An Ensemble Deep Convolutional Neural Network Model for Electricity
Theft Detection in Smart Grids
- URL: http://arxiv.org/abs/2102.06039v1
- Date: Wed, 10 Feb 2021 18:27:13 GMT
- Title: An Ensemble Deep Convolutional Neural Network Model for Electricity
Theft Detection in Smart Grids
- Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Lei Lei
- Abstract summary: Electricity Theft Detection (EDT) algorithms are typically used for such purpose since this Non-Technical Loss (NTL) may lead to significant challenges in the power system.
In this paper, an Ensemble Deep Convolutional Neural Network (EDCNN) algorithm for ETD in smart grids has been proposed.
- Score: 2.281079191664481
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Smart grids extremely rely on Information and Communications Technology (ICT)
and smart meters to control and manage numerous parameters of the network.
However, using these infrastructures make smart grids more vulnerable to cyber
threats especially electricity theft. Electricity Theft Detection (EDT)
algorithms are typically used for such purpose since this Non-Technical Loss
(NTL) may lead to significant challenges in the power system. In this paper, an
Ensemble Deep Convolutional Neural Network (EDCNN) algorithm for ETD in smart
grids has been proposed. As the first layer of the model, a random under
bagging technique is applied to deal with the imbalance data, and then Deep
Convolutional Neural Networks (DCNN) are utilized on each subset. Finally, a
voting system is embedded, in the last part. The evaluation results based on
the Area Under Curve (AUC), precision, recall, f1-score, and accuracy verify
the efficiency of the proposed method compared to the existing method in the
literature.
Related papers
- Enhanced Convolution Neural Network with Optimized Pooling and Hyperparameter Tuning for Network Intrusion Detection [0.0]
We propose an Enhanced Convolutional Neural Network (EnCNN) for Network Intrusion Detection Systems (NIDS)
We compare EnCNN with various machine learning algorithms, including Logistic Regression, Decision Trees, Support Vector Machines (SVM), and ensemble methods like Random Forest, AdaBoost, and Voting Ensemble.
The results show that EnCNN significantly improves detection accuracy, with a notable 10% increase over state-of-art approaches.
arXiv Detail & Related papers (2024-09-27T11:20:20Z) - Machine-learned Adversarial Attacks against Fault Prediction Systems in
Smart Electrical Grids [17.268321134222667]
This study investigates the challenges associated with the security of machine learning (ML) applications in the smart grid scenario.
We demonstrate first that the deep neural network method used in the smart grid is susceptible to adversarial perturbation.
Then, we highlight how studies on fault localization and type classification illustrate the weaknesses of present ML algorithms in smart grids to various adversarial attacks.
arXiv Detail & Related papers (2023-03-28T10:19:03Z) - Robust Training and Verification of Implicit Neural Networks: A
Non-Euclidean Contractive Approach [64.23331120621118]
This paper proposes a theoretical and computational framework for training and robustness verification of implicit neural networks.
We introduce a related embedded network and show that the embedded network can be used to provide an $ell_infty$-norm box over-approximation of the reachable sets of the original network.
We apply our algorithms to train implicit neural networks on the MNIST dataset and compare the robustness of our models with the models trained via existing approaches in the literature.
arXiv Detail & Related papers (2022-08-08T03:13:24Z) - Anomal-E: A Self-Supervised Network Intrusion Detection System based on
Graph Neural Networks [0.0]
This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection.
GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning.
We present Anomal-E, a GNN approach to intrusion and anomaly detection that leverages edge features and graph topological structure in a self-supervised process.
arXiv Detail & Related papers (2022-07-14T10:59:39Z) - Deep Binary Reinforcement Learning for Scalable Verification [44.44006029119672]
We present an RL algorithm tailored specifically for binarized neural networks (BNNs)
After training BNNs for the Atari environments, we verify robustness properties.
arXiv Detail & Related papers (2022-03-11T01:20:23Z) - Algorithm Unrolling for Massive Access via Deep Neural Network with
Theoretical Guarantee [30.86806523281873]
Massive access is a critical design challenge of Internet of Things (IoT) networks.
We consider the grant-free uplink transmission of an IoT network with a multiple-antenna base station (BS) and a large number of single-antenna IoT devices.
We propose a novel algorithm unrolling framework based on the deep neural network to simultaneously achieve low computational complexity and high robustness.
arXiv Detail & Related papers (2021-06-19T05:23:05Z) - Learning Autonomy in Management of Wireless Random Networks [102.02142856863563]
This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes.
We develop a flexible deep neural network formalism termed distributed message-passing neural network (DMPNN) with forward and backward computations independent of the network topology.
arXiv Detail & Related papers (2021-06-15T09:03:28Z) - Artificial Intelligence based Sensor Data Analytics Framework for Remote
Electricity Network Condition Monitoring [0.0]
Rural electrification demands the use of inexpensive technologies such as single wire earth return (SWER) networks.
There is a steadily growing energy demand from remote consumers, and the capacity of existing lines may become inadequate soon.
High impedance arcing faults (HIF) from SWER lines can cause catastrophic bushfires such as the 2009 Black Saturday event.
arXiv Detail & Related papers (2021-01-21T07:50:01Z) - Data-Driven Random Access Optimization in Multi-Cell IoT Networks with
NOMA [78.60275748518589]
Non-orthogonal multiple access (NOMA) is a key technology to enable massive machine type communications (mMTC) in 5G networks and beyond.
In this paper, NOMA is applied to improve the random access efficiency in high-density spatially-distributed multi-cell wireless IoT networks.
A novel formulation of random channel access management is proposed, in which the transmission probability of each IoT device is tuned to maximize the geometric mean of users' expected capacity.
arXiv Detail & Related papers (2021-01-02T15:21:08Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.