{"id":"https://openalex.org/W2616866055","doi":"https://doi.org/10.1109/tsusc.2017.2705192","title":"Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment","display_name":"Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment","publication_year":2017,"publication_date":"2017-05-17","ids":{"openalex":"https://openalex.org/W2616866055","doi":"https://doi.org/10.1109/tsusc.2017.2705192","mag":"2616866055"},"language":"en","primary_location":{"id":"doi:10.1109/tsusc.2017.2705192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2017.2705192","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101914475","display_name":"Yuchen Zhou","orcid":"https://orcid.org/0000-0003-4200-1629"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yuchen Zhou","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355822","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0002-2190-0281"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031580282","display_name":"Shiyan Hu","orcid":"https://orcid.org/0000-0003-2512-0634"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shiyan Hu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI","institution_ids":["https://openalex.org/I11957088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101914475"],"corresponding_institution_ids":["https://openalex.org/I11957088"],"apc_list":null,"apc_paid":null,"fwci":0.7273,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.72701803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"3","issue":"1","first_page":"16","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-center","display_name":"Data center","score":0.6488053798675537},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6094313263893127},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6023688316345215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5967959761619568},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5433070063591003},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4869552552700043},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4737609028816223},{"id":"https://openalex.org/keywords/electricity-meter","display_name":"Electricity meter","score":0.45071303844451904},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2700931131839752},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.19174811244010925},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18571776151657104},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.13643673062324524},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10048845410346985},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08958110213279724}],"concepts":[{"id":"https://openalex.org/C153740404","wikidata":"https://www.wikidata.org/wiki/Q671224","display_name":"Data center","level":2,"score":0.6488053798675537},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6094313263893127},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6023688316345215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5967959761619568},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5433070063591003},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4869552552700043},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4737609028816223},{"id":"https://openalex.org/C67172668","wikidata":"https://www.wikidata.org/wiki/Q622756","display_name":"Electricity meter","level":3,"score":0.45071303844451904},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2700931131839752},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.19174811244010925},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18571776151657104},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.13643673062324524},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10048845410346985},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08958110213279724},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsusc.2017.2705192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2017.2705192","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:michigantech-p-30439","is_oa":false,"landing_page_url":"https://digitalcommons.mtu.edu/michigantech-p/11137","pdf_url":null,"source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Michigan Tech Publications, Part 