skip to main content
10.1145/3508072.3508078acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Electricity theft Detection in Power Grid with a Hybrid Convolutional Neural Network - Support Vector Machine Model

Authors Info & Claims
Published:13 April 2022Publication History

ABSTRACT

The losses of the power grid can be divided into two main categories, which are technical and non-technical losses. Non-technical losses, also called commercial losses, are mainly caused by electrical theft. To help utility companies discover the doubts of electric burglars, we proposed a hybrid Convolutional Neural Network - Support Vector Machine model for electricity theft detection. In this model, first, we used the convolutional neural network to learn features between different days from massive and varying smart meter data by the operations of the convolution and the sub-sampling layers. In addition, a dropout layer was added to avoid over-fitting. After that, the Support Vector Machine was used as a classifier layer to replace the soft-max classifier layer to detect dishonest customers. Finally, we used the actual data set collected by State Grid Corporation of China, in which the electricity theft will be flagged (Flag = 1) to test the accuracy of the model, the evaluations were recognized through the confusion matrix and ROC curve. A comparison with previous popular models was carried out to verify the benefit of the proposed hybrid model.

References

  1. [1] Abdulnabi, A.H., Wang, G., Lu, J. and Jia, K. 2015. Multi-Task CNN Model for Attribute Prediction. IEEE Transactions on Multimedia. 17, 11 (Nov. 2015), 1949–1959. DOI:https://doi.org/10.1109/TMM.2015.2477680.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Angelos, E.W.S., Saavedra, O.R., Cortés, O.A.C. and de Souza, A.N. 2011. Detection and Identification of Abnormalities in Customer Consumptions in Power Distribution Systems. IEEE Transactions on Power Delivery. 26, 4 (Oct. 2011), 2436–2442. DOI:https://doi.org/10.1109/TPWRD.2011.2161621.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Atila, O. and Şengür, A. 2021. Attention guided 3D CNN-LSTM model for accurate speech based emotion recognition. Applied Acoustics. 182, (Nov. 2021), 108260. DOI:https://doi.org/10.1016/j.apacoust.2021.108260.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Bhat, R.R., Trevizan, R.D., Sengupta, R., Li, X. and Bretas, A. 2016. Identifying Nontechnical Power Loss via Spatial and Temporal Deep Learning. 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) (Anaheim, CA, USA, Dec. 2016), 272–279.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Bohani, F.A., Suliman, A., Saripuddin, M., Sameon, S.S., Md Salleh, N.S. and Nazeri, S. 2021. A Comprehensive Analysis of Supervised Learning Techniques for Electricity Theft Detection. Journal of Electrical and Computer Engineering. 2021, (Jul. 2021), 1–10. DOI:https://doi.org/10.1155/2021/9136206.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Costa, K.A.P., Pereira, L.A.M., Nakamura, R.Y.M., Pereira, C.R., Papa, J.P. and Xavier Falcão, A. 2015. A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks. Information Sciences. 294, (Feb. 2015), 95–108. DOI:https://doi.org/10.1016/j.ins.2014.09.025.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Depuru, S.S.S.R., Wang, L. and Devabhaktuni, V. 2011. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft. Energy Policy. 39, 2 (Feb. 2011), 1007–1015. DOI:https://doi.org/10.1016/j.enpol.2010.11.037.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Dino, H.I. and Abdulrazzaq, M.B. 2019. Facial Expression Classification Based on SVM, KNN and MLP Classifiers. 2019 International Conference on Advanced Science and Engineering (ICOASE) (Zakho - Duhok, Iraq, Apr. 2019), 70–75.Google ScholarGoogle Scholar
  9. [9] Glauner, P., Meira, J.A., Valtchev, P., State, R. and Bettinger, F. 2017. The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey. International Journal of Computational Intelligence Systems. 10, 1 (2017), 760. DOI:https://doi.org/10.2991/ijcis.2017.10.1.51.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Ismail, M., Shahin, M., Shaaban, M.F., Serpedin, E. and Qaraqe, K. 2018. Efficient detection of electricity theft cyber attacks in AMI networks. 2018 IEEE Wireless Communications and Networking Conference (WCNC) (Barcelona, Apr. 2018), 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] McDaniel, P. and McLaughlin, S. 2009. Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy Magazine. 7, 3 (May 2009), 75–77. DOI:https://doi.org/10.1109/MSP.2009.76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Nagi, J., Yap, K.S., Tiong, S.K., Ahmed, S.K. and Mohamad, M. 2010. Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines. IEEE Transactions on Power Delivery. 25, 2 (Apr. 2010), 1162–1171. DOI:https://doi.org/10.1109/TPWRD.2009.2030890.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Nizar, A.H., Dong, Z.Y. and Wang, Y. 2008. Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method. IEEE Transactions on Power Systems. 23, 3 (Aug. 2008), 946–955. DOI:https://doi.org/10.1109/TPWRS.2008.926431.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Ozkok, F.O. and Celik, M. 2022. A hybrid CNN-LSTM model for high resolution melting curve classification. Biomedical Signal Processing and Control. 71, (Jan. 2022), 103168. DOI:https://doi.org/10.1016/j.bspc.2021.103168.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Savian, F. de S., Siluk, J.C.M., Garlet, T.B., do Nascimento, F.M., Pinheiro, J.R. and Vale, Z. 2021. Non-technical losses: A systematic contemporary article review. Renewable and Sustainable Energy Reviews. 147, (Sep. 2021), 111205. DOI:https://doi.org/10.1016/j.rser.2021.111205.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Svozil, D., Kvasnicka, V. and Pospichal, J. 1997. Introduction to multi-layer feed-forward neural networks. Chemometrics and Intelligent Laboratory Systems. 39, 1 (Nov. 1997), 43–62. DOI:https://doi.org/10.1016/S0169-7439(97)00061-0.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Zheng, Z., Yang, Y., Niu, X., Dai, H.-N. and Zhou, Y. 2018. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids. IEEE Transactions on Industrial Informatics. 14, 4 (Apr. 2018), 1606–1615. DOI:https://doi.org/10.1109/TII.2017.2785963.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICFNDS '21: Proceedings of the 5th International Conference on Future Networks and Distributed Systems
    December 2021
    847 pages
    ISBN:9781450387347
    DOI:10.1145/3508072

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 April 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format