{"id":"https://openalex.org/W3000569831","doi":"https://doi.org/10.1109/tifs.2020.2965276","title":"Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids","display_name":"Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3000569831","doi":"https://doi.org/10.1109/tifs.2020.2965276","mag":"3000569831"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2020.2965276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.2965276","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101835164","display_name":"Yang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101554099","display_name":"Ting Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Liu","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060526586","display_name":"Hong Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Sun","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008237643","display_name":"Kehuan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kehuan Zhang","raw_affiliation_strings":["Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101801555","display_name":"Pengfei Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Liu","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101835164"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":3.5961,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.93496744,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"15","issue":null,"first_page":"2453","last_page":"2468"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7748944163322449},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7672548294067383},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.7430105209350586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6538270115852356},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.5975397825241089},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4792194962501526},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07822614908218384}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7748944163322449},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7672548294067383},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.7430105209350586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6538270115852356},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.5975397825241089},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4792194962501526},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07822614908218384},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2020.2965276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.2965276","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G1067324075","display_name":null,"funder_award_id":"U1736205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1905943838","display_name":null,"funder_award_id":"61632015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4938631274","display_name":null,"funder_award_id":"U1766215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5206708238","display_name":null,"funder_award_id":"2018YFB0803501","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6387986177","display_name":null,"funder_award_id":"61721002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8216081277","display_name":null,"funder_award_id":"61772408","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1550953152","https://openalex.org/W1604040248","https://openalex.org/W1686631693","https://openalex.org/W1979382254","https://openalex.org/W2021042716","https://openalex.org/W2031740014","https://openalex.org/W2079697937","https://openalex.org/W2081506432","https://openalex.org/W2108558074","https://openalex.org/W2126387328","https://openalex.org/W2154646400","https://openalex.org/W2160625801","https://openalex.org/W2161160710","https://openalex.org/W2162112159","https://openalex.org/W2169671599","https://openalex.org/W2212529815","https://openalex.org/W2279729589","https://openalex.org/W2312446965","https://openalex.org/W2400418686","https://openalex.org/W2470281051","https://openalex.org/W2514490820","https://openalex.org/W2539651221","https://openalex.org/W2562586545","https://openalex.org/W2614222692","https://openalex.org/W2730936454","https://openalex.org/W2746431867","https://openalex.org/W2754034320","https://openalex.org/W2858418091","https://openalex.org/W2887464323","https://openalex.org/W2948546254","https://openalex.org/W6632876648","https://openalex.org/W6636219503","https://openalex.org/W6637153378","https://openalex.org/W6712306037"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W3048799479","https://openalex.org/W2779961139","https://openalex.org/W3006507989","https://openalex.org/W4240241597","https://openalex.org/W2763500028","https://openalex.org/W4240288358","https://openalex.org/W4280617453","https://openalex.org/W4226451589"],"abstract_inverted_index":{"With":[0],"the":[1,7,24,28,32,40,59,76,89,100,114,132,158,163,175,183,189],"development":[2],"of":[3,43,127,134],"demand":[4],"response":[5],"technologies,":[6],"pricing":[8,17,20,34],"scheme":[9],"in":[10],"smart":[11,72,117,128,139,155],"grids":[12,140],"is":[13,66,81],"moving":[14],"from":[15],"flat":[16],"to":[18,74,112,130],"multiple":[19],"(MP),":[21],"which":[22],"facilitates":[23],"energy":[25],"saving":[26],"at":[27,98,192],"consumer":[29],"side.":[30],"However,":[31],"flexible":[33],"policy":[35],"may":[36],"be":[37],"exploited":[38],"for":[39],"stealthy":[41],"reduction":[42],"utility":[44,77],"bills.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,92,120,144],"present":[50],"a":[51,84,169,193],"hidden":[52],"electricity":[53,80],"theft":[54],"(HET)":[55],"attack":[56,101,115,159,176],"by":[57],"exploiting":[58],"emerging":[60],"MP":[61],"scheme.":[62],"The":[63],"basic":[64],"idea":[65],"that":[67,78,174],"attackers":[68],"can":[69],"tamper":[70],"with":[71],"meters":[73,129],"cheat":[75],"some":[79],"consumed":[82],"under":[83],"lower":[85],"price.":[86],"To":[87,137],"construct":[88],"HET":[90,135,142],"attack,":[91],"propose":[93,145],"an":[94],"optimization":[95],"problem":[96],"aiming":[97],"maximizing":[99],"profits":[102],"while":[103],"evading":[104],"current":[105],"detection":[106,149],"methods,":[107],"and":[108,122,148,161,182],"design":[109],"two":[110],"algorithms":[111],"conduct":[113],"on":[116,154,168],"meters.":[118],"Moreover,":[119],"disclose":[121],"exploit":[123],"several":[124,146],"new":[125],"vulnerabilities":[126],"demonstrate":[131,173],"feasibility":[133],"attacks.":[136],"protect":[138],"against":[141],"attacks,":[143],"defense":[147],"countermeasures,":[150],"including":[151],"selective":[152],"protection":[153],"meters,":[156],"limiting":[157],"cycle,":[160],"updating":[162],"billing":[164],"mechanism.":[165],"Extensive":[166],"experiments":[167],"real":[170],"data":[171],"set":[172],"could":[177,186],"cause":[178],"high":[179],"economic":[180],"losses,":[181],"proposed":[184],"countermeasures":[185],"effectively":[187],"mitigate":[188],"attack's":[190],"impact":[191],"low":[194],"cost.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":4}],"updated_date":"2026-01-28T23:14:49.684275","created_date":"2025-10-10T00:00:00"}
