A Novel Electricity Theft Detection Strategy Based on Dual-Time Feature Fusion and Deep Learning Methods
Abstract
:1. Introduction
- By visualizing and introducing the Pearson correlation coefficient, we analyzed the differences in electricity-consumption characteristics between normal users and electricity theft users on a weekly scale. The conclusion drawn is that, compared to normal users, electricity theft users exhibit less apparent or irregular periodic electricity-consumption features.
- In order to integrate the electricity-consumption features at both daily and weekly scales, this paper proposes a novel theft detection strategy based on the fusion of dual-time features and deep learning methods. This strategy utilizes a hybrid model composed of LSTM-TCN and DCNN to concurrently extract features from both scales and achieves binary classification through an FC layer. The effectiveness of the proposed theft detection strategy is validated through simulation experiments and result analysis.
2. Related Works
3. Analysis of User Electricity-Consumption Characteristics
4. Framework for Electricity Theft Detection Strategy
4.1. TCN with LSTM Multi-Level Feature Extraction Module
4.2. DCNN Feature Extraction Model
4.3. Feature Fusion Module
5. Simulation Analysis and Experimental Results
5.1. Data Preparation
5.2. Evaluation Index
5.3. Hyperparameter Selection
5.4. Model Performance Evaluation
6. Discussion
7. Conclusions
- We will optimize the model structure and accelerate model training to reduce the computational complexity and resource constraints of the model.
- We are considering deploying the optimized model on a Raspberry Pi. The deployment involves communication with smart meters to collect users’ electricity-consumption information and automatically detect electricity theft. If the model is deployed, it can be enhanced with Intel’s Neural Compute Stick. It is indeed feasible to further optimize the proposed model and integrate it into practical engineering applications.
- We will deploy Raspberry Pi embedded with the optimized model into various real-world scenarios, further investigating the model’s generalization ability and robustness in different contexts as proposed in this paper.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Xia, X.; Yang, X.; Liang, W.; Cui, J. Detection Methods in Smart Meters for Electricity Thefts: A Survey. Proc. IEEE 2022, 110, 273–319. [Google Scholar] [CrossRef]
- Ahmad, T.; Chen, H.; Wang, J.; Guo, Y. Review of various modeling techniques for the detection of electricity theft in smart grid environment. Renew. Sustain. Energy Rev. 2018, 82, 2916–2933. [Google Scholar] [CrossRef]
- Andrey, P.; Firuz, K.; Pavel, Y.G.; Murodbek, S.; Vladislav, S.; Nikita, M.; Ismoil, O.; Inga, Z. Data-Driven Machine Learning Methods for Nontechnical Losses of Electrical Energy Detection: A State-of-the-Art Review. Energies 2023, 16, 7460. [Google Scholar]
- Sajad, A.; Min, Y.; Wajid, A. Prevention and Detection of Electricity Theft of Distribution Network. Sustainability 2023, 15, 4868. [Google Scholar]
- Erika, S.; Antonello, R.; Gianfranco, D.; Massimo, P.; Rodolfo, A. Systematic review of energy theft practices and autonomous detection through artificial intelligence methods. Renew. Sustain. Energy Rev. 2023, 184, 11544. [Google Scholar]
- Xia, R.; Gao, Y.; Zhu, Y.; Gu, D.; Wang, J. An Efficient Method Combined Data-Driven for Detecting Electricity Theft with Stacking Structure Based on Grey Relation Analysis. Energies 2022, 15, 7423. [Google Scholar] [CrossRef]
- Wang, Y.; Chen, Q.; Hong, T.; Kang, C. Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges. IEEE Trans. Smart Grid. 2019, 10, 3125–3148. [Google Scholar] [CrossRef]
