<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">892541</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2022.892541</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Edge Computing Based Electricity-Theft Detection of Low-Voltage Users</article-title>
<alt-title alt-title-type="left-running-head">Zheng et al.</alt-title>
<alt-title alt-title-type="right-running-head">Edge Computing Based Electricity-Theft Detection</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Zheng</surname>
<given-names>Yingjun</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chen</surname>
<given-names>Feng</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Yang</surname>
<given-names>Hongming</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Su</surname>
<given-names>Sheng</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1613555/overview"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>School of Electrical and Information Engineering</institution>, <institution>Changsha University of Science &#x26; Technology</institution>, <addr-line>Changsha</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Changsha Electric Power Corporations</institution>, <institution>State Grid of China</institution>, <addr-line>Changsha</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1063909/overview">Yunfei Mu</ext-link>, Tianjin University, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1716870/overview">Lin Zhu</ext-link>, The University of Tennessee, Knoxville, United States</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1064193/overview">Gaoqi Liang</ext-link>, Nanyang Technological University, Singapore</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1728532/overview">Jian Liu</ext-link>, Wuhan University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Sheng Su, <email>eessheng@163.com</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Smart Grids, a section of the journal Frontiers in Energy Research</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>08</day>
<month>06</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>10</volume>
<elocation-id>892541</elocation-id>
<history>
<date date-type="received">
<day>09</day>
<month>03</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>25</day>
<month>04</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Zheng, Chen, Yang and Su.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Zheng, Chen, Yang and Su</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Electricity theft of low voltage (LV) users could result not only in the escalation of power loss but also in dangerous electric shock. Since LV users are served by distribution transformers, electricity theft of an LV user will cause line loss escalation of the associated distribution serving zone (DTSZ). Therefore, it seems promising to identify anomaly users of electricity theft with a Granger causality test to find out the user causing an escalation of line loss in DTSZ with time series of users&#x2019; usage and line loss. However, meters of LV users in severe environments occasionally suffer from communication failure to upload metering data to the head end of advanced metering infrastructure (AMI), which could distort the daily electricity usage of the associate user. Consequently, it could cause false alarms unavoidably once we detect electricity theft with these distorted data. Since the distribution transformer unit (DTU) collects metering data of LV users within associate DTSZ without distortion, an edge computing&#x2013;based electricity theft detection approach is proposed in this article. The correlation between line loss of a DTSZ and electricity usage of anomaly users of electricity theft is first analyzed. Thereafter, the Granger causality test is used to identify anomaly users with authentic usage data with edge computing in DTU. Finally, the abnormal data and the data repaired by different missing data filling algorithms are used on the main station to detect electricity theft. Numerical simulation suggests that although missing data completion could recover information in missing data partially, it could result in notable false positive alarms in electricity theft, while the proposed method based on edge computing can completely eliminate the data distortion caused by communication failure.</p>
</abstract>
<kwd-group>
<kwd>electricity theft</kwd>
<kwd>communication failure</kwd>
<kwd>edge computing</kwd>
<kwd>missing data completion</kwd>
<kwd>distribution transformer terminal</kwd>
<kwd>attribution analysis</kwd>
</kwd-group>
<contract-sponsor id="cn001">National Natural Science Foundation of China<named-content content-type="fundref-id">10.13039/501100001809</named-content>
</contract-sponsor>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Electricity theft of low voltage (LV) users could cause substantial revenue loss to power utilities. Moreover, anomaly wire hooks result in numerous electric shocks to users. Therefore, it is highly preferred to identify anomaly LV users (<xref ref-type="bibr" rid="B27">Wang Y. et al., 2019</xref>; <xref ref-type="bibr" rid="B31">Zhang et al., 2019</xref>; <xref ref-type="bibr" rid="B16">Partha et al., 2020</xref>). Since there are millions of LV residential users with diversified usage patterns, it is rather difficult to identify anomaly ones of electricity theft, and electricity detection of LV users remains a difficulty in industrial applications (<xref ref-type="bibr" rid="B10">Li et al., 2018</xref>).</p>
<p>The extensive application of smart meters could provide substantial meter data on electricity usage, which can lay a solid foundation for data-driven electric theft detection. <xref ref-type="bibr" rid="B33">Zheng et al. (2019</xref>) detected electricity theft with maximum information coefficient and density peak fast clustering algorithm in combination. <xref ref-type="bibr" rid="B36">Zhuang et al. (2016</xref>) and <xref ref-type="bibr" rid="B21">Sun et al. (2018</xref>) detected electricity theft with fluctuation of multi-day usage, fluctuation of the SD of usage, and trend of usage with an improved outlier identification algorithm. Since extracted features play a key role in the precision of anomaly detection, a stacked de-correlation auto-encoder is employed (<xref ref-type="bibr" rid="B6">Hu et al., 2019</xref>) to extract highly condensed independent features. Thereafter, a support vector machine is used to identify anomaly users (<xref ref-type="bibr" rid="B6">Hu et al., 2019</xref>). Since power utilities have limited market crews for onsite inspection, a false positive rate (FPR) is key to evaluating the performance of electricity theft (<xref ref-type="bibr" rid="B9">Jin et al., 2022</xref>). To prevent false positives alarm, marketing crews implement onsite inspection of DTSZ with a high loss ratio above 8%. Since there is an underlying correlation between anomaly users of electricity theft and line loss of associated feeder, a Granger causality analysis&#x2013;based approach is proposed by <xref ref-type="bibr" rid="B8">Jin et al. (2020</xref>) to detect users who cause fluctuations in line loss. Since high line loss in a DTSZ is usually caused by electricity theft, once we detect electricity theft in DTSZ with a high loss rate, it could achieve a low false alarm rate (<xref ref-type="bibr" rid="B23">Tang et al., 2020</xref>).</p>
