[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shi et al., 2022 - Google Patents

A Novel Approach to Detect Electricity Theft Based on Conv-Attentional Transformer

Shi et al., 2022

View PDF
Document ID
7525717424239153858
Author
Shi J
Gao Y
Dexi G
Li Y
Chen K
Publication year
Publication venue
Available at SSRN 4069701

External Links

Snippet

With the establishment of advanced metering infrastructure (AMI), more and more deep learning (DL) methods are being used for electricity theft detection. However there are still problems such as the construction of a DL model that better fits the theft detection task …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00496Recognising patterns in signals and combinations thereof
    • G06K9/00536Classification; Matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Similar Documents

Publication Publication Date Title
Zhang et al. Deep learning for short-term voltage stability assessment of power systems
Zhu et al. Intelligent short-term voltage stability assessment via spatial attention rectified RNN learning
Zhang et al. Power consumption predicting and anomaly detection based on transformer and K-means
CN110458230A (en) A kind of distribution transforming based on the fusion of more criterions is with adopting data exception discriminating method
Gu et al. Electricity theft detection in AMI with low false positive rate based on deep learning and evolutionary algorithm
Shehzad et al. A robust hybrid deep learning model for detection of non-technical losses to secure smart grids
Mao et al. Anomaly detection for power consumption data based on isolated forest
Zhu et al. Networked time series shapelet learning for power system transient stability assessment
Khan et al. Robust data driven analysis for electricity theft attack-resilient power grid
Shaaban et al. Data-driven detection of electricity theft cyberattacks in PV generation
CN114676742A (en) Power grid abnormal electricity utilization detection method based on attention mechanism and residual error network
Shi et al. A novel approach to detect electricity theft based on conv-attentional Transformer Neural Network
Wu et al. Gridtopo-GAN for distribution system topology identification
Zhu et al. Data/model jointly driven high-quality case generation for power system dynamic stability assessment
Yang et al. Reconstruction residuals based long-term voltage stability assessment using autoencoders
Javaid et al. Using GANCNN and ERNET for detection of non technical losses to secure smart grids
CN114266676A (en) Abnormal electricity utilization detection method of genetic optimization Bagging heterogeneous integration model
Xu et al. Graph-based time series edge anomaly detection in smart grid
Zhu et al. Robust representation learning for power system short-term voltage stability assessment under diverse data loss conditions
Fang et al. A machine learning-based detection framework against intermittent electricity theft attack
Iftikhar et al. Electricity theft detection in smart grid using machine learning
Jiang et al. Power load forecasting based on spatial–temporal fusion graph convolution network
Nichiforov et al. Learning dominant usage from anomaly patterns in building energy traces
Shi et al. A Novel Approach to Detect Electricity Theft Based on Conv-Attentional Transformer
Huang et al. Electricity Theft Detection based on Iterative Interpolation and Fusion Convolutional Neural Network