosh JA, Prakash SKA, Kumar SMM (2021) Interpolation search-based malicious user detection in smart grids. Electr Eng 103(4):1899\u20131909","journal-title":"Electr Eng"},{"key":"591_CR10","doi-asserted-by":"crossref","unstructured":"Zheng C, Wu Y (2024) Spectrum Normalization-Based Adversarial Network and CNN for Electricity Theft Detection. In 2024 6th International Conference on Energy, Power and Grid (ICEPG), 9, 1804\u20131807","DOI":"10.1109\/ICEPG63230.2024.10775819"},{"issue":"11","key":"591_CR11","doi-asserted-by":"publisher","first-page":"2502","DOI":"10.3390\/en17112502","volume":"17","author":"C Tang","year":"2024","unstructured":"Tang C, Qin Y, Liu Y, Pi H, Tang Z (2024) An efficient method for detecting abnormal electricity behavior. Energies 17(11):2502","journal-title":"Energies"},{"issue":"7","key":"591_CR12","doi-asserted-by":"publisher","first-page":"3251","DOI":"10.1007\/s13198-024-02333-8","volume":"15","author":"R Hu","year":"2024","unstructured":"Hu R, Zhen T (2024) Research on FCM-LR cross electricity theft detection based on big data user profile. Int J Syst Assur Eng Manage 15(7):3251\u20133265","journal-title":"Int J Syst Assur Eng Manage"},{"key":"591_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121860","volume":"238","author":"Y Wang","year":"2024","unstructured":"Wang Y, Qian J, Hassan M, Zhang X, Zhang T, Yang C et al (2024) Density peak clustering algorithms: a review on the decade 2014\u20132023. Expert Syst Appl 238:121860","journal-title":"Expert Syst Appl"},{"issue":"23","key":"591_CR14","first-page":"1","volume":"131","author":"I Mukherjee","year":"2023","unstructured":"Mukherjee I, Sahu NK, Sahana SK (2023) Simulation and modeling for anomaly detection in Iot network using machine learning. Int J Wireless Inf Networks 131(23):1\u201322","journal-title":"Int J Wireless Inf Networks"},{"issue":"2","key":"591_CR15","doi-asserted-by":"publisher","first-page":"1668","DOI":"10.1007\/s11227-023-05535-2","volume":"80","author":"S Rostampour","year":"2024","unstructured":"Rostampour S, Bagheri N, Camara MC (2024) Using a privacy-enhanced authentication process to secure iot-based smart grid infrastructures. J Supercomput 80(2):1668\u20131693","journal-title":"J Supercomput"},{"issue":"1","key":"591_CR16","doi-asserted-by":"publisher","first-page":"13175","DOI":"10.1149\/10701.13175ecst","volume":"107","author":"C Satapathy","year":"2022","unstructured":"Satapathy C, Gokhale H (2022) Auditron \u2013 an IoT based smart audit system for monitoring electricity and water consumption. ECS Trans 107(1):13175\u201313183","journal-title":"ECS Trans"},{"issue":"1","key":"591_CR17","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s00202-021-01380-9","volume":"104","author":"J Harshit","year":"2022","unstructured":"Harshit J, Mukul K, Joshi AM (2022) Intelligent energy cyber physical systems (iecps) for reliable smart grid against energy theft and false data injection. Electr Eng 104(1):331\u2013346","journal-title":"Electr Eng"},{"issue":"8","key":"591_CR18","first-page":"1","volume":"155","author":"CA Adongo","year":"2021","unstructured":"Adongo CA, Taale F, Bukari S, Suleman S, Amadu I, France N (2021) Electricity theft whistleblowing feasibility in commercial accommodation facilities. Energy Policy 155(8):1\u201310","journal-title":"Energy Policy"},{"issue":"9","key":"591_CR19","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1049\/sil2.12155","volume":"16","author":"FS Nasab","year":"2022","unstructured":"Nasab FS, Ghaderi F (2022) On the effect of sampling frequency on the electricity theft detection performance. IET Signal Proc 16(9):1094\u20131105","journal-title":"IET Signal Proc"},{"issue":"10","key":"591_CR20","first-page":"1","volume":"223","author":"A Sawas","year":"2023","unstructured":"Sawas A, Farag HEZ (2023) Real-time detection of stealthy iot-based cyber-attacks on power distribution systems: a novel anomaly prediction approach. Electr Power Syst Res 223(10):1\u201312","journal-title":"Electr Power Syst Res"}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-025-00591-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42162-025-00591-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-025-00591-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:40:46Z","timestamp":1761741646000},"score":1,"resource":{"primary":{"URL":"https:\/\/energyinformatics.springeropen.com\/articles\/10.1186\/s42162-025-00591-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["591"],"URL":"https:\/\/doi.org\/10.1186\/s42162-025-00591-9","relation":{},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"16 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.\u00a0","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical trial number\u00a0"}}],"article-number":"129"}}