<p>It should be pointed out that the meters of LV users communicating <italic>via</italic> power line communication (PLC) could suffer failure occasionally. Once a smart meter fails to upload its usage data to the head end of AMI, it will upload it in the following days. The head end calculates the daily line loss of a DTSZ according to the daily served electricity and accumulation of all users&#x2019; daily usage. Line loss of the DTSZ escalates on the days when the meter fails and declines to even below zero in the following days when meters upload usage data of communication failure and that very day. Existing approaches to electricity detection identify anomaly users with accurate metering data, while false data cause misleading results inevitably.</p>
<p>To overcome the problem of detecting electricity theft with metering data in the head end of AMI, an edge computing&#x2013;based electricity detection approach is proposed in this article. The rest of the article is organized as follows. Existing approaches to missing data completion are investigated in <xref ref-type="sec" rid="s2">Section 2</xref>. Correlation of anomaly users&#x2019; usage and line loss of associate DTSZ in investigated and edge computing&#x2013;based approach is developed in <xref ref-type="sec" rid="s3">Section 3</xref>. Numerical simulation of real-world metering data is analyzed in <xref ref-type="sec" rid="s4">Section 4</xref> to demonstrate the superiority of the proposed method to that of data restored with various missing data completion algorithms. <xref ref-type="sec" rid="s5">Section 5</xref> concludes the article.</p>
</sec>
<sec id="s2">
<title>2 Electricity Missing Data Completion Method</title>
<p>Metering data could suffer interference and failure in the process of data acquisition, conversion, and communication, and missing data and false data are common for industrial applications of power utilities. Traditionally, power systems are measured with redundancy. Therefore, some missing data or false data can be identified and corrected with state estimation. There are similar missing data and false data in AMI. However, since these data are not closely coupled with each other, they can be corrected and filled with state estimation (<xref ref-type="bibr" rid="B30">Yang Y. et al., 2020</xref>). Traditionally, missing data and false data of AMI are filled or corrected with the mean of previous and following data, interpolation mode, closest distance data, regression model, and maximum expectation based algorithm (<xref ref-type="bibr" rid="B22">Sundararajan et al., 2019</xref>). However, most of them implement data completion with statistic-based and mechanism-based models and neglect underlying features of a single time series and correlation among various time series. Data completion with these approaches is not as satisfying as expected (<xref ref-type="bibr" rid="B1">Chen et al., 2019</xref>; <xref ref-type="bibr" rid="B29">Yang et al., 2019</xref>).</p>
<p>Since missing data is rather common in various fields, numerous researchers have researched missing data completion and achieved notable progress in recent years (<xref ref-type="bibr" rid="B19">Siamkaz et al., 2018</xref>; <xref ref-type="bibr" rid="B20">Song et al., 2019</xref>). Based on the inertial effect of the measured data, Ruan deduced coarse values of pre-attack measurements. Then, based on the deduced coarse values and suggested state bounds, an optimization model is proposed to recover the measurements (<xref ref-type="bibr" rid="B17">Ruan et al., 2022</xref>). The matrix filling method used in the Netflix recommendation system is established on the premise that the data matrix has low rank and sparsity. It could reconstruct the original matrix precisely in the case of partial loss of original data. The low-rank matrix completion theory is based on the low rank of the data to recover the missing data. It takes matrix rank minimization as the objective function. The classical mathematical model of data recovery is expressed as follows.<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:munder>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
<mml:mi>K</mml:mi>
</mml:munder>
<mml:mtext>&#xa0;&#xa0;</mml:mtext>
<mml:msub>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x2217;</mml:mo>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>s</mml:mtext>
<mml:mtext>.t</mml:mtext>
<mml:mtext>.&#xa0;&#xa0;</mml:mtext>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mtext>&#x3a9;</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>M</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mtext>&#x3a9;</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>
<disp-formula id="e2">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mtext>&#x3a9;</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>M</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>M</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mtext>&#xa0;&#xa0;</mml:mtext>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2208;</mml:mo>
<mml:mtext>&#x3a9;</mml:mtext>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mtext>&#xa0;&#xa0;&#xa0;&#xa0;&#xa0;&#xa0;&#xa0;</mml:mtext>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2209;</mml:mo>
<mml:mtext>&#x3a9;</mml:mtext>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>where <inline-formula id="inf1">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x2217;</mml:mo>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denote the matrix kernel norm; <italic>K</italic> denotes the restored low-rank matrix; <italic>M</italic> denotes the matrix to be repaired with only some elements observed; <inline-formula id="inf2">
<mml:math id="m4">
<mml:mi>&#x3a9;</mml:mi>
</mml:math>
</inline-formula> denotes the set of positions of non-empty elements in <italic>M</italic>. If <inline-formula id="inf3">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>M</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> a member of matrix <italic>M</italic> is observed, then <inline-formula id="inf4">
<mml:math id="m6">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2208;</mml:mo>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
<mml:mo>;</mml:mo>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the operator. Since there are Gaussian noise, spikes, and other formal noise for the most real-world system, the data recovery model can be depicted in <xref ref-type="disp-formula" rid="e3">Eq. 3</xref> as follows.<disp-formula id="e3">
<mml:math id="m7">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:munder>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>E</mml:mi>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>G</mml:mi>
</mml:mrow>
</mml:munder>
<mml:mtext>&#xa0;&#xa0;</mml:mtext>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x2217;</mml:mo>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b4;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mi>F</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>s</mml:mtext>
<mml:mtext>.t</mml:mtext>
<mml:mtext>.&#xa0;&#xa0;</mml:mtext>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mtext>&#x3a9;</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>M</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>K</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>G</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>where <italic>E</italic> denotes peak outlier matrix, <italic>G</italic> denotes Gaussian noise matrix, <italic>&#x3c1;</italic> and <italic>&#x3b4;</italic> denote weight coefficients correspondingly, and <italic>N</italic> denotes auxiliary matrix. The augmented Lagrange function in <xref ref-type="disp-formula" rid="e3">Eq. 3</xref> can be transformed into an unconstrained optimization problem and solved with the alternating direction method of multipliers (ADMM) according to literature (<xref ref-type="bibr" rid="B28">Yang T. et al., 2020</xref>).</p>