1","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1590860274","https://openalex.org/W1995587272","https://openalex.org/W1998697412","https://openalex.org/W2076507624","https://openalex.org/W2109972663","https://openalex.org/W2139041001","https://openalex.org/W2183790144","https://openalex.org/W2275132005","https://openalex.org/W2276924220","https://openalex.org/W2291620186","https://openalex.org/W2294937515","https://openalex.org/W2295733304","https://openalex.org/W2313936714","https://openalex.org/W2487348337","https://openalex.org/W2999424480","https://openalex.org/W4243563432","https://openalex.org/W6635247820"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2566006169","https://openalex.org/W2987774938","https://openalex.org/W632915154","https://openalex.org/W3188789063","https://openalex.org/W4214747436","https://openalex.org/W1893812361","https://openalex.org/W2998055095","https://openalex.org/W2383575452"],"abstract_inverted_index":{"High":[0],"performance":[1],"data":[2,15,22,79,146,199,236,269,285],"centers":[3,16,23],"serve":[4],"as":[5],"the":[6,9,34,39,66,78,83,87,90,118,145,158,178,198,214,235,239,252,259,263,284,317],"backbone":[7],"of":[8,36,65,86,97,110,120,130,153,168,254],"prevailing":[10],"cloud":[11],"computing":[12],"paradigm.":[13],"Among":[14],"with":[17,316,345],"different":[18],"operational":[19],"structures,":[20],"multi-tenant":[21,268],"(MTDCs)":[24],"are":[25,43],"increasingly":[26],"popular":[27],"among":[28],"various":[29,46],"internet":[30],"service":[31],"providers":[32],"for":[33,144,207,230,356],"ease":[35],"deployment.":[37],"Despite":[38,123],"offered":[40],"benefits,":[41],"MTDCs":[42],"vulnerable":[44],"to":[45,61,81,149,156,176,288,297,312],"cyberattacks.":[47],"An":[48],"important":[49],"cyberattack":[50],"is":[51,114,172,204,228,243,258],"energy":[52,84,98,104,111,134,137,169,183,264,300,339,358],"theft":[53,105,138,170,265,301],"which":[54,113,161],"can":[55,70,188,347],"be":[56,71,142,189,313],"launched":[57],"by":[58],"malicious":[59],"tenants":[60,155,311],"reduce":[62],"monetary":[63],"cost":[64,180],"electricity":[67],"consumption.":[68],"It":[69,187],"achieved":[72],"through":[73,191],"attacking":[74],"smart":[75,151],"meters":[76],"in":[77,108,117,181,185,197,213,267,294],"center":[80,147,200,286],"undercount":[82],"usage":[85],"attacker.":[88],"Since":[89],"attackers":[91],"could":[92,162],"consume":[93],"an":[94,173,220,295],"excessive":[95,164],"amount":[96],"without":[99],"incurring":[100],"elevated":[101],"utility":[102],"cost,":[103],"discourages":[106],"frugality":[107],"terms":[109],"consumption,":[112],"highly":[115],"undesirable":[116],"era":[119],"sustainable":[121],"computing.":[122],"fruitful":[124],"research":[125],"results":[126,273],"on":[127],"MTDCs,":[128],"none":[129],"existing":[131],"works":[132],"address":[133],"theft.":[135,340,359],"When":[136],"occurs,":[139],"it":[140],"might":[141],"necessary":[143],"operator":[148],"examine":[150],"meter":[152],"all":[154,299],"find":[157],"compromised":[159],"ones":[160],"induce":[163],"labor":[165,179],"cost.":[166],"Localization":[167],"detection":[171,209,331,351],"effective":[174],"way":[175],"limit":[177],"detecting":[182],"thefts":[184],"MTDCs.":[186],"facilitated":[190],"deploying":[192],"Digital":[193],"Protective":[194],"Relays":[195],"(DPR)":[196],"where":[201,238],"a":[202,205,289,349],"DPR":[203,304,334,344],"device":[206],"fault":[208],"and":[210],"event":[211],"logging":[212],"power":[215],"system.":[216],"In":[217,341],"this":[218,257],"paper,":[219],"anomaly":[221,240],"rate":[222,241],"range":[223,242],"based":[224],"dynamic":[225],"programming":[226],"algorithm":[227,277],"proposed":[229],"inserting":[231],"minimal":[232],"DPRs":[233,282],"into":[234,283],"center,":[237],"computed":[244],"using":[245,325,333],"Minimum":[246],"Covariance":[247],"Determinant":[248],"(MCD)":[249],"algorithm.":[250,292,319],"To":[251],"best":[253],"our":[255,276,303],"knowledge,":[256],"first":[260],"work":[261],"addressing":[262],"issue":[266],"centers.":[270],"The":[271],"simulation":[272],"demonstrate":[274,323],"that":[275,324],"inserts":[278],"19.2":[279],"percent":[280,309],"less":[281,310],"compared":[287,315],"natural":[290],"baseline":[291,318],"Meanwhile,":[293],"attempt":[296],"identify":[298],"cases,":[302],"insertion":[305],"solution":[306],"requires":[307],"12.8":[308],"checked":[314],"More":[320],"importantly,":[321],"we":[322],"MCD":[326,346],"alone":[327,335],"cannot":[328,336],"achieve":[329,348],"accurate":[330],"while":[332],"handle":[337],"collusive":[338,357],"contrast,":[342],"integrating":[343],"high":[350],"accuracy":[352],"(of":[353],"97.6":[354],"percent)":[355]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
