[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3366423.3380291acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Understanding Electricity-Theft Behavior via Multi-Source Data

Published: 20 April 2020 Publication History

Abstract

Electricity theft, the behavior that involves users conducting illegal operations on electrical meters to avoid individual electricity bills, is a common phenomenon in the developing countries. Considering its harmfulness to both power grids and the public, several mechanized methods have been developed to automatically recognize electricity-theft behaviors. However, these methods, which mainly assess users’ electricity usage records, can be insufficient due to the diversity of theft tactics and the irregularity of user behaviors.
In this paper, we propose to recognize electricity-theft behavior via multi-source data. In addition to users’ electricity usage records, we analyze user behaviors by means of regional factors (non-technical loss) and climatic factors (temperature) in the corresponding transformer area. By conducting analytical experiments, we unearth several interesting patterns: for instance, electricity thieves are likely to consume much more electrical power than normal users, especially under extremely high or low temperatures. Motivated by these empirical observations, we further design a novel hierarchical framework for identifying electricity thieves. Experimental results based on a real-world dataset demonstrate that our proposed model can achieve the best performance in electricity-theft detection (e.g., at least +3.0% in terms of F0.5) compared with several baselines. Last but not least, our work has been applied by the State Grid of China and used to successfully catch electricity thieves in Hangzhou with a precision of 15% (an improvement from 0% attained by several other models the company employed) during monthly on-site investigation.