<p>Tensor completion is a high dimensional matrix completion. Since the electricity usage of multiple users on different days may have an underlying multi-dimensional internal correlation, tensor completion could be utilized to recover missing or false with high precision (<xref ref-type="bibr" rid="B32">Zhao et al., 2020</xref>). The fundamental principle of tensor completion is similar to matrix completion and could be referred to (<xref ref-type="bibr" rid="B32">Zhao et al., 2020</xref>).</p>
<p>Unlike matrix completion and tensor completion to recover missing data with low-rank data, generative adversarial networks (GAN) is a data-driven approach which extracts features from large amounts of unlabeled data through GAN&#x2019;s adversarial game. A discriminant model that can accurately identify the authentic and false/missing data and a generic model that can capture the potential features and spatial and temporal features of the data are obtained. Thereafter, the dual semantic perception constraint is utilized to retrain the model to find the candidate data that has the greatest similarity to the data to be reconstructed with missing values (<xref ref-type="bibr" rid="B26">Wang S. et al., 2019</xref>). It should be pointed out that the GAN based approach works on a large number of data, and it is not appropriate for the date completion of limited LV users in a DTSZ. Matrix completion and tensor completion are utilized to recover false/missing data in this article.</p>
</sec>
<sec id="s3">
<title>3 Detection of Power Theft in Low Voltage Platform Based on Edge Computing</title>
<sec id="s3-1">
<title>3.1 Correlation Analysis of User Power Quantity and Line Loss in Low Voltage Station Area</title>
<p>Non-technical loss (NTL) in DTSZ is mainly caused by electricity theft, and the NTL caused by anomaly users is usually correlated to its metering data and associated NTL. Therefore, there is an underlying correlation between the metering data of anomaly users and the NTL of DTSZ. The correlation could be identified with Granger causality analysis to find out the anomaly users caused an escalation of loss of DTSZ.</p>
<p>Metering data of a real-world DTSZ is employed to analyze the correlation between metering data and loss of DTSZ. Loss of the DTSZ in 62 consecutive days is shown in <xref ref-type="fig" rid="F1">Figure 1</xref>. There are six industrial and commercial users and 33 low-voltage residential users in the DTSZ. The served daily mean electricity is about 1200&#xa0;kWh, while the daily mean loss is about 100&#xa0;kWh in January and February 2020. The loss rate came up to 9.6%, and it is highly suspected that there is an anomaly user of electricity theft. Since electricity theft of industrial and commercial users is contributing much more than average residential users, electricity usage of six industrial and commercial users within the DTSZ from 30 December 2019 to February 2020 is analyzed as follows.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Electricity usage of users and loss of DTSZ with a high loss rate. </p>
</caption>
<graphic xlink:href="fenrg-10-892541-g001.tif"/>
</fig>
<p>The red line denotes the daily loss of DTSZ (<italic>G</italic>), and the black line denotes the daily loss rate of DTSZ. The other six lines denote the electricity consumption of six industrial and commercial users, which are depicted as <italic>H</italic>
<sub>1</sub>&#x223c;<italic>H</italic>
<sub>6</sub> in the following section. It can be observed that the loss profile of DTSZ has a similar trend as that of users&#x2019; usage. Most of them escalate in the beginning and then decline in the end.</p>
</sec>
<sec id="s3-2">
<title>3.2 Data Communication and Anomaly Analysis in LV DTSZ</title>
<p>DTU is generally installed on the secondary side of the distribution cabinet (<xref ref-type="bibr" rid="B12">Liu et al., 2020</xref>). It communicates <italic>via</italic> protocol RS485 or PLC within the DTSZ and communicates with the head end of AMI with wireless communication or optical fiber. DTU collects metering data of the distribution transformer and associates LV users within DTSZ and uploads it to the head end of AMI (<xref ref-type="bibr" rid="B7">Huang et al., 2021</xref>; <xref ref-type="bibr" rid="B34">Zhong et al., 2021</xref>). Communication architecture within a typical DTSZ is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Basic communication diagram of the distribution area.</p>
</caption>
<graphic xlink:href="fenrg-10-892541-g002.tif"/>
</fig>
<p>In real-world AMI, meters of users operate in severe environments and it could suffer communication occasionally. Once it suffers communication failure, it could upload daily metering data in the following days, which could cause zero electricity usage on the previous day and electricity usage of 2&#xa0;days on the following day in the head end of AMI. In order to demonstrate the impact of communication failure on data quality of the head end of AMI, user one of DTSZ was selected to report 0 electricity usage on 29 January 2020, and the usage was accumulated and uploaded on the following day. The usage of users and loss data of DTSZ is plotted as shown in <xref ref-type="fig" rid="F3">Figure 3</xref>. It can be observed that the loss and loss rate of DTSZ escalated notably on 29 January 2020 due to communication failure. While it decreases notably on the following day since usage in two consecutive days is accumulated. As a consequence, communication failure could distort the underlying correlation between anomaly users&#x2019; electricity usage and loss of DTSZ and result in misleading electricity theft identification as a consequence.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Electricity usage of users and loss of DTSZ with communication failure.</p>
</caption>
<graphic xlink:href="fenrg-10-892541-g003.tif"/>
</fig>
</sec>
<sec id="s3-3">
<title>3.3 Edge Computing Based Electricity Theft Detection in Distribution Serving Zone</title>
<p>Co-integration test and Granger causality analysis are commonly used in economics to analyze the correlation among time series. In general, a co-integration test is used to test whether there is a long-term equilibrium among time series. Thereafter, Granger causality analysis is used to determine whether a variable impacts another variable (<xref ref-type="bibr" rid="B35">Zhu et al., 2017</xref>; <xref ref-type="bibr" rid="B4">Fan et al., 2019</xref>; <xref ref-type="bibr" rid="B24">Tian et al., 2019</xref>). Since electricity usage of an anomaly user of electricity theft is correlated to its usage in most theft modes, the fluctuation of loss pf DTSZ caused by anomaly users has a similar profile as time series of economic variables disturbed by other factors. Therefore, the equilibrium relationship and causal relationship between the loss of DTSZ and users&#x2019; metering data can be analyzed to detect anomaly users.</p>
