{"id":"https://openalex.org/W7125219620","doi":"https://doi.org/10.15837/ijccc.2026.1.7409","title":"Interpretable Deep Learning using Kolmogorov\u2013Arnold Networks for Energy Theft Detection","display_name":"Interpretable Deep Learning using Kolmogorov\u2013Arnold Networks for Energy Theft Detection","publication_year":2026,"publication_date":"2026-01-21","ids":{"openalex":"https://openalex.org/W7125219620","doi":"https://doi.org/10.15837/ijccc.2026.1.7409"},"language":null,"primary_location":{"id":"doi:10.15837/ijccc.2026.1.7409","is_oa":true,"landing_page_url":"https://doi.org/10.15837/ijccc.2026.1.7409","pdf_url":"https://univagora.ro/jour/index.php/ijccc/article/download/7409/2500","source":{"id":"https://openalex.org/S147751515","display_name":"International Journal of Computers Communications & Control","issn_l":"1841-9836","issn":["1841-9836","1841-9844"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314650","host_organization_name":"Agora University","host_organization_lineage":["https://openalex.org/P4310314650"],"host_organization_lineage_names":["Agora University"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"INTERNATIONAL JOURNAL OF COMPUTERS  COMMUNICATIONS &amp; CONTROL","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://univagora.ro/jour/index.php/ijccc/article/download/7409/2500","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123458445","display_name":"Bogdan Constantin Neagu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108695","display_name":"Gheorghe Asachi Technical University of Ia\u0219i","ror":"https://ror.org/014zxnz40","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210108695"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Bogdan Constantin Neagu","raw_affiliation_strings":["Gheoghe Asachi Technical University of Iasi, Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Gheoghe Asachi Technical University of Iasi, Romania","institution_ids":["https://openalex.org/I4210108695"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123470623","display_name":"Adi Aurelian Gugiuman","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108695","display_name":"Gheorghe Asachi Technical University of Ia\u0219i","ror":"https://ror.org/014zxnz40","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210108695"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Adi Aurelian Gugiuman","raw_affiliation_strings":["Gheorghe Asachi Technical University of Ia\u0219i, Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Gheorghe Asachi Technical University of Ia\u0219i, Romania","institution_ids":["https://openalex.org/I4210108695"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123530120","display_name":"Gheorghe Grigoras","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108695","display_name":"Gheorghe Asachi Technical University of Ia\u0219i","ror":"https://ror.org/014zxnz40","country_code":"RO","type":"education","lineage":["https://openalex.org/I4210108695"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Gheorghe Grigoras","raw_affiliation_strings":["Gheorghe Asachi Technical University of Ia\u0219i, Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Gheorghe Asachi Technical University of Ia\u0219i, Romania","institution_ids":["https://openalex.org/I4210108695"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069522745","display_name":"Attila Sim\u00f3","orcid":"https://orcid.org/0000-0002-7212-9706"},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Attila Simo","raw_affiliation_strings":["Politehnica University Timi\u015foara, Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Politehnica University Timi\u015foara, Romania","institution_ids":["https://openalex.org/I3122695212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001553076","display_name":"Simona Dzi\u0163ac","orcid":"https://orcid.org/0000-0001-5325-2584"},"institutions":[{"id":"https://openalex.org/I162871001","display_name":"University of Oradea","ror":"https://ror.org/00wzhv093","country_code":"RO","type":"education","lineage":["https://openalex.org/I162871001"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Simona Dzitac","raw_affiliation_strings":["University of Oradea, Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Oradea, Romania","institution_ids":["https://openalex.org/I162871001"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123458445"],"corresponding_institution_ids":["https://openalex.org/I4210108695"],"apc_list":{"value":500,"currency":"EUR","value_usd":539},"apc_paid":{"value":500,"currency":"EUR","value_usd":539},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11908254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10603","display_name":"Smart Grid Energy Management","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.907800018787384},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7562000155448914},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6636000275611877},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5781000256538391},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5073000192642212},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4562999904155731},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.33320000767707825},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.3183000087738037}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.907800018787384},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817799985408783},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7562000155448914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6807000041007996},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6636000275611877},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5781000256538391},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5688999891281128},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5073000192642212},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4562999904155731},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4456999897956848},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.33320000767707825},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.3183000087738037},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C97256817","wikidata":"https://www.wikidata.org/wiki/Q1462316","display_name":"Spurious