{"id":"https://openalex.org/W3167354048","doi":"https://doi.org/10.1109/tii.2021.3089976","title":"A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models","display_name":"A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models","publication_year":2021,"publication_date":"2021-06-16","ids":{"openalex":"https://openalex.org/W3167354048","doi":"https://doi.org/10.1109/tii.2021.3089976","mag":"3167354048"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3089976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3089976","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/A_Covert_Electricity-Theft_Cyber-Attack_against_Machine_Learning-Based_Detection_Models/20651292","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026963407","display_name":"Lei Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Lei Cui","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101422551","display_name":"Lei Guo","orcid":"https://orcid.org/0000-0003-1559-6022"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Guo","raw_affiliation_strings":["College of Information and Computer, Taiyuan University of Technology, Shanxi, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Computer, Taiyuan University of Technology, Shanxi, China","institution_ids":["https://openalex.org/I9086337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012293028","display_name":"Longxiang Gao","orcid":"https://orcid.org/0000-0002-3026-7537"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Longxiang Gao","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054720605","display_name":"Borui Cai","orcid":"https://orcid.org/0000-0002-1216-5166"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Borui Cai","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029669009","display_name":"Yipeng Zhou","orcid":"https://orcid.org/0000-0003-1533-0865"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yipeng Zhou","raw_affiliation_strings":["Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5026963407"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":3.6559,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.93592729,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"18","issue":"11","first_page":"7824","last_page":"7833"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11220","display_name":"Water Systems and Optimization","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.754088282585144},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6408998966217041},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6380610466003418},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5133394598960876},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5098847150802612},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.46881937980651855},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.46421173214912415},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4614917039871216},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4395347237586975},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4229905903339386},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37114620208740234},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16510653495788574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.754088282585144},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6408998966217041},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6380610466003418},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5133394598960876},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5098847150802612},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.46881937980651855},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.46421173214912415},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4614917039871216},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4395347237586975},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4229905903339386},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37114620208740234},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16510653495788574},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tii.2021.3089976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3089976","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30154661","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20651292","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/A_Covert_Electricity-Theft_Cyber-Attack_against_Machine_Learning-Based_Detection_Models/20651292","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20651292","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/A_Covert_Electricity-Theft_Cyber-Attack_against_Machine_Learning-Based_Detection_Models/20651292","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G3493151380","display_name":null,"funder_award_id":"DP200101374","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G7957159631","display_name":null,"funder_award_id":"DP180102828","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1965765523","https://openalex.org/W2132050943","https://openalex.org/W2169671599","https://openalex.org/W2212529815","https://openalex.org/W2291620186","https://openalex.org/W2529785782","https://openalex.org/W2754034320","https://openalex.org/W2776990447","https://openalex.org/W2786918196","https://openalex.org/W2808351224","https://openalex.org/W2858418091","https://openalex.org/W2894817759","https://openalex.org/W2906301639","https://openalex.org/W2910992412","https://openalex.org/W2911528396","https://openalex.org/W2911981000","https://openalex.org/W2921261293","https://openalex.org/W2948546254","https://openalex.org/W2950782995","https://openalex.org/W2963440492","https://openalex.org/W2963612069","https://openalex.org/W3000569831","https://openalex.org/W3029534949","https://openalex.org/W3033406500","https://openalex.org/W3080847572","https://openalex.org/W3102477513","https://openalex.org/W4231400843","https://openalex.org/W4320013936","https://openalex.org/W6750745550","https://openalex.org/W6759580348","https://openalex.org/W6778411636"],"related_works":["https://openalex.org/W2523525694","https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2998642566","https://openalex.org/W2392682561","https://openalex.org/W57793151","https://openalex.org/W2362741838","https://openalex.org/W2804882289","https://openalex.org/W2727423897","https://openalex.org/W2497612952"],"abstract_inverted_index":{"The":[0],"advanced":[1,42],"metering":[2],"infrastructure":[3],"in":[4,54,71],"modern":[5],"networked":[6],"smart":[7,20,69],"homes":[8,21],"brings":[9],"various":[10],"advantages,":[11],"such":[12],"as":[13,102],"multiple":[14],"pricing":[15],"and":[16,27,86,120,128,145],"energy":[17,33],"scheduling.":[18],"However,":[19],"are":[22,50],"vulnerable":[23],"to":[24,58,96],"many":[25,38],"cyberattacks,":[26],"the":[28,59,103,141,165,180],"most":[29],"striking":[30],"one":[31],"is":[32,93],"theft.":[34],"Researchers":[35],"have":[36,106],"developed":[37],"countermeasures,":[39],"fostered":[40],"by":[41,99],"machine":[43],"learning":[44],"(ML)":[45],"techniques.":[46],"Nevertheless,":[47],"recent":[48],"advances":[49],"not":[51],"robust":[52],"enough":[53],"practice,":[55],"partially":[56],"due":[57],"vulnerabilities":[60],"of":[61,68,124],"employed":[62],"ML":[63],"algorithms.":[64],"Given":[65],"a":[66,76,134,151],"group":[67],"homes,":[70],"this":[72,115],"article,":[73],"we":[74,117,132,149],"present":[75],"covert":[77],"electricity":[78],"theft":[79],"strategy":[80],"through":[81],"mimicking":[82],"normal":[83],"consumption":[84,125],"patterns":[85],"compromising":[87],"neighboring":[88],"meters":[89],"concurrently.":[90],"Such":[91],"attack":[92,167],"almost":[94],"impossible":[95],"be":[97],"detected":[98],"existing":[100,170],"solutions":[101],"manipulated":[104],"data":[105],"little":[107],"deviation":[108],"against":[109],"honest":[110,146],"usage":[111],"records.":[112],"To":[113],"address":[114],"threat,":[116],"initially":[118],"identify":[119],"define":[121],"two":[122],"levels":[123],"deviations:":[126],"home-level":[127],"interpersonal-level,":[129],"respectively.":[130],"Then,":[131],"design":[133],"feature":[135],"extraction":[136],"scheme":[137],"that":[138,164],"can":[139],"capture":[140],"correlation":[142],"between":[143],"attacks":[144],"customers.":[147],"Finally,":[148],"develop":[150],"new":[152],"deep":[153],"learning-based":[154],"detection":[155,185],"model.":[156],"Extensive":[157],"experiments":[158],"based":[159],"on":[160],"real-world":[161],"datasets":[162],"show":[163],"presented":[166],"could":[168],"evade":[169],"mainstream":[171],"detectors":[172],"but":[173],"still":[174],"gain":[175],"high":[176],"profits.":[177],"In":[178],"addition,":[179],"proposed":[181],"countermeasure":[182],"outperforms":[183],"state-of-the-art":[184],"methods.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
