Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 790-794.doi: 10.11896/jsjkx.210800032

• Interdiscipline & Application • Previous Articles     Next Articles

Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection

QUE Hua-kun1, FENG Xiao-feng1, LIU Pan-long2, GUO Wen-chong1, LI Jian1, ZENG Wei-liang2, FAN Jing-min2   

  1. 1 Metrology Center of Guangdong Power Grid Corporation,Guangzhou 518049,China
    2 School of Automation,Guangdong University of Technology,Guangzhou 510006,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:QUE Hua-kun,born in 1986,senior engineer.His main research interests include metering automation and charging strategy.
    ZENG Wei-liang,born in 1986,Ph.D,associate professor.His main research interests include routing problem in complex network,traffic simulation and big data visualization for smart city.
  • Supported by:
    Science and Technology Project of China Southern Power Grid Co. Ltd(GDKJXM20185800) and National NaturalScience Foundation of China(61803100).

Abstract: Power stealing seriously endangers the grid security.In order to improve the efficiency of electricity theft detection,this paper proposes a novel method for electricity stealing detection based on Grassberger entropy random forest.First,KPCA is applied to reduce the dimensionality of the original power time series for extracting the user power consumption characteristics.Then,considering the unbalance of the number of theft samples and normal samples,the data under sampling method is used to establish multiple quantitatively balanced sample subsets.The random forest with improved Grassberger entropy is used tocompute informantion gain,so as to improve the accuracy of the model in power theft detection.Finally,the electricity consumption dataset of China Southern Power Grid is used to verify the power stealing detection effect of the proposed model.

Key words: Grassberger entropy, Kernel principal component analysis, Power stealing detection, Random Forest

CLC Number: 