- Chen, J.; Nanehkaran, Y.; Chen, W.; Liu, Y.; Zhang, D. Data-driven intelligent method for detection of electricity theft. Int. J. Electr. Power Energy Syst. 2023, 148, 108948. [Google Scholar] [CrossRef]
- Zheng, K.; Chen, Q.; Wang, Y.; Kang, C.; Xia, Q. A Novel Combined Data-Driven Approach for Electricity Theft Detection. IEEE Trans. Ind. Inf. 2019, 15, 1809–1819. [Google Scholar] [CrossRef]
- Liao, W.; Yang, Z.; Bak-Jensen, B.; Pillai, R.; Krannichfeldt, L.; Wang, Y.; Yang, D. Simple Data Augmentation Tricks for Boosting Performance on Electricity Theft Detection Tasks. IEEE Trans. Ind. Appl. 2023, 59, 4846–4858. [Google Scholar] [CrossRef]
- Zheng, Z.; Yang, Y.; Niu, X.; Dai, H.; Zhou, Y. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids. IEEE Trans. Ind. Inf. 2018, 14, 1606–1615. [Google Scholar] [CrossRef]
- Nagi, J.; Yap, K.; Tiong, S.; Ahmed, S.; Mohamad, M. Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines. IEEE Trans. Power Delivery. 2010, 25, 1162–1171. [Google Scholar] [CrossRef]
- Yan, Z.; Wen, H. Electricity Theft Detection Base on Extreme Gradient Boosting in AMI. IEEE Trans. Instrum. Meas. 2021, 70, 1–9. [Google Scholar] [CrossRef]
- Hasan, M.N.; Toma, R.N.; Nahid, A.-A.; Islam, M.M.M.; Kim, J.-M. Electricity Theft Detection in Smart Grid Systems: A CNN-LSTM Based Approach. Energies 2019, 12, 3310. [Google Scholar] [CrossRef]
- Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision Tree and SVM-based Data Analytics for Theft Detection in Smart Grid. IEEE Trans. Ind. Inf. 2016, 12, 1005–1016. [Google Scholar] [CrossRef]
- Haq, E.; Huang, J.; Xu, H.; Li, K.; Ahmad, F. A hybrid approach based on deep learning and support vector machine for the detection of electricity theft in power grids. Energy Rep. 2021, 7, 349–356. [Google Scholar] [CrossRef]
- Mohammad, F.; Saleem, K.; Al-Muhtadi, J. Ensemble-Learning-Based Decision Support System for Energy-Theft Detection in Smart-Grid Environment. Energies 2023, 16, 1907. [Google Scholar] [CrossRef]
- Tian, C.; Ma, J.; Zhang, C.; Zhan, P. A Deep Neural Network Model for Short-Term Load Forecast Based on Long Short-Term Memory Network and Convolutional Neural Network. Energies 2018, 11, 3493. [Google Scholar] [CrossRef]
- Zheng, X.; Bai, F.; Zhuang, Z.; Chen, Z.; Jin, T. A new demand response management strategy considering renewable energy prediction and filtering technology. Renewable Energy 2023, 211, 656–668. [Google Scholar] [CrossRef]
- Liu, Y.; Yuan, D.; Fan, H.; Jin, T.; Mohamed, M.A. Multidimensional Feature-Driven Ensemble Model for Accurate Classification of Complex Power Quality Disturbance. IEEE Trans. Instrum. Meas. 2023, 72, 1501613. [Google Scholar] [CrossRef]
- Liu, Y.; Jin, T.; Mohamed, M. A novel dual-attention optimization model for points classification of power quality disturbances. Appl. Energy 2023, 339, 121011. [Google Scholar] [CrossRef]
- Wang, Y.; Jin, S.; Cheng, M. A Convolution–Non-Convolution Parallel Deep Network for Electricity Theft Detection. Sustainability 2023, 15, 10127. [Google Scholar] [CrossRef]
- Massaferro, P.; Martino, J.M.D.; Fernández, A. Fraud Detection on Power Grids While Transitioning to Smart Meters by Leveraging Multi-Resolution Consumption Data. IEEE Trans. Smart Grid 2022, 13, 2381–2389. [Google Scholar] [CrossRef]
- Xia, X.; Lin, J.; Jia, Q.; Wang, X.; Ma, C.; Cui, J.; Liang, W. ETD-ConvLSTM: A Deep Learning Approach for Electricity Theft Detection in Smart Grids. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2553–2568. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Nabil, M.; Mahmoud, M.M.E.A.; Serpedin, E. Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings. IEEE Syst. J. 2021, 15, 4189–4198. [Google Scholar] [CrossRef]
