Shi et al., 2022 - Google Patents
A Novel Approach to Detect Electricity Theft Based on Conv-Attentional TransformerShi et al., 2022
View PDF- Document ID
- 7525717424239153858
- Author
- Shi J
- Gao Y
- Dexi G
- Li Y
- Chen K
- Publication year
- Publication venue
- Available at SSRN 4069701
External Links
Snippet
With the establishment of advanced metering infrastructure (AMI), more and more deep learning (DL) methods are being used for electricity theft detection. However there are still problems such as the construction of a DL model that better fits the theft detection task …
- 230000005611 electricity 0 title abstract description 72
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00496—Recognising patterns in signals and combinations thereof
- G06K9/00536—Classification; Matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S10/00—Systems supporting electrical power generation, transmission or distribution
- Y04S10/50—Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Deep learning for short-term voltage stability assessment of power systems | |
Zhu et al. | Intelligent short-term voltage stability assessment via spatial attention rectified RNN learning | |
Zhang et al. | Power consumption predicting and anomaly detection based on transformer and K-means | |
CN110458230A (en) | A kind of distribution transforming based on the fusion of more criterions is with adopting data exception discriminating method | |
Gu et al. | Electricity theft detection in AMI with low false positive rate based on deep learning and evolutionary algorithm | |
Shehzad et al. | A robust hybrid deep learning model for detection of non-technical losses to secure smart grids | |
Mao et al. | Anomaly detection for power consumption data based on isolated forest | |
Zhu et al. | Networked time series shapelet learning for power system transient stability assessment | |
Khan et al. | Robust data driven analysis for electricity theft attack-resilient power grid | |
Shaaban et al. | Data-driven detection of electricity theft cyberattacks in PV generation | |
CN114676742A (en) | Power grid abnormal electricity utilization detection method based on attention mechanism and residual error network | |
Shi et al. | A novel approach to detect electricity theft based on conv-attentional Transformer Neural Network | |
Wu et al. | Gridtopo-GAN for distribution system topology identification | |
Zhu et al. | Data/model jointly driven high-quality case generation for power system dynamic stability assessment | |
Yang et al. | Reconstruction residuals based long-term voltage stability assessment using autoencoders | |
Javaid et al. | Using GANCNN and ERNET for detection of non technical losses to secure smart grids | |
CN114266676A (en) | Abnormal electricity utilization detection method of genetic optimization Bagging heterogeneous integration model | |
Xu et al. | Graph-based time series edge anomaly detection in smart grid | |
Zhu et al. | Robust representation learning for power system short-term voltage stability assessment under diverse data loss conditions | |
Fang et al. | A machine learning-based detection framework against intermittent electricity theft attack | |
Iftikhar et al. | Electricity theft detection in smart grid using machine learning | |
Jiang et al. | Power load forecasting based on spatial–temporal fusion graph convolution network | |
Nichiforov et al. | Learning dominant usage from anomaly patterns in building energy traces | |
Shi et al. | A Novel Approach to Detect Electricity Theft Based on Conv-Attentional Transformer | |
Huang et al. | Electricity Theft Detection based on Iterative Interpolation and Fusion Convolutional Neural Network |