Zhuang et al., 2024 - Google Patents
Dynamic generative residual graph convolutional neural networks for electricity theft detectionZhuang et al., 2024
View PDF- Document ID
- 7980162514956873736
- Author
- Zhuang W
- Jiang W
- Xia M
- Liu J
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Illegal electricity users pose a significant threat to the economic and security aspects of the power system by illicitly accessing or manipulating electrical resources. With the widespread adoption of Advanced Metering Infrastructure (AMI), researchers have turned to leveraging …
- 230000005611 electricity 0 title abstract description 114
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Electricity theft detection in power grids with deep learning and random forests | |
Mukherjee et al. | Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids | |
Maamar et al. | Machine learning techniques for energy theft detection in AMI | |
Kawoosa et al. | Using machine learning ensemble method for detection of energy theft in smart meters | |
Zhuang et al. | Dynamic generative residual graph convolutional neural networks for electricity theft detection | |
D'Angelo et al. | A stacked autoencoder‐based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems | |
Cheng et al. | Advanced financial fraud detection using GNN-CL model | |
Zhang | Financial data anomaly detection method based on decision tree and random forest algorithm | |
Zhang et al. | Spatial-temporal dual-channel adaptive graph convolutional network for remaining useful life prediction with multi-sensor information fusion | |
Berghout et al. | Multiverse recurrent expansion with multiple repeats: A representation learning algorithm for electricity theft detection in smart grids | |
Cheng et al. | Energy theft detection in an edge data center using deep learning | |
Liao et al. | Electricity theft detection using dynamic graph construction and graph attention network | |
Zhu et al. | Robust representation learning for power system short-term voltage stability assessment under diverse data loss conditions | |
Li et al. | Detection of false data injection attack in power grid based on spatial-temporal transformer network | |
Hashim et al. | Stacked machine learning models for non-technical loss detection in smart grid: A comparative analysis | |
Fei et al. | Non-technical losses detection employing adversarial domain adaptation | |
Hu et al. | An improved algorithm for network intrusion detection based on deep residual networks | |
Li et al. | Blockchain abnormal transaction detection method based on weighted sampling neighborhood nodes | |
Du et al. | Transformer fault identification with an IF‐1DCNN based on informative integration of heterogeneous sources | |
Hashim et al. | Enhancing Smart City Functions through the Mitigation of Electricity Theft in Smart Grids: A Stacked Ensemble Method | |
Hu et al. | Training a dynamic neural network to detect false data injection attacks under multiple unforeseen operating conditions | |
Yi et al. | Fault diagnosis of oil-immersed transformer based on MGTO-BSCN | |
Qin et al. | MTAD RF: Multivariate time-series anomaly detection based on reconstruction and forecast | |
Yin et al. | A binary-classification method based on dictionary learning and admm for network intrusion detection | |
Xia et al. | Bidirectional LSTM-based attention mechanism for CNN power theft detection |