<p>Traditionally, field terminals, such as DTU, have limited computing and storage resources. Complex functions such as identification of anomaly users of electricity theft can only be implemented in the head end of AMI. Communication failure induced data missing could impact its performance notably (<xref ref-type="bibr" rid="B18">Shi et al., 2016</xref>; <xref ref-type="bibr" rid="B2">Covi et al., 2021</xref>). In recent years, more and more meters are being deployed in distribution systems with the rapid development of Internet of Things (IoT) technology (<xref ref-type="bibr" rid="B3">Deng et al., 2021</xref>). Since computing and storage resources of concurrent IoT terminals escalate notably, it is technically feasible to implement some of the complex functions in IoT terminals with edge computing (<xref ref-type="bibr" rid="B11">Li et al., 2020</xref>; <xref ref-type="bibr" rid="B25">Wang et al., 2020</xref>; <xref ref-type="bibr" rid="B13">Liu et al., 2022</xref>).</p>
<p>DTU could be utilized as a platform for edge computing in DTSZ. Since it collects substantial data within the DTSZ, it can provide loss analysis, power quality monitoring, and topology analysis with edge computing. Since different vendors implement different business functions in the diversified OS environment, Docker technology is employed to provide an appropriate container for the APP of various vendors on the same DTU platform (<xref ref-type="bibr" rid="B5">Gong et al., 2018</xref>). Docker-based DTU is composed of a system layer and an application (APP) layer. The APP layer is divided into acquisition APP and business APP, which can interact with each other through the message bus. The former collects real-time operation data and load data; The latter accesses the data center through the device bus, extracts the required data for calculation and analysis, and implements edge computing of business functions (<xref ref-type="bibr" rid="B14">Nie et al., 2020</xref>).</p>
<p>Electricity theft detection can be implemented in the DTU with edge computing. The fundamental of the approach is that the concentrator APP of DTU collects users&#x2019; metering data within the DTSZ. Loss analysis APP collects serving electricity and calculates the loss of DTSZ. Thereafter, the electricity theft detection APP identifies anomaly users with Granger causality analysis with loss data and metering data of associated users in the DTSZ. The framework of the implementation process is shown in <xref ref-type="fig" rid="F4">Figure 4</xref>. The method proposed in this paper transfers the detection of electricity theft from the head end of AMI to the DTU in the edge, which can eliminate communication associated data missing to identify anomaly users with lower fails positive rate.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Electricity theft detection framework with edge computing.</p>
</caption>
<graphic xlink:href="fenrg-10-892541-g004.tif"/>
</fig>
<p>Granger causality analysis is first used to identify anomaly users in DTSZ depicted in <xref ref-type="sec" rid="s1">Section 1</xref>. Thereafter, the distorted data and distorted data recovered with various data completion approaches are analyzed in this section.</p>
</sec>
</sec>
<sec id="s4">
<title>4 Numerical Simulation</title>
<sec id="s4-1">
<title>4.1 Edge Computing&#x2013;Based Electricity Theft Detection</title>
<p>ADF unit root tests were performed for <italic>G</italic> and <italic>H</italic>
<sub>
<italic>1</italic>
</sub>
<italic>-H</italic>
<sub>
<italic>6</italic>
</sub>, and their differential sequences were on the edge side. With 5% confidence as the standard, all the sequences were first-order unitary sequences, and the test results are shown in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Results of stationary test for DTSZ with high loss rate.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Time series</th>
<th align="center">ADF</th>
<th align="center">5% Confidence</th>
<th align="center">Stationary</th>
<th align="center">Time series</th>
<th align="center">ADF</th>
<th align="center">5% Confidence</th>
<th align="center">Stationary</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">
<sub>
<italic>G</italic>
</sub>
</td>
<td align="char" char=".">&#x2212;1.7940</td>
<td align="char" char=".">0.3801</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>G</italic>
</sub>
</td>
<td align="char" char=".">&#x2212;8.9978</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
<tr>
<td align="left">
<sub>
<italic>H</italic>1</sub>
</td>
<td align="char" char=".">&#x2212;2.4498</td>
<td align="char" char=".">0.1328</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>H</italic>1</sub>
</td>
<td align="char" char=".">&#x2212;9.7337</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
<tr>
<td align="left">
<sub>
<italic>H</italic>2</sub>
</td>
<td align="char" char=".">&#x2212;0.4467</td>
<td align="char" char=".">0.5171</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>H</italic>2</sub>
</td>
<td align="char" char=".">&#x2212;10.7129</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
<tr>
<td align="left">
<sub>
<italic>H</italic>3</sub>
</td>
<td align="char" char=".">&#x2212;1.9382</td>
<td align="char" char=".">0.3130</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>H</italic>3</sub>
</td>
<td align="char" char=".">&#x2212;7.9962</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
<tr>
<td align="left">
<sub>
<italic>H</italic>4</sub>
</td>
<td align="char" char=".">&#x2212;0.4595</td>
<td align="char" char=".">0.5121</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>H</italic>4</sub>
</td>
<td align="char" char=".">&#x2212;8.0350</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
<tr>
<td align="left">
<sub>
<italic>H</italic>5</sub>
</td>
<td align="char" char=".">&#x2212;1.8255</td>
<td align="char" char=".">0.3650</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>H</italic>5</sub>
</td>
<td align="char" char=".">&#x2212;9.3035</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
<tr>
<td align="left">
<sub>
<italic>H</italic>6</sub>
</td>
<td align="char" char=".">&#x2212;0.4429</td>
<td align="char" char=".">0.5187</td>
<td align="center">N</td>
<td align="center">&#x25b3;<sub>
<italic>H</italic>6</sub>
</td>
<td align="char" char=".">&#x2212;9.7269</td>
<td align="char" char=".">0.0000</td>
<td align="center">Y</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The Engle&#x2013;Granger co-integration test was applied to <italic>G</italic> and <italic>H</italic>
<sub>
<italic>1</italic>
</sub>
<italic>-H</italic>
<sub>
<italic>6</italic>
</sub>, respectively. Thereafter, the stationarity test of residual series was implemented with the ADF test. The stationarity test results of the residual series are listed in <xref ref-type="table" rid="T2">Table 2</xref>, and the shaded area in the table indicates that the result is less than the threshold of &#x2212;3.4363.<disp-formula id="e4">
<mml:math id="m8">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>22</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>9015</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mtext>.</mml:mtext>
<mml:mn>3434</mml:mn>
<mml:mtext>H</mml:mtext>
</mml:mrow>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>4.5562</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>16.4799</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.8190</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>8160</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>F</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>271</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>5902</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1.4099</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
<disp-formula id="e5">
<mml:math id="m9">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>-</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>6793</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mtext>.</mml:mtext>
