Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud | IEEE Journals & Magazine | IEEE Xplore