Computer Science ›› 2022, Vol. 49 ›› Issue (1): 140-145.doi: 10.11896/jsjkx.210100177

• Database & Big Data & Data Science • Previous Articles     Next Articles

Electricity Theft Detection Based on Multi-head Attention Mechanism

XIAO Ding, ZHANG Yu-fan, JI Hou-ye   

  1. School of Computer Science,Beijing University of Posts and Telecommunications,Beijing 100876,China
  • Received:2021-01-22 Revised:2021-07-23 Online:2022-01-15 Published:2022-01-18
  • About author:XIAO Ding,born in 1966,lecture.His main research interests include software engineering and artificial intelligence.
    ZHANG Yu-fan,born in 1996,postgra-duate.Her main research interests include power systems and artificial intelligence.
  • Supported by:
    National Natural Science Foundation of China(U20B2045,61772082)

Abstract: Electricity theft causes significant damage to social and economic development.How to detect malicious electricity theft based on power big data has been widely concerned by academia and industry.Aiming at the problems of traditional methods relying on manual features,insufficient behavior sequence representation,poor detection accuracy,etc.,this paper proposes an electricity theft detection model based on multi-head attention mechanism (ETD-MHA).The bidirectional gated recurrent unit is used to fully capture the time features of the electricity consumption behavior sequence,and the distinction of key features is gradually enhanced in the multi-head attention mechanism,and finally,the learning effect is improved by deepening the networks.Extended experiments are conducted on the smart meter datasets of Ireland and China State Grid.The results show that the proposed method achieves better performance compared with the linear regression (LR),support vector machine (SVM),random forest (RF),and other traditional algorithms.For example,the AUC value of the proposed model is improved by up to 34.6%compared to the LR algorithm.

Key words: Deep learning, Electricity theft detection, Gated recurrent neural network, Multi-head attention mechanism, Smart grids

CLC Number: 

  • TP183
[1]DEPURU S S S R,WANG L,DEVABHAKTUNI V.Electricity theft:Overview,issues,prevention and a smart meter based approach to control theft[J].Energy Policy,2011,39(2):1007-1015.
[2]NAVANI J P,SHARMA N K,SAPRA S.Technical and Non-Technical Losses in Power System and Its Economic Consequence in Indian Economy[J].International Journal of Electro-nics & Computer Science Engineering,2012,1(2):757-761.
[3]AKOUEMO H N,POVINELLI R J.Probabilistic anomaly detection in natural gas time series data[J].International Journal of Forecasting,2016,32(3):948-956.
[4]NIZAR A H,DONG Z Y,WANG Y.Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method[J].IEEE Transactions on Power Systems,2008,23(3):946-955.
[5]NAGI J,YAP K S,TIONG S K,et al.Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines[J].IEEE Transactions on Power Delivery,2010,25(2):1162-1171.
[6]DEPURU S S S R,WANG L,DEVABHAKTUNI V,et al.A hybrid neural network model and encoding technique for enhanced classification of energy consumption data[C]//2011 IEEE Power and Energy Society General Meeting.IEEE,2011:1-8.
[7]DEPURU S S S R,WANG L,DEVABHAKTUNI V.Supportvector machine based data classification for detection of electricity theft[C]//2011 IEEE/PES Power Systems Conference and Exposition.IEEE,2011:1-8.
[8]NAGI J,YAP K S,TIONG S K,et al.Improving SVM-BasedNontechnical Loss Detection in Power Utility Using the Fuzzy Inference System[J].IEEE Transactions on Power Delivery,2011,26(2):1284-1285.
[9]JOKAR P,ARIANPOO N,LEUNG V C.Electricity Theft Detection in AMI Using Customers' Consumption Patterns[J].IEEE Transactions on Smart Grid,2017,7(1):216-226.
[10]LUONG M T,PHAM H,MANNING C D.Effective approaches to attention-based neural machine translation[J].arXiv:1508.04025,2015.
[11]CHEN P,LIU S,SHI C,et al.NeuCast:Seasonal Neural Forecast of Power Grid Time Series[C]//Twenty-Seventh International Joint Conference on Artificial Intelligence IJCAI-18.International Joint Conferences on Artificial Intelligence Organization.2018:3315-3321.
[12]ZHUANG S J,YU Z Y,GUO W Z,et al.Short Term Load Forecasting via Zoneout-based Multi-time Scale Recurrent Neural Network[J].Computer Science,2020,47(9):105-109.
[13]HU T Y,GUO Q L,SUN H B.Nontechnical loss detectionbased on stacked uncorrelating autoencoder and support vector machine[J].Automation of Electric Power Systems,2019,43(1):119-127.
[14]MENG Z,XU X.A Hybrid Short-Term Load ForecastingFramework with an Attention-Based Encoder-Decoder Network Based on Seasonal and Trend Adjustment[J].Energies,2019,12(24):4612.
[15]ZHENG Z,YANG Y,NIU X,et al.Wide and Deep Convolutio-nal Neural Networks for Electricity-Theft Detection to Secure Smart Grids[J].IEEE Transactions on Industrial Informatics,2017:14(4):1606-1615.
[16]NABIL M,MAHMOUD M,ISMAIL M,et al.Deep recurrentelectricity theft detection in AMI networks with evolutionary hyper-parameter tuning[C]//2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).IEEE,2019:1002-1008.
[17]CHEN Z,MENG D,ZHANG Y,et al.Electricity theft detection using deep bidirectional recurrent neural network[C]//2020 22nd International Conference on Advanced Communication Technology (ICACT).IEEE,2020:401-406.
[18]BAHDANAU D,CHO K,BENGIO Y.Neural Machine Translation by Jointly Learning to Align and Translate[J].arXiv:1409.0473,2014.
[19]VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[J].arXiv:1706.03762,2017.
[20]ISSDA.Data from the commission for energy regulation[EB/OL].[2019-07-01].http://www.ucd.ie/issda/data/commissionforenergyregulationcer/.
[1] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[2] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[3] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[4] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[5] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[6] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[7] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[8] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[9] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[10] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[11] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[12] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[13] ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383.
[14] WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423.
[15] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!