{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:40:23Z","timestamp":1725979223991},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the Key-Area Research and Development Program of Guangzhou City","award":["202206030009"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"abstract":"Abstract<\/jats:title>As an important edge device of power grid, smart meters enable the detection of illegal behaviors such as electricity theft by analyzing large-scale electricity consumption data. Electricity theft poses a major threat to the economy and the security of society. Electricity theft detection (ETD) methods can effectively reduce losses and suppress illegal behaviors. On electricity consumption data from smart meters, ETD methods always train deep learning models. However, these methods are limited to extract different electricity consumption characteristics between independent users, and the pattern differences between users cannot be actively learned. Such difficulty prevents ETD further performance improvement. Therefore, a novel ETD method is proposed, which is the first attempt to apply supervised contrastive learning for electricity theft detection. On the one hand, our method allows the detection model to improve its detection performance by actively comparing users\u2019 representation vectors. On the other hand, in order to obtain high-quality augmented views, largest triangle three buckets time series downsampling is adopted innovatively to improve model stability through data augment. Experiments on real-world datasets show that our model outperforms state-of-the-art models.<\/jats:p>","DOI":"10.1186\/s13638-023-02258-z","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T06:10:58Z","timestamp":1687587058000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A electricity theft detection method through contrastive learning in smart grid"],"prefix":"10.1186","volume":"2023","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2597-5395","authenticated-orcid":false,"given":"Zijian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Weilong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Maoxiang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hongmin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"key":"2258_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1155\/2022\/5357412","volume":"2022","author":"M Xing","year":"2022","unstructured":"M. Xing, W. Ding, H. Li, T. Zhang, A power transformer fault prediction method through temporal convolutional network on dissolved gas chromatography data. Secur. Commun. Netw. 2022, 66 (2022)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"2258_CR2","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.enpol.2010.11.037","volume":"39","author":"SSSR Depuru","year":"2011","unstructured":"S.S.S.R. Depuru, L. Wang, V. Devabhaktuni, Electricity theft: overview, issues, prevention and a smart meter based approach to control theft. Energy Policy 39(2), 1007\u20131015 (2011)","journal-title":"Energy Policy"},{"issue":"17","key":"2258_CR3","first-page":"189","volume":"42","author":"Q Chen","year":"2018","unstructured":"Q. Chen, K. Zheng, C. Kang, F. Huangfu, Detection methods of abnormal electricity consumption behaviors: review and prospect. Autom. Electr. Power Syst. 42(17), 189\u2013199 (2018)","journal-title":"Autom. Electr. Power Syst."},{"issue":"4","key":"2258_CR4","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TII.2017.2785963","volume":"14","author":"Z Zheng","year":"2017","unstructured":"Z. Zheng, Y. Yang, X. Niu, H.-N. Dai, Y. Zhou, Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Ind. Inform. 14(4), 1606\u20131615 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"2258_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2021.100285","volume":"27","author":"A Arif","year":"2022","unstructured":"A. Arif, T.A. Alghamdi, Z.A. Khan, N. Javaid, Towards efficient energy utilization using big data analytics in smart cities for electricity theft detection. Big Data Res. 27, 100285 (2022)","journal-title":"Big Data Res."