<mml:mn>6065</mml:mn>
<mml:mtext>H</mml:mtext>
</mml:mrow>
<mml:mn>5</mml:mn>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>-</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>1428</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>22</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>2943</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>8923</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>8905</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>F</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>497</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>0337</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>9883</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
<disp-formula id="e6">
<mml:math id="m10">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>13</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>0982</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mtext>.</mml:mtext>
<mml:mn>3801</mml:mn>
<mml:mtext>H</mml:mtext>
</mml:mrow>
<mml:mn>6</mml:mn>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>7918</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>19</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>7185</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>8663</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>8641</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>F</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>388</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>8198</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>0359</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Residual sequence smoothness test results of user and loss.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">User</th>
<th align="center">Inspection results</th>
<th align="center">User</th>
<th align="center">Inspection results</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">
<italic>H</italic>
<sub>1</sub>
</td>
<td align="char" char=".">&#x2212;3.1573</td>
<td align="center">
<italic>H</italic>
<sub>4</sub>
</td>
<td align="char" char=".">&#x2212;5.7480</td>
</tr>
<tr>
<td align="left">
<italic>H</italic>
<sub>2</sub>
</td>
<td align="char" char=".">&#x2212;3.3738</td>
<td align="center">
<italic>H</italic>
<sub>5</sub>
</td>
<td align="char" char=".">&#x2212;4.5032</td>
</tr>
<tr>
<td align="left">
<italic>H</italic>
<sub>3</sub>
</td>
<td align="char" char=".">&#x2212;2.9929</td>
<td align="center">
<italic>H</italic>
<sub>6</sub>
</td>
<td align="char" char=".">&#x2212;4.5394</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>When the residual sequence is stationary, the regression equation between the corresponding variables is shown as above. In <xref ref-type="disp-formula" rid="e4">Eqs 4</xref>&#x2013;<xref ref-type="disp-formula" rid="e6">6</xref>, <italic>T</italic>
<sub>1</sub> and <italic>T</italic>
<sub>2</sub> are the t-test values of corresponding parameters, <italic>R</italic>
<sup>
<italic>2</italic>
</sup> denotes the determinability coefficient, <inline-formula id="inf5">
<mml:math id="m11">
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> denotes the adjusted determinability coefficient, <italic>F</italic> denotes the model test value, and <italic>D</italic> denotes the Dubin Watson statistic. If <italic>F</italic> test value and <italic>T</italic> test value are significant, the regression effect of the equation is better.</p>
<p>After constructing the least squares regression model for <italic>H</italic>
<sub>
<italic>1</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic>, the co-integration test results show that the test value in the stationarity test of residual sequences of <italic>H</italic>
<sub>
<italic>1</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>3</italic>
</sub> and <italic>G</italic> is greater than the threshold while that in the stationarity test of residual sequences of <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> is less than the threshold, which indicates <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> has a co-integration relationship with <italic>G</italic>. The subsequent Granger causality analysis can be continued, and the threshold refers to the critical value of McKinnon&#x2019;s co-integration test (<xref ref-type="bibr" rid="B15">Pan, 2017</xref>). To further clarify the dynamic relationship between <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x223c;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic>, an error correction model among <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x223c;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> is established, and the results are listed in <xref ref-type="disp-formula" rid="e7">Eqs 7</xref>&#x2013;<xref ref-type="disp-formula" rid="e9">9</xref>. It can be observed that when <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> fluctuates (increases) by 1% in the short term, <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> will increase by 0.7040%, 1.2302%, and 1.1019%, respectively. According to the coefficient of error correction term, when the short-term fluctuation of <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> deviates from the long-term equilibrium relationship among them, the non-equilibrium state among <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> will be corrected to the equilibrium state with the adjustment force of &#x2212;0.5700, &#x2212;0.4457, and &#x2212;0.4409, respectively.<disp-formula id="e7">
<mml:math id="m12">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="normal">&#x394;</mml:mi>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>7040</mml:mn>
<mml:mi mathvariant="normal">&#x394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>5700</mml:mn>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>4.1511</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>4.8494</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.3567</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>3228</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2.1373</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>where <inline-formula id="inf6">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20.0735</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1.3920</mml:mn>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf7">
<mml:math id="m14">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:mi>G</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order difference of <italic>G</italic>, <inline-formula id="inf8">
<mml:math id="m15">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order difference of <italic>H</italic>
<sub>4</sub>, <inline-formula id="inf9">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order lag sequence of <italic>G</italic>, and <inline-formula id="inf10">
<mml:math id="m17">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order lag sequence of <italic>H</italic>
<sub>4</sub>.<disp-formula id="e8">
<mml:math id="m18">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="normal">&#x394;</mml:mi>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>2302</mml:mn>
<mml:mi mathvariant="normal">&#x394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>5</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>4457</mml:mn>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>10</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>0978</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>4</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>1534</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>6645</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>6469</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>0424</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>where <inline-formula id="inf11">
