A Study of Electricity Theft Detection Method Based on Anomaly Transformer

  • Conference paper
  • First Online:
Big Data (BigData 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2005))

Included in the following conference series:

Abstract

Electricity theft not only disrupts normal electricity consumption but also poses a significant security threat to the power system. The widespread deployment of smart meters has led to the collection of massive amounts of electricity consumption data, which can help identify electricity theft. However, the challenge of detecting electricity theft is heightened by the category imbalance in the electricity consumption data collected. In this study, we address this problem by using ADASYN resampling technology to balance data categories, and then develop a model based on Anomaly Transformer (AT) to identify electricity theft by analyzing historical data that deviates from normal patterns following a theft. The model uses an attention mechanism to calculate and extract the series-association between power consumption data streams, and a Gaussian kernel to calculate the priori-association of the relative temporal distance between power consumption data points and their neighbors. We validate the proposed model using the SGCC dataset, and our experimental results demonstrate high accuracy, precision, F1-score, and AUC values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. http://www.sgcc.com.cn/

  2. Arif, A., Alghamdi, T.A., Khan, Z.A., Javaid, N.: Towards efficient energy utilization using big data analytics in smart cities for electricity theft detection. Big Data Res. 27, 100285 (2022)

    Article  Google Scholar 

  3. Aziz, S., Naqvi, S.Z.H., Khan, M.U., Aslam, T.: Electricity theft detection using empirical mode decomposition and k-nearest neighbors. In: 2020 International Conference on Emerging Trends in Smart Technologies (ICETST), pp. 1–5. IEEE (2020)

    Google Scholar 

  4. Fengming, Z., Shufang, L., Zhimin, G., Bo, W., Shiming, T., Mingming, P.: Anomaly detection in smart grid based on encoder-decoder framework with recurrent neural network. J. China Univ. Posts Telecommun. 24(6), 67–73 (2017)

    Article  Google Scholar 

  5. Finardi, P., et al.: Electricity theft detection with self-attention. ar**v preprint ar**v:2002.06219 (2020)

  6. Guha, S., Mishra, N., Roy, G., Schrijvers, O.: Robust random cut forest based anomaly detection on streams. In: International Conference on Machine Learning, pp. 2712–2721. PMLR (2016)

    Google Scholar 

  7. Haq, E.U., Pei, C., Zhang, R., Jianjun, H., Ahmad, F.: Electricity-theft detection for smart grid security using smart meter data: a deep-CNN based approach. Energy Rep. 9, 634–643 (2023)

    Article  Google Scholar 

  8. Hasan, M.N., Toma, R.N., Nahid, A.A., Islam, M.M., Kim, J.M.: Electricity theft detection in smart grid systems: a CNN-LSTM based approach. Energies 12(17), 3310 (2019)

    Article  Google Scholar 

  9. Hollingsworth, K., et al.: Energy anomaly detection with forecasting and deep learning. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 4921–4925. IEEE (2018)

    Google Scholar 

  10. Jain, P.K., Bajpai, M.S., Pamula, R.: A modified DBSCAN algorithm for anomaly detection in time-series data with seasonality. Int. Arab J. Inf. Technol. 19(1), 23–28 (2022)

    Google Scholar 

  11. Jokar, P., Arianpoo, N., Leung, V.C.: Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans. Smart Grid 7(1), 216–226 (2015)

    Article  Google Scholar 

  12. Kong, X., Zhao, X., Liu, C., Li, Q., Dong, D., Li, Y.: Electricity theft detection in low-voltage stations based on similarity measure and DT-KSVM. Int. J. Electr. Power Energy Syst. 125, 106544 (2021)

    Article  Google Scholar 

  13. Li, S., Han, Y., Yao, X., Yingchen, S., Wang, J., Zhao, Q.: Electricity theft detection in power grids with deep learning and random forests. J. Electr. Comput. Eng. 2019, 1–12 (2019)

    Article  Google Scholar 

  14. Li, Y., Zhang, L., Lv, Z., Wang, W.: Detecting anomalies in intelligent vehicle charging and station power supply systems with multi-head attention models. IEEE Trans. Intell. Transp. Syst. 22(1), 555–564 (2020)

    Article  Google Scholar 

  15. Madhure, R.U., Raman, R., Singh, S.K.: CNN-LSTM based electricity theft detector in advanced metering infrastructure. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–6. IEEE (2020)