},{"key":"2258_CR6","first-page":"66","volume":"6","author":"H Gao","year":"2022","unstructured":"H. Gao, W. Huang, T. Liu, Y. Yin, Y. Li, Ppo2: location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems. IEEE Trans. Intell. Transp. Syst. 6, 66 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"2258_CR7","first-page":"79","volume":"66","author":"W Ding","year":"2021","unstructured":"W. Ding, Z. Wang, Y. Xia, K. Ma, An efficient interpolation method through trends prediction in smart power grid. Intell. Mob. Serv. Comput. 66, 79\u201392 (2021)","journal-title":"Intell. Mob. Serv. Comput."},{"key":"2258_CR8","doi-asserted-by":"publisher","first-page":"25565","DOI":"10.1109\/JIOT.2022.3197805","volume":"9","author":"MI Ibrahem","year":"2022","unstructured":"M.I. Ibrahem, M. Mahmoud, F. Alsolami, W. Alasmary, A.-G. Abdullah, X. Shen, Electricity theft detection for change-and-transmit advanced metering infrastructure. IEEE Internet Things J. 9, 25565 (2022)","journal-title":"IEEE Internet Things J."},{"key":"2258_CR9","first-page":"66","volume":"6","author":"W Liao","year":"2022","unstructured":"W. Liao, Z. Yang, K. Liu, B. Zhang, X. Chen, R. Song, Electricity theft detection using Euclidean and graph convolutional neural networks. IEEE Trans. Power Syst. 6, 66 (2022)","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"2258_CR10","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSG.2015.2425222","volume":"7","author":"P Jokar","year":"2015","unstructured":"P. Jokar, N. Arianpoo, V.C. Leung, Electricity theft detection in ami using customers\u2019 consumption patterns. IEEE Trans. Smart Grid 7(1), 216\u2013226 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"2258_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106544","volume":"125","author":"X Kong","year":"2021","unstructured":"X. Kong, X. Zhao, C. Liu, Q. Li, D. Dong, Y. Li, Electricity theft detection in low-voltage stations based on similarity measure and dt-ksvm. Int. J. Electr. Power Energy Syst. 125, 106544 (2021)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"6","key":"2258_CR12","doi-asserted-by":"publisher","first-page":"2865","DOI":"10.1002\/int.22404","volume":"36","author":"Y Himeur","year":"2021","unstructured":"Y. Himeur, A. Alsalemi, F. Bensaali, A. Amira, Smart power consumption abnormality detection in buildings using micromoments and improved k-nearest neighbors. Int. J. Intell. Syst. 36(6), 2865\u20132894 (2021)","journal-title":"Int. J. Intell. Syst."},{"key":"2258_CR13","first-page":"66","volume":"6","author":"L Cui","year":"2021","unstructured":"L. Cui, L. Guo, L. Gao, B. Cai, Y. Qu, Y. Zhou, S. Yu, A covert electricity-theft cyber-attack against machine learning-based detection models. IEEE Trans. Ind. Inform. 6, 66 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"2258_CR14","first-page":"1","volume":"70","author":"Z Yan","year":"2021","unstructured":"Z. Yan, H. Wen, Electricity theft detection base on extreme gradient boosting in ami. IEEE Trans. Instrum. Meas. 70, 1\u20139 (2021)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"2258_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106448","volume":"125","author":"Y Huang","year":"2021","unstructured":"Y. Huang, Q. Xu, Electricity theft detection based on stacked sparse denoising autoencoder. Int. J. Electr. Power Energy Syst. 125, 106448 (2021)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"2258_CR16","first-page":"66","volume":"6","author":"H Gao","year":"2022","unstructured":"H. Gao, B. Qiu, R.J.D. Barroso, W. Hussain, Y. Xu, X. Wang, Tsmae: a novel anomaly detection approach for internet of things time series data using memory-augmented autoencoder. IEEE Trans. Netw. Sci. Eng. 6, 66 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"2258_CR17","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1109\/TPWRS.2021.3114307","volume":"37","author":"X Cui","year":"2021","unstructured":"X. Cui, S. Liu, Z. Lin, J. Ma, F. Wen, Y. Ding, L. Yang, W. Guo, X. Feng, Two-step electricity theft detection strategy considering economic return based on convolutional autoencoder and improved regression algorithm. IEEE Trans. Power Syst. 37(3), 2346\u20132359 (2021)","journal-title":"IEEE Trans. Power Syst."},{"key":"2258_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107085","volume":"131","author":"J Pereira","year":"2021","unstructured":"J. Pereira, F. Saraiva, Convolutional neural network applied to detect electricity theft: a comparative study on unbalanced data handling techniques. Int. J. Electr. Power Energy Syst. 131, 107085 (2021)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"2258_CR19","first-page":"66","volume":"6","author":"S Sharma","year":"2022","unstructured":"S. Sharma, M. Saraswat, A.K. Dubey, Fake news detection on twitter. Int. J. Web Inf. Syst. 6, 66 (2022)","journal-title":"Int. J. Web Inf. Syst."