<mml:math id="m19">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>2.2644</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1.6356</mml:mn>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf12">
<mml:math id="m20">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>5</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order difference of <italic>H</italic>
<sub>5</sub>, and <inline-formula id="inf13">
<mml:math id="m21">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order lag sequence of <italic>H</italic>
<sub>5</sub>.<disp-formula id="e9">
<mml:math id="m22">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi mathvariant="normal">&#x394;</mml:mi>
<mml:mi>G</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>1019</mml:mn>
<mml:mi mathvariant="normal" >&#x394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>6</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>4409</mml:mn>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>7</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>3627</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>3</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>6399</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>5144</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>R</mml:mi>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mtext>.</mml:mtext>
<mml:mn>4888</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mtext>.</mml:mtext>
<mml:mn>1190</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>where <inline-formula id="inf14">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>17.0197</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1.3225</mml:mn>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mn>6</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf15">
<mml:math id="m24">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>6</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order difference of <italic>H</italic>
<sub>6</sub>, and <inline-formula id="inf16">
<mml:math id="m25">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mn>6</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the first-order lag sequence of <italic>H</italic>
<sub>6</sub>.</p>
<p>The co-integration relationship among <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x223c;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> and the error correction model were analyzed. It can be observed that the error correction coefficients in the three error correction models of <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x223c;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> all conform to the reverse adjustment mechanism. Characteristics of long-term stability and the dynamic relationship between <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x223c;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic> with co-integration relationship are further clarified. Since there is a co-integration relationship between <italic>H</italic>
<sub>
<italic>4</italic>
</sub>
<italic>&#x223c;H</italic>
<sub>
<italic>6</italic>
</sub> and <italic>G</italic>, the causal relationship between their influences can be further analyzed with Granger causality analysis. Granger causality analysis results of edge computing are shown in <xref ref-type="table" rid="T3">Table 3</xref>. It can be observed that the significance of &#x201c;<italic>H</italic>
<sub>
<italic>4</italic>
</sub> is not the Granger cause of <italic>G</italic>&#x2033; is less than the critical level of 5%, which indicates the null hypothesis is rejected. Therefore, <italic>H</italic>
<sub>
<italic>4</italic>
</sub> is the cause of the change of <italic>G</italic>, and <italic>H</italic>
<sub>
<italic>4</italic>
</sub> can be regarded as the anomaly user of electricity theft in the DTSZ. This has been verified by on-site inspection.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Granger causality test results of edge computing.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Assuming</th>
<th align="center">Significance</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">
<italic>G</italic> is not a Granger reason for <italic>H</italic>
<sub>4</sub>
</td>
<td align="char" char=".">0.0137</td>
</tr>
<tr>
<td align="left">
<italic>H</italic>
<sub>4</sub> is not a Granger reason for <italic>G</italic>
</td>
<td align="char" char=".">0.0465</td>
</tr>
<tr>
<td align="left">
<italic>G</italic> is not a Granger reason for <italic>H</italic>
<sub>5</sub>
</td>
<td align="char" char=".">0.5068</td>
</tr>
<tr>
<td align="left">
<italic>H</italic>
<sub>5</sub> is not a Granger reason for <italic>G</italic>
</td>
<td align="char" char=".">0.4232</td>
</tr>
<tr>
<td align="left">
<italic>G</italic> is not a Granger reason for <italic>H</italic>
<sub>6</sub>
</td>
<td align="char" char=".">0.0275</td>
</tr>
<tr>
<td align="left">
<italic>H</italic>
<sub>6</sub> is not a Granger reason for <italic>G</italic>
</td>
<td align="char" char=".">0.7291</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-2">
<title>4.2 Master Station Detection Comparative Experiment</title>
<p>When LV users suffer communication failure and upload metering data on the following day, the data at the head end of AMI is distorted with missing data and could cause misleading electricity theft detection results. In order to verify the superiority of the proposed approach, six industrial and commercial users in DTSZ were set to upload zero usage on the 30th day (28 January 2020) and upload usage on two consecutive days on the following day (29 January 2020). Therefore, the loss of DTSZ increased on the first day and decreased on the second day. The metered usage of each user and loss of DTSZ are listed as shown in <xref ref-type="table" rid="T4">Table 4</xref>. Granger causality test is used to test whether there is a correlation between each user and the loss of DTSZ based on distorted false data. The ultimate results of Granger causality analysis at the head end of AMI are shown in <xref ref-type="table" rid="T5">Table 5</xref>.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Daily electricity usage of each anomaly user and loss of DTSZ.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Issue</th>
<th align="center">Date</th>
<th align="center">User 1</th>
<th align="center">User 2</th>
<th align="center">User 3</th>
<th align="center">User 4</th>
<th align="center">User 5</th>
<th align="center">User 6</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="2" align="left">Daily metering usage</td>
<td align="center">2020/1/29</td>
<td align="char" char=".">0.00</td>
<td align="char" char=".">0.00</td>
<td align="char" char=".">0.00</td>
<td align="char" char=".">0.00</td>
<td align="char" char=".">0.00</td>
<td align="char" char=".">0.00</td>
</tr>
<tr>
<td align="center">2020/1/30</td>
<td align="char" char=".">174.15</td>
<td align="char" char=".">172.04</td>
<td align="char" char=".">145.58</td>
<td align="char" char=".">140.06</td>
<td align="char" char=".">160.32</td>
<td align="char" char=".">169.20</td>
</tr>
<tr>
<td rowspan="2" align="left">Loss of DTSZ</td>
<td align="center">2020/1/29</td>
<td align="char" char=".">210.34</td>
<td align="char" char=".">205.93</td>
<td align="char" char=".">192.97</td>
<td align="char" char=".">193.00</td>