- Chen, Z.; Meng, D.; Zhang, Y.; Xin, T.; Xiao, D. Electricity Theft Detection Using Deep Bidirectional Recurrent Neural Network. In Proceedings of the 2020 22nd International Conference on Advanced Communication Technology (ICACT), Phoenix Park, Republic of Korea, 16–19 February 2020; pp. 401–406. [Google Scholar]
- Lea, C.; Vidal, R.; Reiter, A.; Hager, G.D. Temporal Convolutional Networks: A Unified Approach to Action Segmentation. In Proceedings of the Computer Vision—ECCV 2016 Workshops, Pt III, Amsterdam, The Netherlands, 8–10, 15–16 October 2016; Volume 9915, pp. 47–54. [Google Scholar]
- Stergiou, A.; Poppe, R.; Kalliatakis, G. Refining activation downsampling with SoftPool. In Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada, 10–17 October 2021; pp. 10337–10346. [Google Scholar]
- Khan, I.; Javeid, N.; Taylor, C.; Gamage, K.; Ma, X. A Stacked Machine and Deep Learning-Based Approach for Analysing Electricity Theft in Smart Grids. IEEE Trans. Smart Grid 2022, 13, 1633–1644. [Google Scholar] [CrossRef]
Refs. | Algorithms | Data Source | Advantages | Disadvantages |
---|---|---|---|---|
[12] | SVM | Tenaga Nasional Berhad Distribution (TNBD), Sdn.Bhd. | Detects meter tampering and meter bypassing/Detects abrupt changes in load-profile. | Readings are transformed into average, which can deviate from actual values. |
[13] | XGBoost | Irish Smart Energy Trial Dataset | The proposed method is robust when the data are imbalanced. | The proposed method only analyzes electricity-consumption data alone, which may produce limited results. |
[15] | Decision Tree coupled SVM | References [37–39] in [15] | The proposed scheme is capable enough to detect the thefts happening anywhere in the power network. | This scheme needs to obtain many features in advance. |
[16] | CNN-SVM | Non-public | The proposed model can extract features automatically. | The detection performance on other data sets needs further verification. |
[17] | ensemble-learning approach and ML-classifier training method | Mendeley datasets | This study presents an ensemble learning-based system for detecting energy theft using a hybrid approach. | The main limitation of this work is its computational complexity. |
[11] | Hybrid CNN | SGCC Dataset | A hybrid CNN model is proposed to improve the accuracy of electricity theft detection. | The fully connected layer in the model cannot learn the temporal dependence in customer electricity-consumption time series. |
[14] | CNN-LSTM | SGCC Dataset | The CNN is used for automatically extracting high-level features, then these features are then flattened and fed into an LSTM neural network for capturing temporal dependencies. | Requires larger computing resources. |
[22] | Convolution + non-convolution deep network | SGCC Dataset | The proposed method comes from the CNCP structure, which can capture features of electricity-consumption time series at different scales. | The process of visualizing data is relatively complex and carries the potential risk of losing features among the data. |
[23] | CNN | Uruguayan power generation and distribution company and CER dataset | Present a multi-resolution convolutional neural networks architecture for fraud detection on smart grids. | The process of visualizing data is relatively complex and carries the potential risk of losing features among the data. |
Layer Name | Parameters | Activation Function |
---|---|---|
LSTM | units = 1 return sequences = True | tanh |
Concatenate | axis = 0 | None |
Res Block1 | filters =32 kernel size = 3 dilation rate = 1 | ReLU |
