2022
DOI: 10.1049/smt2.12133
|View full text |Cite
|
Sign up to set email alerts
|

Electricity theft detection method based on multi‐domain feature fusion

Abstract: To solve the problem of low accuracy of the previous electricity theft detection methods, the authors propose a multi-domain feature (MDF) fusion electricity theft detection method based on improved tensor fusion (ITF). Firstly, the original electricity consumption series is transformed by gram angle field (GAF) to obtain the time-domain matrix. The original electricity consumption series is converted into frequency-domain by Maximal Overlap Discrete Wavelet Transform (MODWT) to obtain the frequency-domain mat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…When K-means algorithm is initialized, it is necessary to determine the number of clusters, and this parameter has a great impact on the performance of the algorithm. Based on the analysis of existing research [14], this paper shows that electricity stealing behavior can be divided into six basic types, and other types of electricity stealing can be considered as the combination of these six types of electricity stealing. Therefore, the value of 7 is set in this paper for clustering to distinguish the power stealing users from the normal users.…”
Section: Identify Electricity Theft In Output Layermentioning
confidence: 99%
“…When K-means algorithm is initialized, it is necessary to determine the number of clusters, and this parameter has a great impact on the performance of the algorithm. Based on the analysis of existing research [14], this paper shows that electricity stealing behavior can be divided into six basic types, and other types of electricity stealing can be considered as the combination of these six types of electricity stealing. Therefore, the value of 7 is set in this paper for clustering to distinguish the power stealing users from the normal users.…”
Section: Identify Electricity Theft In Output Layermentioning
confidence: 99%