2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT) 2019
DOI: 10.1109/icasert.2019.8934601
|View full text |Cite
|
Sign up to set email alerts
|

Electricity Theft Detection to Reduce Non-Technical Loss using Support Vector Machine in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…International Conference on Critical Information Infrastructures Security (CRITIS) [74] International Conference on Power Systems (ICPS) [75] North American Power Symposium, NAPS 2015 [76] IEEE Symposium on Computational Intelligence and Applications in Smart Grid. [77] International Conference on Advances in Science, Engineering and Robotics Technology 2019 [78] IEEE Power and Energy Society Innovative Smart Grid Technologies Conference. [79] 2017 IEEE Power and Energy Conference at Illinois [80] Energies 2020, 13, 4727 5 of 25…”
Section: Prisma Flowchartmentioning
confidence: 99%
See 1 more Smart Citation
“…International Conference on Critical Information Infrastructures Security (CRITIS) [74] International Conference on Power Systems (ICPS) [75] North American Power Symposium, NAPS 2015 [76] IEEE Symposium on Computational Intelligence and Applications in Smart Grid. [77] International Conference on Advances in Science, Engineering and Robotics Technology 2019 [78] IEEE Power and Energy Society Innovative Smart Grid Technologies Conference. [79] 2017 IEEE Power and Energy Conference at Illinois [80] Energies 2020, 13, 4727 5 of 25…”
Section: Prisma Flowchartmentioning
confidence: 99%
“…SVM has been used plenty of times as the binary classifiers for NTL detection problem because they are immune to the class imbalance issue [1,5,15,21,28,31,40,43,59,72,78]. Many different methodologies have been used, including the cost-sensitive SVM (CS-SVM) and one-class SVM (OC-SVM).…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
“…According to the mutual information (MI) and the correlation coefficient between features, the optimal feature subset was selected based on the common feature set. Aydin and Gungor [21] and Toma and Li [22] presented two feature construction techniques for NTL characterization. Compared with algorithm improvement, they were more concerned about finding the set of features that best discriminate legal and illegal profiles.…”
Section: Feature Engineering To Obtain the Optimal Feature Setmentioning
confidence: 99%
“…After feature acquisition, the methods of detection can be divided into supervised and unsupervised methods according to whether label information is available in the dataset. Supervised methods include various classifiers and neural network models, such as support vector machines [17], [22], extreme learning machines [23], random forests [24], and deep learning algorithms. Unsupervised methods primarily include a variety of clustering algorithms, e.g., k-means clustering [25], fuzzy clustering [26], and other improved clustering methods [2], [27], [28].…”
Section: Introductionmentioning
confidence: 99%
“…This kind of method does not need a labeled data set to train the model, but it is difficult to set the threshold and the detection accuracy is low [4,5]. Supervised classification methods mainly include traditional data mining models such as support vector machine (SVM), multi-layer perceptron (MLP), Bayesian network, extreme gradient boosting tree (XGBoost) [6][7][8][9][10], and new deep learning technologies such as the deep belief network and convolutional neural network (CNN) [11][12][13]. Specifically, SVM is very suitable for binary classification.…”
Section: Introductionmentioning
confidence: 99%