DYNAMIC GENERATIVE RESIDUAL GRAPH CONVOLUTIONAL NEURAL NETWORKS FOR ELECTRICITY THEFT DETECTION
Main Article Content
Abstract
Illegal electricity users pose a significant threat to the economic and security aspects of the power system by illicitly accessing or manipulating electrical resources. With the widespread adoption of Advanced Metering Infrastructure (AMI), researchers have turned to leveraging smart meter data for electricity theft detection. However, existing models rely on methods that model a single electricity load curve and cannot capture the temporal dependencies, periodicity, and underlying features between electricity consumption cycles. This study introduces a novel electricity theft detection method based on dynamic residual graph networks. Innovatively, it proposes a dynamic topological graph construction technique that allows for the real-time updating of adjacency matrices during the training process, thereby effectively capturing the complex relationships in electricity usage patterns. Utilizing the MixHop graph convolutional network, it delves into the temporal sequence dependencies, periodicity, and hidden characteristics within user electricity consumption data. Additionally, to address the issue of model instability caused by scarce theft data, we employ the SMOTE (Synthetic Minority Over-sampling Technique) oversampling technique and enhance overall classification performance by modifying class weights in the loss function. We trained this network architecture on the real SGCC (State Grid Corporation of China) dataset, and the results demonstrate its superiority over other mainstream existing models.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. Shen, ‘‘Energytheft detection issues for advanced metering infrastructure in smart grid,’’ Tsinghua Sci. Technol., vol. 19, no. 2, pp. 105–120, Apr. 2014.
L Source Northeast Group. Accessed: Aug. 6, 2022. [Online]. Available: https://www.prnewswire.com/news-releases/96-billion-is-lost-every-yearto- electricity-theft-300453411.html
X. Xia, Y. Xiao,W. Liang, and J. Cui, ‘‘Detection methods in smart meters for electricity thefts: A survey,’’ Proc. IEEE, vol. 110, no. 2, pp. 273–319, Feb. 2022.
M. G. Chuwa and F. Wang, ‘‘A review of non-technical loss attack models and detection methods in the smart grid,’’ Electric Power Syst. Res., vol. 199, Oct. 2021, Art. no. 107415. [Online]. Available:https://www.sciencedirect.com/science /article/pii/S0378779621003965
Y. Guo, C.-W. Ten, and P. Jirutitijaroen, ‘‘Online data validation for distribution operations against cybertampering,’’ IEEE Trans. Power Syst., vol. 29, no. 2, pp. 550–560, Mar. 2014.
X. Yu and Y. Xue, ‘‘Smart grids: A cyber–physical systems perspective,’’ Proc. IEEE, vol. 104, no. 5, pp. 1058–1070, May 2016.
J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and M. Mohamad, ‘‘Nontechnical loss detection for metered customers in power utility using support vector machines,’’ IEEE Trans. Power Del., vol. 25, no. 2,
pp. 1162–1171, Apr. 2010.
J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and F. Nagi, ‘‘Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system,’’ IEEE Trans. Power Del., vol. 26, no. 2, pp. 1284–1285, Apr. 2011.
J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and A. M. Mohammad, ‘‘Detection of abnormalities and electricity theft using genetic support vector machines,’’ in Proc. TENCON IEEE Region 10 Conf., 2008, pp. 1–6.
S. S. S. R. Depuru, L. Wang, V. Devabhaktuni, and R. C. Green, ‘‘High performance computing for detection of electricity theft,’’ Int. J. Electric Power Energy Syst., vol. 47, pp. 21–30, May 2013. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0142061512005947
A. Jindal, A. Dua, K. Kaur, M. Singh, N. Kumar, and S. Mishra, ‘‘Decision tree and SVM-based data analytics for theft detection in smart grid,’’ IEEE Trans. Ind. Informat., vol. 12, no. 3, pp. 1005–1016, Jun. 2016.
M. Zanetti, E. Jamhour, M. Pellenz, and M. Penna, ‘‘A new SVM-based fraud detection model for AMI,’’ in Computer Safety, Reliability, and Security, A. Skavhaug, J. Guiochet, and F. Bitsch, Eds. Cham, Switzerland: Springer, 2016, pp. 226–237.
F. Rodriguez, M. D. Martino, J. P. Kosut, F. Santomauro, F. Lecumberry, and A. Fernández, ‘‘Optimal and linear F-measure classifiers applied to non-technical losses detection,’’ in Prog. Pattern Recognit., Image Anal., Comput. Vis., Appl., A. Pardo and J. Kittler, Eds. Cham, Switzerland: Springer, 2015, pp. 83–91.
M. Di Martino, F. Decia, J. Molinelli, and A. Fernández, ‘‘Improving electric fraud detection using class imbalance strategies,’’ in Proc. Int. Conf. Pattern Recognit. Appl. Methods (IPRAM), 2012.
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, ‘‘Scikit-learn: Machine learning in Python,’’ J. Mach. Learn. Res., vol. 12, pp. 2825–2830, Nov. 2011.