    Google Scholar 

  16. Peng, Y., et al.: Electricity theft detection in AMI based on clustering and local outlier factor. IEEE Access 9, 107250–107259 (2021)

    Article  Google Scholar 

  17. Punmiya, R., Choe, S.: Energy theft detection using gradient boosting theft detector with feature engineering-based preprocessing. IEEE Trans. Smart Grid 10(2), 2326–2329 (2019)

    Article  Google Scholar 

  18. Saeed, M.S., Mustafa, M.W.B., Sheikh, U.U., Khidrani, A., Mohd, M.N.H.: Electricity theft detection in power utilities using bagged CHAID-based classification trees. J. Optim. Ind. Eng. 15(2), 67–73 (2022)

    Google Scholar 

  19. Saeed, M.S., Mustafa, M.W., Sheikh, U.U., Khidrani, A., Mohd, M.N.H.: Theft detection in power utilities using ensemble of CHAID decision tree algorithm. Sci. Proc. Ser. 2(2), 161–165 (2020)

    Article  Google Scholar 

  20. da Silva, A., Guarany, I., Arruda, B., Gurjão, E.C., Freire, R.: A method for anomaly prediction in power consumption using long short-term memory and negative selection. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. IEEE (2019)

    Google Scholar 

  21. Singh, N.K., Mahajan, V.: End-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure. Int. J. Crit. Infrastruct. Prot. 34, 100410 (2021)

    Article  Google Scholar 

  22. Su, Y., Zhao, Y., Niu, C., Liu, R., Sun, W., Pei, D.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2828–2837 (2019)

    Google Scholar 

  23. Tehrani, S.O., Moghaddam, M.H.Y., Asadi, M.: Decision tree based electricity theft detection in smart grid. In: 2020 4th International Conference on Smart City, Internet of Things and Applications (SCIOT), pp. 46–51. IEEE (2020)

    Google Scholar 

  24. Wang, X., Zhao, T., Liu, H., He, R.: Power consumption predicting and anomaly detection based on long short-term memory neural network. In: 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 487–491. IEEE (2019)

    Google Scholar 

  25. **a, R., Gao, Y., Zhu, Y., Gu, D., Wang, J.: An attention-based wide and deep CNN with dilated convolutions for detecting electricity theft considering imbalanced data. Electr. Power Syst. Res. 214, 108886 (2023)

    Article  Google Scholar 

  26. **a, Z., Zhou, K., Tan, J., Zhou, H.: Bidirectional LSTM-based attention mechanism for CNN power theft detection. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 323–330. IEEE (2022)

    Google Scholar 

  27. Xu, J., Wu, H., Wang, J., Long, M.: Anomaly transformer: time series anomaly detection with association discrepancy. ar**v preprint ar**v:2110.02642 (2021)

  28. Yan, Z., Wen, H.: Electricity theft detection base on extreme gradient boosting in AMI. IEEE Trans. Instrum. Meas. 70, 1–9 (2021)

    Google Scholar 

  29. Zhang, Y., Ji, Y., **ao, D.: Deep attention-based neural network for electricity theft detection. In: 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), pp. 154–157. IEEE (2020)

    Google Scholar 

  30. Zhang, Y., Chen, Y., Wang, J., Pan, Z.: Unsupervised deep anomaly detection for multi-sensor time-series signals. IEEE Trans. Knowl. Data Eng. 35, 2118–2132 (2021)

    Google Scholar 

  31. Zheng, K., Chen, Q., Wang, Y., Kang, C., **a, Q.: A novel combined data-driven approach for electricity theft detection. IEEE Trans. Industr. Inf. 15(3), 1809–1819 (2018)

    Article  Google Scholar 

  32. Zheng, Z., Yang, Y., Niu, X., Dai, H.N., Zhou, Y.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606–1615 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhigang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, S., Yang, Y., You, S., Chen, W., Li, Z. (2023). A Study of Electricity Theft Detection Method Based on Anomaly Transformer. In: Chen, E., et al. Big Data. BigData 2023. Communications in Computer and Information Science, vol 2005. Springer, Singapore. https://doi.org/10.1007/978-981-99-8979-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8979-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8978-2

  • Online ISBN: 978-981-99-8979-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation