A Hybrid ConvLSTM-Based Anomaly Detection Approach for Combating Energy Theft

被引:25
作者
Gao, Hong-Xin [1 ]
Kuenzel, Stefanie [2 ]
Zhang, Xiao-Yu [3 ]
机构
[1] Royal Holloway Univ London, Dept Informat Secur, Egham TW20 0EX, Surrey, England
[2] Royal Holloway Univ London, Dept Elect Engn, Egham TW20 0EX, Surrey, England
[3] Anhui Univ, Sch Artificial Intelligence, Hefei 230601, Anhui, Peoples R China
基金
英国工程与自然科学研究理事会;
关键词
Binary classification; convolutional long short-term memory (ConvLSTM); deep learning; energy theft; smart grid;
D O I
10.1109/TIM.2022.3201569
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a conventional power grid, energy theft is difficult to detect due to limited communication and data transition. The smart meter along with big data mining technology leads to significant technological innovation in the field of energy theft detection (ETD). This article proposes a convolutional long short-term memory (ConvLSTM)-based ETD model to identify electricity theft users. In this work, electricity consumption data are reshaped quarterly into a 2-D matrix and used as the sequential input to the ConvLSTM. The convolutional neural network (CNN) embedded into the long short-term memory (LSTM) can better learn the features of the data on different quarters, months, weeks, and days. Besides, the proposed model incorporates batch normalization. This technique allows the proposed ETD model to support raw format electricity consumption data input, reducing training time and increasing the efficiency of model deployment. The result of the case study shows that the proposed ConvLSTM model exhibits good robustness. It outperforms the multilayer perceptron (MLP) and CNN-LSTM in terms of performance metrics and model generalization capability. Moreover, the result also demonstrates that K-fold cross validation can improve the ETD prediction accuracy.
引用
收藏
页数:10
相关论文
共 39 条
[1]  
Albawi S, 2017, I C ENG TECHNOL
[2]  
[Anonymous], 2017, EN AN DEV BIG DAT EN
[3]  
Bhat RR, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P272, DOI [10.1109/ICMLA.2016.107, 10.1109/ICMLA.2016.0052]
[4]   A Survey of Predictive Modeling on Im balanced Domains [J].
Branco, Paula ;
Torgo, Luis ;
Ribeiro, Rita P. .
ACM COMPUTING SURVEYS, 2016, 49 (02)
[5]   Fraud Detection in Energy Consumption: A Supervised Approach [J].
Coma-Puig, Bernat ;
Carmona, Josep ;
Gavalda, Ricard ;
Alcoverro, Santiago ;
Martin, Victor .
PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016), 2016, :120-129
[6]  
Corder GW., 2014, NONPARAMETRIC STAT S
[7]   How Significant Is A Boxplot Outlier? [J].
Dawson, Robert .
JOURNAL OF STATISTICS EDUCATION, 2011, 19 (02)
[8]   Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft [J].
Depuru, Soma Shekara Sreenadh Reddy ;
Wang, Lingfeng ;
Devabhaktuni, Vijay .
ENERGY POLICY, 2011, 39 (02) :1007-1015
[9]   Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation [J].
Diego Rodriguez, Juan ;
Perez, Aritz ;
Antonio Lozano, Jose .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2010, 32 (03) :569-575
[10]  
Dorffner G., 1996, Neural Network World, V6, P447