},{"key":"2258_CR20","unstructured":"P. Finardi, I. Campiotti, G. Plensack, R.D. de Souza, R. Nogueira, G. Pinheiro, R. Lotufo, Electricity theft detection with self-attention. arXiv preprint arXiv:2002.06219 (2020)"},{"key":"2258_CR21","unstructured":"Y. Zhu, Y. Zhang, L. Liu, Y. Liu, G. Bin Li, M. Mao, L. Lin, Hybrid-order representation learning for electricity theft detection. IEEE Trans. Ind. Inform. 6, 66 (2022)"},{"key":"2258_CR22","first-page":"66","volume":"2019","author":"S Li","year":"2019","unstructured":"S. Li, Y. Han, X. Yao, S. Yingchen, J. Wang, Q. Zhao, Electricity theft detection in power grids with deep learning and random forests. J. Electr. Comput. Eng. 2019, 66 (2019)","journal-title":"J. Electr. Comput. Eng."},{"issue":"17","key":"2258_CR23","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.3390\/en12173310","volume":"12","author":"MN Hasan","year":"2019","unstructured":"M.N. Hasan, R.N. Toma, A.-A. Nahid, M.M. Islam, J.-M. Kim, Electricity theft detection in smart grid systems: a cnn-lstm based approach. Energies 12(17), 3310 (2019)","journal-title":"Energies"},{"key":"2258_CR24","doi-asserted-by":"publisher","first-page":"193907","DOI":"10.1109\/ACCESS.2020.3031549","volume":"8","author":"PH Le-Khac","year":"2020","unstructured":"P.H. Le-Khac, G. Healy, A.F. Smeaton, Contrastive representation learning: a framework and review. IEEE Access 8, 193907\u2013193934 (2020)","journal-title":"IEEE Access"},{"key":"2258_CR25","unstructured":"J. Li, P. Zhou, C. Xiong, S.C. Hoi, Prototypical contrastive learning of unsupervised representations. arXiv preprint arXiv:2005.04966 (2020)"},{"key":"2258_CR26","unstructured":"K. Hassani, A.H. Khasahmadi, Contrastive multi-view representation learning on graphs, in International Conference on Machine Learning (PMLR, 2020), pp. 4116\u20134126"},{"key":"2258_CR27","doi-asserted-by":"crossref","unstructured":"J. Qiu, Q. Chen, Y. Dong, J. Zhang, H. Yang, M. Ding, K. Wang, J. Tang, Gcc: graph contrastive coding for graph neural network pre-training, in Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (2020), pp. 1150\u20131160","DOI":"10.1145\/3394486.3403168"},{"issue":"3","key":"2258_CR28","first-page":"4","volume":"2","author":"P Velickovic","year":"2019","unstructured":"P. Velickovic, W. Fedus, W.L. Hamilton, P. Li\u00f2, Y. Bengio, R.D. Hjelm, Deep graph infomax. ICLR Poster 2(3), 4 (2019)","journal-title":"ICLR Poster"},{"key":"2258_CR29","doi-asserted-by":"crossref","unstructured":"H. Kuang, Y. Zhu, Z. Zhang, X. Li, J. Tighe, S. Schwertfeger, C. Stachniss, M. Li, Video contrastive learning with global context, in Proceedings of the IEEE\/CVF International Conference on Computer Vision (2021), pp. 3195\u20133204","DOI":"10.1109\/ICCVW54120.2021.00358"},{"key":"2258_CR30","unstructured":"J. Spijkervet, J.A. Burgoyne, Contrastive learning of musical representations. arXiv preprint arXiv:2103.09410 (2021)"},{"key":"2258_CR31","doi-asserted-by":"crossref","unstructured":"X. Xie, F. Sun, Z. Liu, S. Wu, J. Gao, J. Zhang, B. Ding, B. Cui, Contrastive learning for sequential recommendation, in 2022 IEEE 38th International Conference on Data Engineering (ICDE) (IEEE, 2022), pp. 1259\u20131273","DOI":"10.1109\/ICDE53745.2022.00099"},{"key":"2258_CR32","unstructured":"Z. Wu, S. Wang, J. Gu, M. Khabsa, F. Sun, H. Ma, Clear: Contrastive learning for sentence representation. arXiv preprint arXiv:2012.15466 (2020)"},{"key":"2258_CR33","doi-asserted-by":"crossref","unstructured":"X. Liu, Y. Liang, C. Huang, Y. Zheng, B. Hooi, R. Zimmermann, When do contrastive learning signals help spatio-temporal graph forecasting? in Proceedings of the 30th International Conference on Advances in Geographic Information Systems (2022), pp. 1\u201312","DOI":"10.1145\/3557915.3560939"},{"key":"2258_CR34","first-page":"5812","volume":"33","author":"Y You","year":"2020","unstructured":"Y. You, T. Chen, Y. Sui, T. Chen, Z. Wang, Y. Shen, Graph contrastive learning with augmentations. Adv. Neural Inf. Process. Syst. 33, 5812\u20135823 