  • F407.6
[1] TIAN L,XIANG M.Abnormal Power Consumption Analysis Based on Density-based Spatial Clustering of Applications with Noise in Power Systems[J].Automation of Electric Power Systems,2017,41(5):64-70.
[2] WANG G L,ZHOU G L,ZHAO H S,et al.Fast Clustering and Anomaly Detection Technique for Large-scale Power Data Stream[J].Automation of Electric Power Systems,2016,40(24):27-33.
[3] FAHIM M,SILLITTI A.Analyzing Load Profiles of EnergyConsumption to Infer.Household Characteristics Using Smart Meters[J].Energies,2019,12:169-173.
[4] LEANDRO A P J,CAIO C O R,RODRIGUES D,et al.Unsupervised non-technical losses identification through optimum-path forest[J].Electric Power Systems Research,2016,140:413-423.
[5] ZANETTI,M,JAMHOUR E,PELLENZ M,et al.A tunable fraud detection system for advanced metering infrastructure using short-lived patterns[J].IEEE Transactions on Smart grid,2019,10(1):830-840.
[6] MUNIZ C,FIGUEIREDO K,VELLASCO M,et al.Irregularity detection on low tension electric installations by neural network ensembles[C]//2009 International Joint Conference on Neural Networks.IEEE,2016:2176-2182.
[7] COSTA B C,LA ALBERTO B,PORTELA A,et al.Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process[J].International Journal of Artificial Intelligence & Applications,2019,4(6):17.
[8] LIN J N,CHENG Z H,LIN B X.Study on identification method of stolen electricity based on MEA-BP[J].Electronic Design Engineering,2021,29(11):175-180.
[9] SPIRI'C J V,STANKOVI'C S S,BDOˇCI'C M,et al.Using the rough set theoryto detect fraud committed by electricity custo-mers[J].International Journal of ElectricalPower & Energy Systems,2014,62(1):727-734.
[10] YANG X L,TAO X F,XIONG X,et al.Detection Method for Electricity Theft Based on Deep Forest Algorithm[J].Smart Power,2019,47(10):85-92.
[11] CAI J H,WANG K,DONG K,et.al.Power user stealing detection based on DenseNet and random forest[J].Journal of Computer Applications,2021,41(S1):75-80.
[12] CIESLAK D A,CHAWLA N V,STRIEGEL A.Combating imbalance in network intrusion datasets[C]//IEEE International Conference on Granular Computing.2006:732-737.
[13] ZHAO Z X,WANG G L,LI X D.An Improved SVM Based Under-Sampling Method for Classifying Imbalanced Data[J].Acta Scientiarum Naturalium Universitatis Sunyatseni,2012,51(6):10-16.
[14] YANG J,YAN X F,ZHANG D P.Cost-sensitive Software Defect Prediction Method Based on Boosting[J].Computer Scien-ce,2017,44(8):176-180.
[15] LIU X Y,WU J,ZHOU Z H.Exploratory under sampling for class-imbalance learning[J].IEEE Transactions on Systems,Man,and Cybernetics,Part B:Cybernetics,2009,39(2):539-550.
[16] CHEN S Z,ZHU J P,YOU T G.Study on Unbalanced Custo-mer Loss Based on SMOTERF Algorithm[J].Journal of Mathematics in Practice and Theory,2019,1(9):204-210.
[17] BARUA S,ISLAM M M,YAO X,et al.MWMOTE-majority weighted minority oversampling technique for imbalanced data set learning[J].IEEE Transactions on Knowledge and Data Engineering,2014,26(2):405-425.
[18] LIU X Y,WANG S T,ZHANG M L.Transfer synthetic over-sampling for class-imbalance learning with limited minority class data[J].Frontiers of Computer Science,2019,13(5):406-415.
[19] DEL RÍO S,LÓPEZ V,BENÍ-TEZ J M,et al.On the use ofMapReduce for imbalanced big data using Random Forest[J].Information Sciences,2014,12(1):235-239.
[20] ZHANG M,HU X H,WU J X.Imbalanced Data Processing Algorithm Based on Mixed Sampling[J].Computer Engineering and Applications,2019,55(17):68-75.
[21] MA J J,PAN Q,LIANG Y,et al.Object Detection Based on Improved Grassberger Entropy Random Forest Classifier[J].Chinese Journal of Lasers,2019,46(7):238-246.
[1] LI Qi-ye, XING Hong-jie. KPCA Based Novelty Detection Method Using Maximum Correntropy Criterion [J]. Computer Science, 2022, 49(8): 267-272.
[2] GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49.
[3] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[4] WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246.
[5] ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210.
[6] LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114.
[7] YANG Xiao-qin, LIU Guo-jun, GUO Jian-hui, MA Wen-tao. Full Reference Color Image Quality Assessment Method Based on Spatial and Frequency Domain Joint Features with Random Forest [J]. Computer Science, 2021, 48(8): 99-105.
[8] ZHENG Jian-hua, LI Xiao-min, LIU Shuang-yin, LI Di. Improved Random Forest Imbalance Data Classification Algorithm Combining Cascaded Up-sampling and Down-sampling [J]. Computer Science, 2021, 48(7): 145-154.
[9] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[10] LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467.
[11] XU Jia-qing, HU Xiao-yue, TANG Fu-qiao, WANG Qiang, HE Jie. Detecting Blocking Failure in High Performance Interconnection Networks Based on Random Forest [J]. Computer Science, 2021, 48(6): 246-252.
[12] ZHOU Yi-min, LIU Fang-zheng , WANG Yong. IPSec VPN Encrypted Traffic Identification Based on Hybrid Method [J]. Computer Science, 2021, 48(4): 295-302.
[13] ZHANG Tian-rui, WEI Ming-qi, GAO Xiu-xiu. Prediction Model of Bubble Dissolution Time in Selective Laser Sintering Based on IPSO-WRF [J]. Computer Science, 2021, 48(11A): 638-643.
[14] LIU Zhen-peng, SU Nan, QIN Yi-wen, LU Jia-huan, LI Xiao-fei. FS-CRF:Outlier Detection Model Based on Feature Segmentation and Cascaded Random Forest [J]. Computer Science, 2020, 47(8): 185-188.
[15] YANG Wei-chao, GUO Yuan-bo, LI Tao, ZHU Ben-quan. Method Based on Traffic Fingerprint for IoT Device Identification and IoT Security Model [J]. Computer Science, 2020, 47(7): 299-306.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!