RNN-BiLSTM-CRF based amalgamated deep learning model for electricity theft detection to secure smart grids

View article
PeerJ Computer Science

Main article text

 

Introduction

  • Introduction of an ensemble model, RNN-BLSTM-CRF, for electricity theft detection, combining a Recurrent neural network and a Bidirectional Long Short-Term Memory.

  • Utilization of both daily and weekly electricity consumption data, with the wide component incorporating daily data and the deep component incorporating weekly data.

  • Comparison with other classification models, demonstrating the superior accuracy of the proposed model.

Literature review

Materials and Methods

Data collection

Data preprocessing

where yj represents the value that is absent, yj1 represents the value that came before it, and yj+1 represents the value that will come after it. In addition, we used an empirical rule to recover the erroneous data, which is known as the three-sigma rule. This rule makes use of three different standard deviation methodologies to recover the erroneous data.

where yj stands for the incorrect value, std(y) represents the standard deviation of the data, and avg(y) represents the average of the information that was used.

where min(y) indicates the absolute least value and max(y) indicates the absolute greatest value.

Data balancing

Feature extraction

where W and b, respectively, describe the weights and biases that are applied between the items.

BiLSTM-CRF framework

Results

Baseline method

  • Baseline 1: Ullah et al. (2022) proposed a technique that were based on AdaBoost, AlexNet and Artificial Bee models.

  • Baseline 2: Ahir & Chakraborty (2022) proposed a technique for detection of electricity theft using context-aware approach and pattern based approach.

  • Baseline 3: Hasan et al. (2019) presented a method based on deep CNN and LSTM computations for the detection of power theft in smart grids.

Performance matrices

F-measure

Matthews correlation coefficient (MCC)

Binary cross-entropy

Experimentation results

Comparison to existing models

Conclusions

Supplemental Information

Model Code.

This model is developed in Python.

DOI: 10.7717/peerj-cs.1872/supp-1

Additional Information and Declarations

Competing Interests

The authors declare that they have no competing interests.

Author Contributions

Aqsa Khalid conceived and designed the experiments, prepared figures and/or tables, and approved the final draft.

Ghulam Mustafa conceived and designed the experiments, performed the experiments, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.

Muhammad Rizwan Rashid Rana performed the experiments, performed the computation work, authored or reviewed drafts of the article, and approved the final draft.

Saeed M. Alshahrani analyzed the data, prepared figures and/or tables, and approved the final draft.

Mofadal Alymani analyzed the data, authored or reviewed drafts of the article, and approved the final draft.

Data Availability

The following information was supplied regarding data availability:

The proposed model code is available in the Supplemental File.

Funding

This work was supported by the Deanship of Scientific Research at Shaqra University. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

6 Citations 887 Views 70 Downloads

Your institution may have Open Access funds available for qualifying authors. See if you qualify

Publish for free

Comment on Articles or Preprints and we'll waive your author fee
Learn more

Five new journals in Chemistry

Free to publish • Peer-reviewed • From PeerJ
Find out more