{"id":"https://openalex.org/W4312310559","doi":"https://doi.org/10.1109/tsg.2022.3214194","title":"<i>p2Detect</i>: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid","display_name":"<i>p2Detect</i>: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid","publication_year":2022,"publication_date":"2022-10-12","ids":{"openalex":"https://openalex.org/W4312310559","doi":"https://doi.org/10.1109/tsg.2022.3214194"},"language":"en","primary_location":{"id":"doi:10.1109/tsg.2022.3214194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2022.3214194","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007769883","display_name":"Liqiang Wu","orcid":"https://orcid.org/0000-0002-4314-3592"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liqiang Wu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079764771","display_name":"Heyuan Shi","orcid":"https://orcid.org/0000-0002-9040-7247"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heyuan Shi","raw_affiliation_strings":["Big Data Institute, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Big Data Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032664581","display_name":"Shaojing Fu","orcid":"https://orcid.org/0000-0002-8155-7462"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaojing Fu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057427094","display_name":"Yuchuan Luo","orcid":"https://orcid.org/0000-0002-0720-4925"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchuan Luo","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026694481","display_name":"Ming Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Xu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007769883"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":1.4774,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.81847071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"14","issue":"3","first_page":"2301","last_page":"2312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.9408000111579895,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8188579082489014},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7628171443939209},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6357835531234741},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6086094975471497},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5919126272201538},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5691923499107361},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5408281683921814},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.49635010957717896},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47346845269203186},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43981337547302246},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4233374297618866},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.42258143424987793},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37645432353019714},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3542240858078003},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3371118903160095},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2627566456794739},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.21980178356170654},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13665610551834106}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8188579082489014},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7628171443939209},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6357835531234741},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6086094975471497},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5919126272201538},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5691923499107361},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5408281683921814},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.49635010957717896},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47346845269203186},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43981337547302246},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4233374297618866},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.42258143424987793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37645432353019714},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3542240858078003},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3371118903160095},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2627566456794739},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.21980178356170654},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13665610551834106},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsg.2022.3214194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2022.3214194","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G247340839","display_name":null,"funder_award_id":"62102452","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4429473938","display_name":null,"funder_award_id":"61872372","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4485556575","display_name":null,"funder_award_id":"62177046","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5214302469","display_name":null,"funder_award_id":"2018YFB0204301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5319654362","display_name":null,"funder_award_id":"62202500","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6763635431","display_name":null,"funder_award_id":"52177067","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7482821243","display_name":null,"funder_award_id":"62072466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7698119313","display_name":null,"funder_award_id":"62102429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7836098811","display_name":null,"funder_award_id":"62172436","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8380169000","display_name":null,"funder_award_id":"62102422","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W410025","https://openalex.org/W133884053","https://openalex.org/W1557590790","https://openalex.org/W2026594926","https://openalex.org/W2121352581","https://openalex.org/W2226167778","https://openalex.org/W2584617969","https://openalex.org/W2585580772","https://openalex.org/W2735058060","https://openalex.org/W2765200655","https://openalex.org/W2768174108","https://openalex.org/W2776990447","https://openalex.org/W2889751219","https://openalex.org/W2908284682","https://openalex.org/W2910992412","https://openalex.org/W2921261293","https://openalex.org/W2952826183","https://openalex.org/W2953404784","https://openalex.org/W2955401130","https://openalex.org/W3005548505","https://openalex.org/W3087775622","https://openalex.org/W3096424616","https://openalex.org/W3141585064","https://openalex.org/W3168249116","https://openalex.org/W3201079611","https://openalex.org/W3212877473","https://openalex.org/W3213906859","https://openalex.org/W4288057742","https://openalex.org/W6668990524","https://openalex.org/W6717974185","https://openalex.org/W6732586565","https://openalex.org/W6748082217","https://openalex.org/W6760122430","https://openalex.org/W6776906142"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W3028898974","https://openalex.org/W2384844478","https://openalex.org/W1755636270","https://openalex.org/W3192883662","https://openalex.org/W4386907889","https://openalex.org/W2912162584","https://openalex.org/W4388894064"],"abstract_inverted_index":{"Electricity":[0],"Theft":[1],"Detection":[2,74],"(ETD)":[3],"based":[4,103],"on":[5,85,104,161,173],"deep":[6],"learning":[7],"can":[8],"detect":[9],"abnormal":[10],"electricity":[11],"consumption":[12],"behaviors":[13],"by":[14,73,81],"analyzing":[15],"user":[16],"historical":[17],"data.":[18,62],"However,":[19],"existing":[20],"ETD":[21,54,118,170],"schemes":[22],"conduct":[23],"neural":[24,57],"network":[25,58],"inferencing":[26,59,119,156],"in":[27,65],"plaintext":[28],"without":[29,123],"strong":[30,189],"privacy":[31,38,190],"guarantees,":[32],"moreover,":[33],"none":[34],"has":[35],"considered":[36],"the":[37,159],"of":[39,87,158],"proprietary":[40],"models":[41],"from":[42],"electric":[43],"utilities.":[44],"To":[45],"address":[46],"those":[47],"issues,":[48],"we":[49,93],"introduce":[50],"p2Detect,":[51],"a":[52,66,95,151],"privacy-preserving":[53,115],"scheme":[55],"via":[56],"over":[60,120],"encrypted":[61,121],"p2Detect":[63,165,187],"works":[64],"two-party":[67],"setting":[68],"where":[69,148],"model":[70,97,131,160],"is":[71,150,182],"held":[72,80],"Server":[75,83],"(DS)":[76],"and":[77,98,107,180,195],"data":[78],"are":[79],"Edge":[82],"(ES)":[84],"behalf":[86],"multiple":[88],"Smart":[89],"Meters":[90],"(SM).":[91],"First,":[92],"design":[94],"homomorphic-encryption-friendly":[96],"its":[99],"corresponding":[100],"training":[101],"methods":[102],"region":[105],"search":[106],"clustering;":[108],"Second,":[109],"our":[110],"customized":[111],"cryptographic":[112],"protocols":[113],"enable":[114],"yet":[116],"efficient":[117],"data,":[122],"revealing":[124,130],"private":[125],"inputs":[126],"to":[127,133,168],"DS":[128,179],"or":[129],"parameters":[132],"ES.":[134],"The":[135],"performance":[136],"evaluations":[137],"demonstrate:":[138],"(i)":[139],"Model":[140],"optimizations":[141],"achieve":[142],"AUC":[143,149],"as":[144,146],"high":[145,193],"0.763,":[147],"robust":[152],"evaluation":[153],"criterion":[154],"for":[155],"ability":[157],"unbalanced":[162],"dataset.":[163],"(ii)":[164],"takes":[166],"73.3ms":[167],"execute":[169],"per":[171,184],"SM":[172],"average.":[174],"(iii)":[175],"Communication":[176],"cost":[177],"between":[178],"ES":[181],"196.76KB":[183],"SM.":[185],"Therefore,":[186],"preserves":[188],"while":[191],"maintaining":[192],"accuracy":[194],"efficiency.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
