{"id":"https://openalex.org/W3118019547","doi":"https://doi.org/10.1109/smartgridcomm47815.2020.9303013","title":"SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection","display_name":"SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection","publication_year":2020,"publication_date":"2020-11-11","ids":{"openalex":"https://openalex.org/W3118019547","doi":"https://doi.org/10.1109/smartgridcomm47815.2020.9303013","mag":"3118019547"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm47815.2020.9303013","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm47815.2020.9303013","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101687908","display_name":"Jiangnan Li","orcid":"https://orcid.org/0000-0002-1554-7266"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiangnan Li","raw_affiliation_strings":["The University of Tennessee, Knoxville"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee, Knoxville","institution_ids":["https://openalex.org/I75027704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102921814","display_name":"Yingyuan Yang","orcid":"https://orcid.org/0000-0003-3150-129X"},"institutions":[{"id":"https://openalex.org/I79884896","display_name":"University of Illinois at Springfield","ror":"https://ror.org/0126qma51","country_code":"US","type":"education","lineage":["https://openalex.org/I79884896"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingyuan Yang","raw_affiliation_strings":["University of Illinois Springfield"],"affiliations":[{"raw_affiliation_string":"University of Illinois Springfield","institution_ids":["https://openalex.org/I79884896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101276097","display_name":"Jinyuan Sun","orcid":"https://orcid.org/0000-0002-3674-6846"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinyuan Stella Sun","raw_affiliation_strings":["The University of Tennessee, Knoxville"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee, Knoxville","institution_ids":["https://openalex.org/I75027704"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101687908"],"corresponding_institution_ids":["https://openalex.org/I75027704"],"apc_list":null,"apc_paid":null,"fwci":1.5609,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.83620906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7344239354133606},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6810656785964966},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.5717607736587524},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.55329430103302},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5493729114532471},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5430641770362854},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.5272311568260193},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5249961614608765},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5249804854393005},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46831732988357544},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4536915421485901},{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.43863797187805176},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4166649878025055},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.25358274579048157},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17226549983024597}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7344239354133606},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6810656785964966},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.5717607736587524},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.55329430103302},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5493729114532471},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5430641770362854},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.5272311568260193},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5249961614608765},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5249804854393005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46831732988357544},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4536915421485901},{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.43863797187805176},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4166649878025055},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.25358274579048157},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17226549983024597},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm47815.2020.9303013","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm47815.2020.9303013","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2098750759","https://openalex.org/W2121352581","https://openalex.org/W2148212699","https://openalex.org/W2212529815","https://openalex.org/W2243397390","https://openalex.org/W2312446965","https://openalex.org/W2754034320","https://openalex.org/W2776990447","https://openalex.org/W2889751219","https://openalex.org/W2912843585","https://openalex.org/W2953739815","https://openalex.org/W2963098487","https://openalex.org/W2963207607","https://openalex.org/W2964153729","https://openalex.org/W2964351981","https://openalex.org/W2997389590","https://openalex.org/W3005548505","https://openalex.org/W3011678299","https://openalex.org/W3165880105","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6772132639","https://openalex.org/W6775235190"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3009622996","https://openalex.org/W3203790781","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480","https://openalex.org/W2997056298"],"abstract_inverted_index":{"Energy":[0],"theft":[1,16,55,90],"causes":[2],"large":[3],"economic":[4],"losses":[5],"to":[6,37,60,76,83,118],"utility":[7],"companies":[8],"around":[9],"the":[10,32,49,74,87,121],"world.":[11],"In":[12,63],"recent":[13],"years,":[14],"energy":[15,54,89],"detection":[17,40,56,124],"approaches":[18],"based":[19,102],"on":[20,103],"machine":[21],"learning":[22],"(ML)":[23],"techniques,":[24],"especially":[25],"neural":[26,100],"networks,":[27],"are":[28,57],"becoming":[29],"popular":[30],"in":[31,43],"research":[33],"community":[34],"and":[35],"shown":[36],"achieve":[38],"state-of-the-art":[39],"performance.":[41],"However,":[42],"this":[44],"work,":[45],"we":[46,65],"demonstrate":[47,112],"that":[48,72,113],"well-trained":[50],"ML":[51,88,122],"models":[52],"for":[53,127],"highly":[58],"vulnerable":[59],"adversarial":[61,68],"attacks.":[62],"particular,":[64],"design":[66],"an":[67],"measurement":[69],"generation":[70],"approach":[71,95,115],"enables":[73],"attacker":[75],"report":[77],"extremely":[78],"low":[79],"power":[80],"consumption":[81],"measurements":[82],"utilities":[84],"while":[85],"bypassing":[86],"detection.":[91],"We":[92],"evaluate":[93],"our":[94,114],"with":[96],"three":[97],"kinds":[98],"of":[99],"networks":[101],"a":[104],"real-world":[105],"smart":[106],"meter":[107],"dataset.":[108],"The":[109],"evaluation":[110],"results":[111],"is":[116],"able":[117],"significantly":[119],"decrease":[120],"models'":[123],"accuracy,":[125],"even":[126],"black-box":[128],"attackers.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