References

[1]
Tanveer Ahmad. 2017. Non-technical loss analysis and prevention using smart meters. Renewable and Sustainable Energy Reviews 72 (2017), 573–589.
[2]
Gustavo EAPA Batista, Xiaoyue Wang, and Eamonn J Keogh. 2011. A complexity-invariant distance measure for time series. SDM (2011), 699–710.
[3]
Donald J Berndt and James Clifford. 1994. Using dynamic time warping to find patterns in time series. SIGKDD (1994), 359–370.
[4]
Hung-Po Chao and Stephen Peck. 1996. A market mechanism for electric power transmission. Journal of regulatory economics 10, 1 (1996), 25–59.
[5]
Abhishek Chauhan and Saurabh Rajvanshi. 2013. Non-technical losses in power system: A review. In International Conference on Power, Energy and Control (ICPEC). IEEE, 558–561.
[6]
Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. SIGKDD (2016), 785–794.
[7]
Junyoung Chung, Caglar Gulcehre, Kyunghyun Cho, and Yoshua Bengio. 2015. Gated Feedback Recurrent Neural Networks. ICML (2015), 2067–2075.
[8]
Breno C Costa, Bruno LA Alberto, André M Portela, W Maduro, and Esdras O Eler. 2013. Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process. International Journal of Artificial Intelligence & Applications 4, 6(2013), 17.
[9]
Marco Cuturi and Arnaud Doucet. 2014. Fast Computation of Wasserstein Barycenters. ICML (2014), 685–693.
[10]
Houtao Deng, George Runger, Eugene Tuv, and Martyanov Vladimir. 2013. A time series forest for classification and feature extraction. Information Sciences 239(2013), 142–153.
[11]
Soma Shekara Sreenadh Reddy Depuru, Lingfeng Wang, and Vijay Devabhaktuni. 2011. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft. Energy Policy 39, 2 (2011), 1007–1015.
[12]
Soma Shekara Sreenadh Reddy Depuru, Lingfeng Wang, and Vijay Devabhaktuni. 2011. Support vector machine based data classification for detection of electricity theft. In Power Systems Conference and Exposition (PES). IEEE, 1–8.
[13]
Yong Du, Wei Wang, and Liang Wang. 2015. Hierarchical recurrent neural network for skeleton based action recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1110–1118.
[14]
Engerati. 2018. Non-technical losses today: the business challenges. https://www.engerati.com/transmission-and-distribution/article/theft-detection/non-technical-losses-today-business-challenges
[15]
Robert B Fennell. 1983. Pilfer proofing system and method for electric utility meter box. US Patent 4,404,521.
[16]
Robin Genuer, Jeanmichel Poggi, Christine Tuleaumalot, and Nathalie Villavialaneix. 2015. Random Forests for Big Data. arXiv: Machine Learning(2015).
[17]
Steven L Gortmaker, David W Hosmer, and Stanley Lemeshow. 1994. Applied Logistic Regression.Contemporary Sociology 23, 1 (1994), 159.
[18]
Alex Graves, Abdelrahman Mohamed, and Geoffrey E Hinton. [n.d.]. Speech recognition with deep recurrent neural networks. International Conference on Acoustics, Speech, and Signal Processing (ICASSP) ([n. d.]).
[19]
Li-Cai Guo, Zhi-Wei Peng, and Qiang Fan. 2010. A survey of electric energy metering and countermeasures to electric power stealing [J]. High Voltage Apparatus 46, 5 (2010), 86–88.
[20]
Songlin HAN, Dezu SHANG, J Gao, 2002. Talking about Products of Guard against Pilfering Electricity and Pilfering Electricity on the Contrary. Electrical Measurement & Instrumentation 39, 9 (2002), 10–15.
[21]
Hu Hanmei and Wang Yuanlong. 2004. The analysis and discussion of electricity-stealing and precaution method. Electrical Measurement & Instrumentation 3 (2004).
[22]
Sepp Hochreiter and Jurgen Schmidhuber. 1997. Long short-term memory. Neural Computation 9, 8 (1997), 1735–1780.
[23]
Camille Kamga, M Anil Yazici, and Abhishek Singhal. 2013. Hailing in the rain: Temporal and weather-related variations in taxi ridership and taxi demand-supply equilibrium. In Transportation Research Board 92nd Annual Meeting.
[24]
Diederik P Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. ICLR (2015).
[25]
Blazakis Konstantinos and Stavrakakis Georgios. 2019. Efficient Power Theft Detection for Residential Consumers Using Mean Shift Data Mining Knowledge Discovery Process. International Journal of Artificial Intelligence and Applications (IJAIA) 10, 1 (2019).
[26]
Jason Lines, Luke M Davis, Jon Hills, and Anthony Bagnall. 2012. A shapelet transform for time series classification. In SIGKDD. ACM, 289–297.
[27]
Zongtao Liu, Yang Yang, Wei Huang, Zhongyi Tang, Ning Li, and Fei Wu. 2019. How Do Your Neighbors Disclose Your Information: Social-Aware Time Series Imputation. In The World Web Conference (WWW).
[28]
Tomas Mikolov, Martin Karafiat, Lukas Burget, Jan Cernocký, and Sanjeev Khudanpur. [n.d.]. Recurrent neural network based language model. Conference of the International Speech Communication Association (INTERSPEECH) ([n. d.]).
[29]
Jawad Nagi, Keem Siah Yap, Sieh Kiong Tiong, Syed Khaleel Ahmed, and Malik Mohamad. 2009. Nontechnical loss detection for metered customers in power utility using support vector machines. Transactions on Power Delivery 25, 2 (2009), 1162–1171.
[30]
Zhiyu Chen: China Power News Network. 2018. The severe problem of electricity stealing in India. http://www.cpnn.com.cn/sd/gj/201805/t20180507_1068093.html
[31]
PR Newswire. 2017. 96 Billion Is Lost Every Year To Electricity Theft: Utilities increasingly investing in solutions to combat theft and non-technical losses. https://www.prnewswire.com/news-releases/96-billion-is-lost-every-year-to-electricity-theft-300453411.html
[32]
Emanuel Parzen. 1962. ON ESTIMATION OF A PROBABILITY DENSITY FUNCTION AND MODE. Annals of Mathematical Statistics 33, 3 (1962), 1065–1076.
[33]
Kira Radinsky, Krysta Svore, Susan Dumais, Jaime Teevan, Alex Bocharov, and Eric Horvitz. 2012. Modeling and predicting behavioral dynamics on the web. In The World Web Conference (WWW). ACM, 599–608.
[34]
Thanawin Rakthanmanon and Eamonn Keogh. 2013. Fast shapelets: A scalable algorithm for discovering time series shapelets. ICDM (2013), 668–676.
[35]
Joaquim L Viegas, Paulo R Esteves, R Melício, VMF Mendes, and Susana M Vieira. 2017. Solutions for detection of non-technical losses in the electricity grid: a review. Renewable and Sustainable Energy Reviews 80 (2017), 1256–1268.
[36]
Wu Xiaomei. 2003. A brief view of preventing the electricity power stealing. Electrical Measurement & Instrumentation2 (2003), 1.
[37]
Lexiang Ye and Eamonn Keogh. 2011. Time series shapelets: a novel technique that allows accurate, interpretable and fast classification. DMKD 22, 1 (2011), 149–182.
[38]
Ji Zheng and Baoliang Lu. 2011. A support vector machine classifier with automatic confidence and its application to gender classification. Neurocomputing 74, 11 (2011), 1926–1935.
[39]
Zibin Zheng, Yatao Yang, Xiangdong Niu, Hong-Ning Dai, and Yuren Zhou. 2017. Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Transactions on Industrial Informatics 14, 4 (2017), 1606–1615.

