Zhuang et al., 2024 - Google Patents
Dynamic generative residual graph convolutional neural networks for electricity theft detectionZhuang et al., 2024
View PDF- Document ID
- 7980162514956873736
- Author
- Zhuang W
- Jiang W
- Xia M
- Liu J
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Illegal electricity users pose a significant threat to the economic and security aspects of the power system by illicitly accessing or manipulating electrical resources. With the widespread adoption of Advanced Metering Infrastructure (AMI), researchers have turned to leveraging …
- 230000005611 electricity 0 title abstract description 114
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Electricity theft detection in power grids with deep learning and random forests | |
Mukherjee et al. | Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids | |
Kong et al. | Anomaly detection based on joint spatio-temporal learning for building electricity consumption | |
Kawoosa et al. | Using machine learning ensemble method for detection of energy theft in smart meters | |
Gao et al. | Enhancing anomaly detection accuracy and interpretability in low-quality and class imbalanced data: A comprehensive approach | |
D'Angelo et al. | A stacked autoencoder‐based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems | |
Shi et al. | A novel approach to detect electricity theft based on conv-attentional Transformer Neural Network | |
Zhang | Financial data anomaly detection method based on decision tree and random forest algorithm | |
Cheng et al. | Advanced financial fraud detection using GNN-CL model | |
Berghout et al. | Multiverse recurrent expansion with multiple repeats: A representation learning algorithm for electricity theft detection in smart grids | |
Zhuang et al. | Dynamic generative residual graph convolutional neural networks for electricity theft detection | |
Cheng et al. | Energy theft detection in an edge data center using deep learning | |
Liao et al. | Electricity theft detection using dynamic graph construction and graph attention network | |
Zhu et al. | Robust representation learning for power system short-term voltage stability assessment under diverse data loss conditions | |
Saheed et al. | ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems | |
Gao et al. | A data mining method using deep learning for anomaly detection in cloud computing environment | |
Gómez et al. | A methodology for evaluating the robustness of anomaly detectors to adversarial attacks in industrial scenarios | |
Umair et al. | Energy theft detection in smart grids with genetic algorithm-based feature selection | |
Du et al. | Transformer fault identification with an IF‐1DCNN based on informative integration of heterogeneous sources | |
Fei et al. | Non-technical losses detection employing adversarial domain adaptation | |
Li et al. | Blockchain abnormal transaction detection method based on weighted sampling neighborhood nodes | |
Hu et al. | An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks | |
Zheng et al. | Electricity theft recognition and time period detection considering based on multi-task learning | |
Yi et al. | Fault diagnosis of oil-immersed transformer based on MGTO-BSCN | |
Ullah et al. | Measurable challenges in smart grid cybersecurity enhancement: A brief review |