Res Block2 | filters =32 kernel size = 3 dilation rate = 2 | ReLU |
Res Block3 | filters =16 kernel size = 3 dilation rate = 4 | ReLU |
Dense | units = 128 | ReLU |
Layer Name | Parameters | Activation Function |
---|---|---|
Conv-1 | kernel_size = 3 × 3, filter = 32 | ReLU |
Conv-2 | kernel_size = 3 × 3, filter = 32 | ReLU |
MaxPooling-1 | kernel_size = 2×2 | None |
Conv-3 | kernel_size = 3 × 3, filter = 64 | ReLU |
Conv-4 | kernel_size = 3 × 3, filter = 64 | ReLU |
MaxPooling-2 | kernel_size = 2 × 2 | None |
Conv-3 | kernel_size = 3 × 3, filter = 128 | ReLU |
Conv-4 | kernel_size = 3 × 3, filter = 128 | ReLU |
MaxPooling-2 | kernel_size = 1 × 1 | None |
Hardware/Software | Model/Version | Hardware/Software | Model/Version |
---|---|---|---|
OS | Win10 (64 bit) | Python | 3.6 |
CPU | Intel Core i9-9820X @3.3.0 GHz | Tensorflow | 2.0.0 |
Keras | 2.3.1 | ||
GPU | NVIDIA GeForce RTX 2080 | Scikit-learn | 0.24.2 |
RAM | DDR4 32 GB | CUDA | 10.0 |
HDD | SSD 1 TB | cuDNN | 7.6.5 |
User Category | Actual: Abnormal | Actual: Normal |
---|---|---|
Predict: Abnormal | TP | FP |
Predict: Normal | FN | TN |
Models | Train Ratio 60% | Train Ratio 70% | Train Ratio 80% | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Acc | Pre | Recall | F1 | AUC | Acc | Pre | Recall | F1 | AUC | Acc | Pre | Recall | F1 | AUC | |
RF | 0.913 | 0.938 | 0.885 | 0.911 | 0.970 | 0.921 | 0.940 | 0.900 | 0.920 | 0.973 | 0.922 | 0.936 | 0.904 | 0.920 | 0.975 |
SVM | 0.799 | 0.729 | 0.951 | 0.825 | 0.934 | 0.808 | 0.754 | 0.915 | 0.827 | 0.918 | 0.819 | 0.747 | 0.960 | 0.840 | 0.952 |
GBDT | 0.809 | 0.804 | 0.816 | 0.810 | 0.888 | 0.813 | 0.810 | 0.814 | 0.812 | 0.890 | 0.837 | 0.831 | 0.841 | 0.836 | 0.912 |
XGBoost | 0.889 | 0.885 | 0.894 | 0.889 | 0.952 | 0.897 | 0.894 | 0.903 | 0.898 | 0.959 | 0.900 | 0.893 | 0.905 | 0.899 | 0.958 |
1D-CNN | 0.923 | 0.901 | 0.949 | 0.924 | 0.971 | 0.930 | 0.907 | 0.958 | 0.931 | 0.976 | 0.932 | 0.910 | 0.957 | 0.933 | 0.975 |
2D-CNN | 0.924 | 0.909 | 0.943 | 0.923 | 0.972 | 0.928 | 0.915 | 0.944 | 0.929 | 0.974 | 0.934 | 0.914 | 0.957 | 0.935 | 0.974 |
DCNN | 0.911 | 0.901 | 0.923 | 0.912 | 0.958 | 0.920 | 0.906 | 0.938 | 0.922 | 0.965 | 0.926 | 0.908 | 0.947 | 0.927 | 0.969 |
LSTM-TCN | 0.899 | 0.873 | 0.913 | 0.900 | 0.958 | 0.919 | 0.911 | 0.932 | 0.923 | 0.966 | 0.932 | 0.912 | 0.958 | 0.934 | 0.973 |
CNN-LSTM | 0.713 | 0.728 | 0.678 | 0.708 | 0.778 | 0.745 | 0.763 | 0.708 | 0.744 | 0.809 | 0.760 | 0.780 | 0.723 | 0.751 | 0.828 |
Proposal | 0.933 | 0.918 | 0.949 | 0.933 | 0.974 | 0.939 | 0.930 | 0.957 | 0.940 | 0.983 | 0.947 | 0.932 | 0.964 | 0.948 | 0.986 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, Q.; Tang, Z.; Weng, X.; He, M.; Liu, F.; Yang, M.; Jin, T. A Novel Electricity Theft Detection Strategy Based on Dual-Time Feature Fusion and Deep Learning Methods. Energies 2024, 17, 275. https://doi.org/10.3390/en17020275
Huang Q, Tang Z, Weng X, He M, Liu F, Yang M, Jin T. A Novel Electricity Theft Detection Strategy Based on Dual-Time Feature Fusion and Deep Learning Methods. Energies. 2024; 17(2):275. https://doi.org/10.3390/en17020275
Chicago/Turabian StyleHuang, Qinyu, Zhenli Tang, Xiaofeng Weng, Min He, Fang Liu, Mingfa Yang, and Tao Jin. 2024. "A Novel Electricity Theft Detection Strategy Based on Dual-Time Feature Fusion and Deep Learning Methods" Energies 17, no. 2: 275. https://doi.org/10.3390/en17020275
APA StyleHuang, Q., Tang, Z., Weng, X., He, M., Liu, F., Yang, M., & Jin, T. (2024). A Novel Electricity Theft Detection Strategy Based on Dual-Time Feature Fusion and Deep Learning Methods. Energies, 17(2), 275. https://doi.org/10.3390/en17020275