<td align="char" char=".">195.55</td>
<td align="char" char=".">201.10</td>
</tr>
<tr>
<td align="center">2020/1/30</td>
<td align="char" char=".">23.09</td>
<td align="char" char=".">27.50</td>
<td align="char" char=".">40.46</td>
<td align="char" char=".">40.43</td>
<td align="char" char=".">37.88</td>
<td align="char" char=".">32.33</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>Result of Granger attribution test at the head end of AMI.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left"/>
<th align="center">Missing user</th>
<th align="center">Stationary (loss and electricity usage)</th>
<th align="center">Co-integration relationship (loss and electricity usage)</th>
<th align="center">Significance test results</th>
<th align="center">Audit results</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Edge computing</td>
<td align="left">Null</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>4</sub>
</td>
<td align="left">Correct</td>
</tr>
<tr>
<td rowspan="6" align="left">Detecting in the head end of AMI</td>
<td align="left">User 1</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">Miscalculation</td>
</tr>
<tr>
<td align="left">User 2</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">Miscalculation</td>
</tr>
<tr>
<td align="left">User 3</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">Miscalculation</td>
</tr>
<tr>
<td align="left">User 4</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">Miscalculation</td>
</tr>
<tr>
<td align="left">User 5</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">Miscalculation</td>
</tr>
<tr>
<td align="left">User 6</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>
</td>
<td align="left">Miscalculation</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It can be concluded from <xref ref-type="table" rid="T5">Table 5</xref> and Schedules as follows.<list list-type="bullet">
<list-item>
<p>When users suffer communication failure and fail to upload metering data, there is no co-integration relationship between the user&#x2019;s electricity usage and loss of DTSZ. Therefore, we cannot analyze it with Granger causality analysis. The co-integration relationship between electricity usage of other users and loss of DTSZ remains, and they can be analyzed with Granger causality analysis.</p>
</list-item>
<list-item>
<p>Except for the user who suffers communication failure, all other users could be identified as anomaly users of electricity theft. Since user 4 has been confirmed to be the anomaly user of electricity theft by onsite inspection, once we identify the anomaly user of electricity theft with distorted data with data missing, the false positive rate escalates to 80%, which is not acceptable for industrial applications.</p>
</list-item>
</list>
</p>
<p>Missing data completion got broad research in recent years. <xref ref-type="bibr" rid="B30">Yang Y. et al. (2020</xref>) proposed a low-rank matrix theory based on matrix completion of power quality data. It designs a multi-norm joint low-rank optimization model and solves it with an alternating direction multiplier method. <xref ref-type="bibr" rid="B32">Zhao et al. (2020</xref>) proposed a tension completion based approach to recover missing data of multiple-user, and a low-rank tensor completion model was employed to recover missing data in DTSZ. It analyzes the characteristics of the LV data in DTSZ and constructs the standard missing tensor.</p>
<p>In order to find outperformance of matrix completion and Tensor completion, missing data of each user is recovered with these two approaches. The authentic usage and recovered usage with the two completion approaches are listed in <xref ref-type="table" rid="T6">Table 6</xref>. The authentic loss on 29 January and 30 January is 115.30 and 118.13&#xa0;kWh, respectively. According to the user usage data recovered with correction, the loss of the DTSZ calculated with recovered data is listed in <xref ref-type="table" rid="T7">Table 7</xref>.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>Recovered electricity usage of each anomaly user.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">Packing method</th>
<th rowspan="2" align="center">Date</th>
<th colspan="6" align="center">Daily usage/(KWh)</th>
</tr>
<tr>
<th align="center">
<italic>H</italic>
<sub>1</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>2</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>3</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>4</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>5</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>6</sub>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="2" align="left">Authentic usage</td>
<td align="center">2020/1/29</td>
<td align="char" char=".">95.04</td>
<td align="char" char=".">90.63</td>
<td align="char" char=".">77.66</td>
<td align="char" char=".">77.70</td>
<td align="char" char=".">80.25</td>
<td align="char" char=".">85.80</td>
</tr>
<tr>
<td align="center">2020/1/30</td>
<td align="char" char=".">79.11</td>
<td align="char" char=".">81.41</td>
<td align="char" char=".">67.91</td>
<td align="char" char=".">62.36</td>
<td align="char" char=".">80.07</td>
<td align="char" char=".">83.40</td>
</tr>
<tr>
<td rowspan="2" align="left">Matrix completion</td>
<td align="center">2020/1/29</td>
<td align="char" char=".">102.52</td>
<td align="char" char=".">102.37</td>
<td align="char" char=".">95.85</td>
<td align="char" char=".">97.57</td>
<td align="char" char=".">96.22</td>
<td align="char" char=".">98.56</td>
</tr>
<tr>
<td align="center">2020/1/30</td>
<td align="char" char=".">97.45</td>
<td align="char" char=".">95.63</td>
<td align="char" char=".">90.46</td>
<td align="char" char=".">90.75</td>
<td align="char" char=".">92.81</td>
<td align="char" char=".">91.38</td>
</tr>
<tr>
<td rowspan="2" align="left">Tensor completion</td>
<td align="center">2020/1/29</td>
<td align="char" char=".">107.39</td>
<td align="char" char=".">108.31</td>
<td align="char" char=".">79.33</td>
<td align="char" char=".">79.14</td>
<td align="char" char=".">85.41</td>
<td align="char" char=".">86.79</td>
</tr>
<tr>
<td align="center">2020/1/30</td>
<td align="char" char=".">89.22</td>
<td align="char" char=".">95.16</td>
<td align="char" char=".">82.31</td>
<td align="char" char=".">71.01</td>
<td align="char" char=".">83.93</td>
<td align="char" char=".">90.97</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T7" position="float">
<label>TABLE 7</label>
<caption>
<p>Calculated loss for each recovered anomaly user.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">Data completion</th>
<th rowspan="2" align="center">Date</th>
<th colspan="6" align="center">Loss of power/(KWh)</th>
</tr>
<tr>
<th align="center">
<italic>H</italic>
<sub>1</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>2</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>3</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>4</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>5</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>6</sub>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="4" align="left">Matrix completion</td>
<td align="left">Recovered data on 29 January</td>
<td align="char" char=".">104.37</td>
<td align="char" char=".">103.15</td>
<td align="char" char=".">100.64</td>
<td align="char" char=".">97.12</td>
<td align="char" char=".">99.27</td>
<td align="char" char=".">106.31</td>
</tr>
<tr>
<td align="left">Error of 29 January</td>
<td align="char" char=".">&#x2212;9.48%</td>
