2023
DOI: 10.1109/tsg.2022.3193989
|View full text |Cite
|
Sign up to set email alerts
|

Robust Data-Driven Detection of Electricity Theft Adversarial Evasion Attacks in Smart Grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…To further enhance the anomaly detection, LOF technique is used to compute an anomaly score for each identified outlier candidate, providing a comprehensive assessment of their anomalous behavior. However, it should be noted that statistical and analytical methods often suffer from limitations in capturing the temporal dynamics and intricate patterns present in the data, which may degrade their accuracy [40].…”
Section: ) Statistical and Analytical-based Methodsmentioning
confidence: 99%
“…To further enhance the anomaly detection, LOF technique is used to compute an anomaly score for each identified outlier candidate, providing a comprehensive assessment of their anomalous behavior. However, it should be noted that statistical and analytical methods often suffer from limitations in capturing the temporal dynamics and intricate patterns present in the data, which may degrade their accuracy [40].…”
Section: ) Statistical and Analytical-based Methodsmentioning
confidence: 99%
“…Takiddin et al [36][37][38][39][40] utilized multiple deep autoencoder anomaly detectors to detect electricity theft. The results indicate that deep architectures outperform shallow detectors in terms of detection performance and the recurrent LSTM-based architectures could further enhance the detection performance compared to static fully connected detectors.…”
Section: Unsupervised False Data Detectormentioning
confidence: 99%
“…Conversely, the unsupervised detectors are trained exclusively on benign samples and subsequently tested on datasets comprising both benign and malicious instances. This category includes shallow models such as OC-SVM [16] and ARIMA [31], alongside a variety of deep autoencoders [36][37][38][39][40].…”
Section: Benchmark Detectorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Takiddin et al [33] have proposed using an anomaly detector trained only on benign data to identify both traditional and EAs for electricity theft. They have achieved this by sequentially combining multiple neural network architectures, namely an autoencoder, convolutional-recurrent network, and feed-forward neural network.…”
Section: B Evasion Attacks Detection Schemesmentioning
confidence: 99%