Skip to main content
. 2024 Feb 9;24(4):1148. doi: 10.3390/s24041148

Table 1.

Literature overview on energy theft detection based on consumption data.

Ref. Year Platform Proposed Model Dataset Accuracy Presented Main Contribution
[31] 2019 N/A CNN-LSTM based SGCC 89 The irregular and abnormal consumption patterns of consumers are analyzed
[34] 2018 N/A Clustering based ISSDA 74 (AUC) Malicious examples are not needed to train the method for future detection
[28] 2020 Python 3.x CNN-GRU-PSO SGCC 89 Preprocessing steps, feature selection, feature extraction, and classification are performed using a lot of techniques and the proposed model outperforms imbalancing issue
[27] 2020 N/A MP-ANN ISSDA 93.4 (DR) Self-organizing is used for clustering the consumers according to similar consumption patterns, i.e., classification as honest or malicious. The number of transformers that have suspect consumers is reduced without the need to install measurement units on all transformers
[32] 2020 Python 3.x CNN-LSTM SGCC 87.9 An efficient solution to overcome imbalanced data, overfitting, and high-dimensional data limitations is introduced
[24] 2016 N/A DT-SVM OpenEnergy 92.5 The newly proposed system exhibits the capability to accurately identify instances of energy theft in real time across all stages of power transmission and distribution
[29] 2018 Python 3.x GRU (RNN-based) ISSDA 92.5 (DR) Temporal patterns are utilized in energy consumption, and a GRU-based RNN enhances detection performance, optimizing hyperparameters through a random search analysis in the learning phase
[23] 2016 N/A SVM-based ISSDA 94 (DR) Six different attack vectors are designed to obtain manipulated consumption data
[25] 2021 Python 3.x Ensemble ML ISSDA 90 (AUC) Data pre-processing is used to address imbalanced data with SMOTE and Near-miss techniques, achieving optimal detection rates through bagging-type ensemble ML demonstrated with diverse consumer samples
[30] 2018 N/A Wide and Deep CNN SGCC 80 (AUC) Unlike existing methods tailored for one-dimensional data, wide and deep CNN handles detecting electricity theft by effectively capturing both periodic and non-periodic consumption patterns in two-dimensional data
[33] 2020 N/A LSTM-based SGCC 93.6 A new technique is devised to streamline data, enhancing usability and facilitating the extraction of meaningful insights from the dataset
[26] 2021 Python 3.x Neural Network Grid LabD Tool 93 A novel method is introduced for detecting electricity theft, focusing on “balance attacks” with prosumers manipulating readings for total aggregated balance. A cluster-based detection model is introduced as a middle-ground approach, bridging the gap between using a single model for all users and individual models for each user
[36] 2021 Matlab2019 CNN-WeightedRF Mathpower Tool 95.71 An FDI intrusion-detection model combining CNN and weighted RF is able to detect the spurious data more accurately compared with other detection models
[37] 2015 N/A       SVM ISSDA 75.8 The classification models simplify a demand-side management study, analyze tariff methods, and offer insights for policymakers
[38] 2010 VisualBasic SVM Tenaga Nasional 60 This work aims to aid Tenaga Nasional Berhad Distribution in Malaysia to reduce NTLs within the distribution sector caused by electricity theft
[39] 2018 Python 3.x DNN-based ISSDA 92.6 (DR) This work proposes a DNN-based customer-specific detector that can mitigate electricity theft cyber-attacks
[40] 2017 N/A Density-based clustering ISSDA 93.2 This work exhibits superior performance compared to alternative methods across nearly all categories of theft
[41] 2022 Python 3.x Attention LSTM Inception SGCC 95 This work addresses the elevated FPR issue arising from widespread misclassification, leading to financial burdens
[42] 2022 Python 3.x KTBoost Classifier SGCC 93.38 Taking into account all minority sample regions in the dataset, the robust-SMOTE technique generates minority class samples with reduced susceptibility to overfitting and the generation of noisy samples
[43] 2023 Python 3.7 Deep-CNN Researcher-generated 95 The proposed theft detection method, utilizing the SMOTE technique to generate minority class samples with reduced susceptibility to overfitting and noise, attains the highest accuracy compared to all other studied methods
Our work 2024 Python 3.10 CNN-based ISSDA 95.34 CNN-based architecture is combined with traditional ML methods. A detector that provides high success in detecting all attack vectors has been designed. The imbalanced data problem was solved using GAN.