relationship","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.29249998927116394},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C199163554","wikidata":"https://www.wikidata.org/wiki/Q1681619","display_name":"Univariate","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.15837/ijccc.2026.1.7409","is_oa":true,"landing_page_url":"https://doi.org/10.15837/ijccc.2026.1.7409","pdf_url":"https://univagora.ro/jour/index.php/ijccc/article/download/7409/2500","source":{"id":"https://openalex.org/S147751515","display_name":"International Journal of Computers Communications & Control","issn_l":"1841-9836","issn":["1841-9836","1841-9844"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314650","host_organization_name":"Agora University","host_organization_lineage":["https://openalex.org/P4310314650"],"host_organization_lineage_names":["Agora University"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"INTERNATIONAL JOURNAL OF COMPUTERS  COMMUNICATIONS &amp; CONTROL","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.15837/ijccc.2026.1.7409","is_oa":true,"landing_page_url":"https://doi.org/10.15837/ijccc.2026.1.7409","pdf_url":"https://univagora.ro/jour/index.php/ijccc/article/download/7409/2500","source":{"id":"https://openalex.org/S147751515","display_name":"International Journal of Computers Communications & Control","issn_l":"1841-9836","issn":["1841-9836","1841-9844"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314650","host_organization_name":"Agora University","host_organization_lineage":["https://openalex.org/P4310314650"],"host_organization_lineage_names":["Agora University"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"INTERNATIONAL JOURNAL OF COMPUTERS  COMMUNICATIONS &amp; CONTROL","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320318250","display_name":"Universitatea Tehnic\u0103 \u201eGheorghe Asachi\u201d din Ia\u015fi","ror":"https://ror.org/014zxnz40"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125219620.pdf","grobid_xml":"https://content.openalex.org/works/W7125219620.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,70,145,195],"increasing":[1],"availability":[2],"of":[3,72,101,115],"high-resolution":[4],"metering":[5],"data":[6,176],"has":[7],"positioned":[8],"deep":[9,48,201],"learning":[10,83,202],"as":[11,98,133],"a":[12,99,134,159,205],"powerful":[13],"tool":[14],"for":[15,51,139,214],"energy":[16,52,127,215],"theft":[17,53,128,216],"detection;":[18],"however,":[19],"most":[20],"existing":[21],"approaches":[22],"rely":[23],"on":[24,56,88,172],"black-box":[25,212],"models":[26,203],"that":[27,178,198],"lack":[28],"interpretability":[29,189],"and":[30,40,112,142,155,167,190,207],"require":[31],"large,":[32],"labeled":[33],"datasets,":[34],"limiting":[35],"their":[36],"applicability":[37],"in":[38,77],"regulated":[39],"safety-critical":[41],"environments.":[42],"This":[43,124],"paper":[44],"proposes":[45],"an":[46],"interpretable":[47],"learn-ing":[49],"approach":[50,147,181],"detection":[54,96,122,129,166,184],"based":[55],"Kolmogorov\u2013Arnold":[57],"Net-works":[58],"(KAN),":[59],"explicitly":[60],"designed":[61],"to":[62,120,130,210],"combine":[63],"non-linear":[64],"modeling":[65],"capability":[66],"with":[67,152],"feature-level":[68],"transparency.":[69],"novelty":[71],"the":[73,82,95,106,121,179],"proposed":[74,146,180],"method":[75],"lies":[76],"embedding":[78],"explainability":[79],"directly":[80],"into":[81],"architecture,":[84,163],"rather":[85],"than":[86],"relying":[87],"post":[89],"hoc":[90],"explanation":[91],"techniques.":[92],"By":[93],"representing":[94],"function":[97],"composition":[100],"learnable":[102],"univariate":[103],"spline":[104],"functions,":[105],"KAN-based":[107,153],"model":[108],"enables":[109],"direct":[110],"visualization":[111],"quantitative":[113],"interpretation":[114],"each":[116],"input":[117],"feature\u2019s":[118],"contribution":[119],"outcome.":[123],"property":[125],"al-lows":[126],"be":[131],"formulated":[132],"transparent":[135],"decision-support":[136],"process,":[137],"suitable":[138],"operational":[140],"deployment":[141,157],"regulatory":[143],"auditing.":[144],"integrates":[148],"engineered":[149],"consumption":[150],"features":[151],"inference":[154],"supports":[156],"within":[158],"distributed":[160],"edge":[161],"in-telligence":[162],"enabling":[164],"low-latency":[165],"privacy-aware":[168],"processing.":[169],"Experimental":[170],"evaluation":[171],"representative":[173],"low-voltage":[174],"network":[175],"demonstrates":[177],"achieves":[182],"competitive":[183],"accuracy":[185],"while":[186],"significantly":[187],"improving":[188],"robustness":[191],"under":[192],"prosumer-induced":[193],"variability.":[194],"results":[196],"confirm":[197],"inherently":[199],"interpreta-ble":[200],"represent":[204],"viable":[206],"effective":[208],"alternative":[209],"con-ventional":[211],"techniques":[213],"detection.":[217]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-01-22T00:00:00"}