Cited By

View all
  • (2025)Few-Shot Graph Anomaly Detection via Dual-Level Knowledge DistillationEntropy10.3390/e2701002827:1(28)Online publication date: 1-Jan-2025
  • (2024)Counterfactual Data Augmentation With Denoising Diffusion for Graph Anomaly DetectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.340350311:6(7555-7567)Online publication date: Dec-2024
  • (2023)A New Method for Estimating Groundwater Changes Based on Optimized Deep Learning Models—A Case Study of Baiquan Spring Domain in ChinaWater10.3390/w1523412915:23(4129)Online publication date: 28-Nov-2023
  • Show More Cited By

Index Terms

  1. Understanding Electricity-Theft Behavior via Multi-Source Data
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WWW '20: Proceedings of The Web Conference 2020
        April 2020
        3143 pages
        ISBN:9781450370233
        DOI:10.1145/3366423
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 20 April 2020

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. User modeling
        2. electricity-theft detection
        3. hierarchical recurrent neural network
        4. power grids

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        WWW '20
        Sponsor:
        WWW '20: The Web Conference 2020
        April 20 - 24, 2020
        Taipei, Taiwan

        Acceptance Rates

        Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)37
        • Downloads (Last 6 weeks)6
        Reflects downloads up to 05 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)Few-Shot Graph Anomaly Detection via Dual-Level Knowledge DistillationEntropy10.3390/e2701002827:1(28)Online publication date: 1-Jan-2025
        • (2024)Counterfactual Data Augmentation With Denoising Diffusion for Graph Anomaly DetectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.340350311:6(7555-7567)Online publication date: Dec-2024
        • (2023)A New Method for Estimating Groundwater Changes Based on Optimized Deep Learning Models—A Case Study of Baiquan Spring Domain in ChinaWater10.3390/w1523412915:23(4129)Online publication date: 28-Nov-2023
        • (2023)Hybrid-Order Representation Learning for Electricity Theft DetectionIEEE Transactions on Industrial Informatics10.1109/TII.2022.317924319:2(1248-1259)Online publication date: Feb-2023
        • (2023)Fraud Detection Using Event Logs with LSTM and Gradient Boosting2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)10.1109/ISGT51731.2023.10066346(1-5)Online publication date: 16-Jan-2023
        • (2023)Analysis of Electrical Power Losses in Low-Voltage Distribution Networks: A Study of Technical and Non-Technical Losses2023 2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)10.1109/EICEEAI60672.2023.10590536(1-7)Online publication date: 27-Dec-2023
        • (2022)Identification of Nontechnical Losses in Distribution Systems Adding Exogenous Data and Artificial IntelligenceEnergies10.3390/en1523879415:23(8794)Online publication date: 22-Nov-2022
        • (2022)Non-Technical Electricity LossesEnergies10.3390/en1506221815:6(2218)Online publication date: 18-Mar-2022
        • (2022)CAMul: Calibrated and Accurate Multi-view Time-Series ForecastingProceedings of the ACM Web Conference 202210.1145/3485447.3512037(3174-3185)Online publication date: 25-Apr-2022
        • (2022)Fraud Detection on Power Grids While Transitioning to Smart Meters by Leveraging Multi-Resolution Consumption DataIEEE Transactions on Smart Grid10.1109/TSG.2022.314881713:3(2381-2389)Online publication date: May-2022
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media