“…Recently, much work has been conducted on the detection for data integrity attacks in AMI, which is mainly divided into three categories (Jiang et al, 2014;Jokar et al, 2016;Yao et al, 2019), including statebased (Huang et al, 2013;Salinas et al, 2014;Leite and Mantovani, 2018;Lo and Ansari, 2013;McLaughlin et al, 2013;Aziz et al, 2020;Bhattacharjee et al, 2021b,a), game theory-based (Cardenas et al, 2012;Yang et al, 2016;Wei et al, 2018Wei et al, , 2017Paul et al, 2020) and classificationbased (Jokar et al, 2016;Singh et al, 2017;Ismail et al, 2018;Yeckle and Tang, 2018;Zheng et al, 2018;Fernandes et al, 2019;Jakaria et al, 2019;Punmiya and Choe, 2019;Zheng et al, 2019;Rouzbahani et al, 2020;Tehrani et al, 2020;Yan and Wen, 2021). As a result of the popularity of artificial intelligence technologies, the feasibility of machine learning to detect attacks in AMI has attracted much attention of a large number of researchers.…”