{"id":"https://openalex.org/W3094328446","doi":"https://doi.org/10.1109/icccnt49239.2020.9225572","title":"CNN-LSTM based Electricity Theft Detector in Advanced Metering Infrastructure","display_name":"CNN-LSTM based Electricity Theft Detector in Advanced Metering Infrastructure","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094328446","doi":"https://doi.org/10.1109/icccnt49239.2020.9225572","mag":"3094328446"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030250179","display_name":"Rutuja Umesh Madhure","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113821","display_name":"Indian Institute of Information Technology, Pune","ror":"https://ror.org/01f8qyw75","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210113821"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rutuja Umesh Madhure","raw_affiliation_strings":["Indian Institute of Information Technology Pune, Pune, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Pune, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I4210113821"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048660681","display_name":"Radha Raman","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113821","display_name":"Indian Institute of Information Technology, Pune","ror":"https://ror.org/01f8qyw75","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210113821"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Radha Raman","raw_affiliation_strings":["Indian Institute of Information Technology Pune, Pune, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Pune, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I4210113821"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061746359","display_name":"Sandeep Kumar Singh","orcid":"https://orcid.org/0000-0002-8734-9832"},"institutions":[{"id":"https://openalex.org/I36909309","display_name":"National Institute of Technology Hamirpur","ror":"https://ror.org/01nc8zs04","country_code":"IN","type":"education","lineage":["https://openalex.org/I36909309","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sandeep Kumar Singh","raw_affiliation_strings":["National Institute of Technology Hamirpur, Hamirpur, Himachal Pradesh, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Hamirpur, Hamirpur, Himachal Pradesh, India","institution_ids":["https://openalex.org/I36909309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030250179"],"corresponding_institution_ids":["https://openalex.org/I4210113821"],"apc_list":null,"apc_paid":null,"fwci":1.9691,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.86790872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11220","display_name":"Water Systems and Optimization","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metering-mode","display_name":"Metering mode","score":0.8110425472259521},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7951852679252625},{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.7226994037628174},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7039948105812073},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.697424590587616},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.582048237323761},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5447027683258057},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5122665762901306},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.46468567848205566},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.45706501603126526},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4534301161766052},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4530884027481079},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.327043354511261},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12800157070159912},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11672592163085938}],"concepts":[{"id":"https://openalex.org/C30905978","wikidata":"https://www.wikidata.org/wiki/Q815598","display_name":"Metering mode","level":2,"score":0.8110425472259521},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7951852679252625},{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.7226994037628174},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7039948105812073},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.697424590587616},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.582048237323761},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5447027683258057},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5122665762901306},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.46468567848205566},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.45706501603126526},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4534301161766052},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4530884027481079},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.327043354511261},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12800157070159912},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11672592163085938},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W88605683","https://openalex.org/W1973309971","https://openalex.org/W2014252769","https://openalex.org/W2038418498","https://openalex.org/W2060237023","https://openalex.org/W2064675550","https://openalex.org/W2102828313","https://openalex.org/W2108558074","https://openalex.org/W2117571858","https://openalex.org/W2148212699","https://openalex.org/W2160625801","https://openalex.org/W2170673311","https://openalex.org/W2469098733","https://openalex.org/W2761158873","https://openalex.org/W2765809821","https://openalex.org/W2801594704","https://openalex.org/W2902455138","https://openalex.org/W2904322393","https://openalex.org/W2907630615","https://openalex.org/W2909291785","https://openalex.org/W2947210406","https://openalex.org/W6756753118"],"related_works":["https://openalex.org/W4312869071","https://openalex.org/W2028978355","https://openalex.org/W25930971","https://openalex.org/W1990698919","https://openalex.org/W3018909029","https://openalex.org/W3205631650","https://openalex.org/W2077996342","https://openalex.org/W2775355700","https://openalex.org/W2561882072","https://openalex.org/W2246071452"],"abstract_inverted_index":{"In":[0,52],"a":[1,23,46,55,94,115],"smart":[2,28,33,41,96],"grid,":[3],"estimating":[4],"the":[5,27,37,40,71,88,103,125,130,134],"power":[6,64],"requirements":[7],"of":[8,26,39,73,87,124],"various":[9],"regions":[10],"and":[11,67,76],"detecting":[12],"malicious":[13],"practices":[14],"is":[15,22,50,61,91,108],"very":[16],"crucial.":[17],"Advanced":[18],"Metering":[19],"Infrastructure":[20],"(AMI)":[21],"key":[24],"component":[25],"grid":[29],"system":[30],"that":[31,102],"uses":[32],"meters.":[34],"Due":[35],"to":[36,110],"vulnerability":[38],"meter":[42,97],"against":[43],"cyber":[44,112],"attacks,":[45],"strong":[47],"defense":[48],"algorithm":[49],"needed.":[51],"this":[53],"paper,":[54],"CNN-LSTM":[56,105],"based":[57,106],"deep":[58],"learning":[59],"methodology":[60],"proposed":[62,89,104,120],"for":[63],"consumption":[65],"forecasting":[66],"anomaly":[68],"detection":[69,117],"using":[70,93],"combination":[72],"Convolutional":[74],"layers":[75,83],"Stacked":[77],"Long":[78],"Short":[79],"Term":[80],"Memory":[81],"(LSTM)":[82],"architecture.":[84],"The":[85,119],"performance":[86],"method":[90,107,121],"tested":[92],"real":[95],"dataset.":[98],"Test":[99],"results":[100],"show":[101],"able":[109],"detect":[111],"attacks":[113],"with":[114],"high":[116],"rate.":[118],"outperforms":[122],"some":[123],"previously":[126],"existing":[127],"methods":[128],"in":[129],"literature":[131],"on":[132],"comparing":[133],"results.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