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"2258_CR35","doi-asserted-by":"crossref","unstructured":"Y. Zhu, Y. Xu, F. Yu, Q. Liu, S. Wu, L. Wang, Graph contrastive learning with adaptive augmentation, in Proceedings of the Web Conference 2021 (2021), pp. 2069\u20132080","DOI":"10.1145\/3442381.3449802"},{"key":"2258_CR36","first-page":"18661","volume":"33","author":"P Khosla","year":"2020","unstructured":"P. Khosla, P. Teterwak, C. Wang, A. Sarna, Y. Tian, P. Isola, A. Maschinot, C. Liu, D. Krishnan, Supervised contrastive learning. Adv. Neural Inf. Process. Syst. 33, 18661\u201318673 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"2258_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107715","volume":"137","author":"K Fei","year":"2022","unstructured":"K. Fei, Q. Li, C. Zhu, M. Dong, Y. Li, Electricity frauds detection in low-voltage networks with contrastive predictive coding. Int. J. Electr. Power Energy Syst. 137, 107715 (2022)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"2258_CR38","unstructured":"T. Chen, S. Kornblith, M. Norouzi, G. Hinton, A simple framework for contrastive learning of visual representations, in International Conference on Machine Learning (PMLR, 2020), pp. 1597\u20131607"},{"key":"2258_CR39","first-page":"29935","volume":"34","author":"S-A Rebuffi","year":"2021","unstructured":"S.-A. Rebuffi, S. Gowal, D.A. Calian, F. Stimberg, O. Wiles, T.A. Mann, Data augmentation can improve robustness. Adv. Inf. Process. Syst. 34, 29935\u201329948 (2021)","journal-title":"Adv. Inf. Process. Syst."},{"key":"2258_CR40","unstructured":"X. Bouthillier, K. Konda, P. Vincent, R. Memisevic, Dropout as data augmentation. arXiv preprint arXiv:1506.08700 (2015)"},{"key":"2258_CR41","doi-asserted-by":"crossref","unstructured":"S. Yun, D. Han, S.J. Oh, S. Chun, J. Choe, Y. Yoo, Cutmix: Regularization strategy to train strong classifiers with localizable features, in Proceedings of the IEEE\/CVF International Conference on Computer Vision (2019), pp. 6023\u20136032","DOI":"10.1109\/ICCV.2019.00612"},{"key":"2258_CR42","unstructured":"H. Zhang, M. Cisse, Y.N. Dauphin, D. Lopez-Paz, mixup: beyond empirical risk minimization. arXiv preprint arXiv:1710.09412 (2017)"},{"key":"2258_CR43","doi-asserted-by":"crossref","unstructured":"Z. Zhong, L. Zheng, G. Kang, S. Li, Y. Yang, Random erasing data augmentation, In Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34 (2020), pp. 13001\u201313008","DOI":"10.1609\/aaai.v34i07.7000"},{"key":"2258_CR44","first-page":"6827","volume":"33","author":"Y Tian","year":"2020","unstructured":"Y. Tian, C. Sun, B. Poole, D. Krishnan, C. Schmid, P. Isola, What makes for good views for contrastive learning? Adv. Neural Inf. Process. Syst. 33, 6827\u20136839 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"2258_CR45","unstructured":"S. Steinarsson, Downsampling Time Series for Visual Representation. PhD thesis (2013)"},{"key":"2258_CR46","first-page":"66","volume":"6","author":"M Wen","year":"2022","unstructured":"M. Wen, Y. Ma, W. Zhang, Y. Tian, Y. Wang, High-resolution load profile clustering approach based on dynamic largest triangle three buckets and multiscale dynamic warping path under limited warping path length. J. Mod. Power Syst. Clean Energy 6, 66 (2022)","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"2258_CR47","doi-asserted-by":"crossref","unstructured":"J. Van Der\u00a0Donckt, J. Van Der\u00a0Donckt, E. Deprost, S. Van\u00a0Hoecke, Plotly-resampler: Effective visual analytics for large time series, in 2022 IEEE Visualization and Visual Analytics (VIS) (IEEE, 2022), pp. 21\u201325","DOI":"10.1109\/VIS54862.2022.00013"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-023-02258-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-023-02258-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-023-02258-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T06:13:38Z","timestamp":1687587218000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-023-02258-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,23]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["2258"],"URL":"https:\/\/doi.org\/10.1186\/s13638-023-02258-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,23]]},"assertion":[{"value":"12 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"54"}}