<td align="char" char=".">&#x2212;10.54%</td>
<td align="char" char=".">&#x2212;12.71%</td>
<td align="char" char=".">&#x2212;15.77%</td>
<td align="char" char=".">&#x2212;13.90%</td>
<td align="char" char=".">&#x2212;7.80%</td>
</tr>
<tr>
<td align="left">Recovered data on 30 January</td>
<td align="char" char=".">98.20</td>
<td align="char" char=".">96.95</td>
<td align="char" char=".">94.17</td>
<td align="char" char=".">90.79</td>
<td align="char" char=".">93.03</td>
<td align="char" char=".">98.49</td>
</tr>
<tr>
<td align="left">Error of 30 January</td>
<td align="char" char=".">&#x2212;16.87%</td>
<td align="char" char=".">&#x2212;17.93%</td>
<td align="char" char=".">&#x2212;20.28%</td>
<td align="char" char=".">&#x2212;23.14%</td>
<td align="char" char=".">&#x2212;21.25%</td>
<td align="char" char=".">&#x2212;16.63%</td>
</tr>
<tr>
<td rowspan="4" align="left">Tensor completion</td>
<td align="left">Recovered data on 29 January</td>
<td align="char" char=".">102.65</td>
<td align="char" char=".">106.38</td>
<td align="char" char=".">105.85</td>
<td align="char" char=".">102.97</td>
<td align="char" char=".">103.47</td>
<td align="char" char=".">107.23</td>
</tr>
<tr>
<td align="left">Error of 29 January</td>
<td align="char" char=".">&#x2212;10.97%</td>
<td align="char" char=".">&#x2212;7.74%</td>
<td align="char" char=".">&#x2212;8.20%</td>
<td align="char" char=".">&#x2212;10.69%</td>
<td align="char" char=".">&#x2212;10.26%</td>
<td align="char" char=".">&#x2212;7.00%</td>
</tr>
<tr>
<td align="left">Recovered data on 30 January</td>
<td align="char" char=".">113.28</td>
<td align="char" char=".">114.14</td>
<td align="char" char=".">112.35</td>
<td align="char" char=".">111.03</td>
<td align="char" char=".">111.17</td>
<td align="char" char=".">112.73</td>
</tr>
<tr>
<td align="left">Error of 30 January</td>
<td align="char" char=".">&#x2212;4.11%</td>
<td align="char" char=".">&#x2212;3.38%</td>
<td align="char" char=".">&#x2212;4.89%</td>
<td align="char" char=".">&#x2212;6.01%</td>
<td align="char" char=".">&#x2212;5.89%</td>
<td align="char" char=".">&#x2212;4.57%</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It can be observed from <xref ref-type="table" rid="T6">Tables 6</xref>, <xref ref-type="table" rid="T7">7</xref> that although it is widely supposed that matrix completion and tensor completion can recover missing data ideally, its premise is that time series are of low rank. Missing data cannot be recovered precisely once there is no strong correlation between users&#x2019; usage data in the DTSZ. The data recovered with these two approaches are used to test whether the Granger causality test can accurately identify anomaly users of electricity theft. The Granger causality analysis results are listed in <xref ref-type="table" rid="T8">Table 8</xref>.</p>
<table-wrap id="T8" position="float">
<label>TABLE 8</label>
<caption>
<p>Results of Granger causality analysis of anomaly user with data recovery.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">Edge of the results</th>
<th align="center">User with missing data</th>
<th align="center">Stationary (loss and electricity usage))</th>
<th align="center">Co-integration relationship (loss and electricity usage)</th>
<th align="center">Significance test results</th>
<th align="center">Audit results</th>
</tr>
<tr>
<th align="center">Without data missing</th>
<th align="center">First-order differential stationary</th>
<th align="center">
<italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</th>
<th align="center">
<italic>H</italic>
<sub>4</sub>
</th>
<th align="center">T</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="6" align="left">Matrix fill</td>
<td align="center">User 1</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">NULL</td>
<td align="left">F</td>
</tr>
<tr>
<td align="center">User 2</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">NULL</td>
<td align="left">F</td>
</tr>
<tr>
<td align="center">User 3</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">NULL</td>
<td align="left">F</td>
</tr>
<tr>
<td align="center">User 4</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>4</sub>
</td>
<td align="left">F</td>
</tr>
<tr>
<td align="center">User 5</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>5</sub>
</td>
<td align="left">False-positive</td>
</tr>
<tr>
<td align="center">User 6</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">NULL</td>
<td align="left">Failure</td>
</tr>
<tr>
<td rowspan="6" align="left">Tensor completion</td>
<td align="center">User 1</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">NULL</td>
<td align="left">F</td>
</tr>
<tr>
<td align="center">User 2</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>4</sub>
</td>
<td align="left">T</td>
</tr>
<tr>
<td align="center">User 3</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>3</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">NULL</td>
<td align="left">F</td>
</tr>
<tr>
<td align="center">User 4</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>4</sub>
</td>
<td align="left">T</td>
</tr>
<tr>
<td align="center">User 5</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>4</sub>
</td>
<td align="left">T</td>
</tr>
<tr>
<td align="center">User 6</td>
<td align="left">First order differential stationary</td>
<td align="left">
<italic>H</italic>
<sub>1</sub>, <italic>H</italic>
<sub>2</sub>, <italic>H</italic>
<sub>4</sub>, <italic>H</italic>
<sub>5</sub>, <italic>H</italic>
<sub>6</sub>
</td>
<td align="left">
<italic>H</italic>
<sub>6</sub>
</td>
<td align="left">False-positive</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It can be concluded from <xref ref-type="table" rid="T8">Table 8</xref> as follows.<list list-type="bullet">
<list-item>
<p>According to the data analysis with matrix completion, Granger causality analysis cannot identify any anomaly user of electricity theft once users <italic>H</italic>
<sub>
<italic>1</italic>
</sub>
<italic>&#x2013;H</italic>
<sub>
<italic>3</italic>
</sub> or <italic>H</italic>
<sub>
<italic>6</italic>
</sub> suffer communication failure and recover with matrix completion. User <italic>H</italic>
<sub>
<italic>4</italic>
</sub> is correctly identified as an anomaly user of electricity theft once user <italic>H</italic>
<sub>
<italic>4</italic>
</sub> suffers communication failure and recovers with matrix completion. User <italic>H</italic>
<sub>
<italic>5</italic>
</sub> is incorrectly identified as an anomaly user once user <italic>H</italic>
<sub>
<italic>5</italic>
</sub> suffers communication failure and recovers with matrix completion. The accuracy rate of electricity theft detection with data in the head end of AMI declined to 16.6%.</p>
</list-item>
<list-item>
<p>According to the data analysis after tensor completion, Granger causality analysis cannot determine any anomaly user of electricity theft once user <italic>H</italic>
<sub>
<italic>1</italic>
</sub> or <italic>H</italic>
<sub>
<italic>3</italic>
</sub> suffers communication failure and recovers with tensor completion. User <italic>H</italic>
<sub>
<italic>4</italic>
</sub> can be judged as an anomaly user once users <italic>H</italic>
<sub>
<italic>2</italic>
</sub>, <italic>H</italic>
<sub>
<italic>4</italic>
</sub>, or <italic>H</italic>
<sub>
<italic>5</italic>
</sub> suffer communication failure and recover with tensor completion. User <italic>H</italic>
<sub>
<italic>6</italic>
</sub> can be misjudged as an anomaly user once user <italic>H</italic>
<sub>6</sub> suffers communication failure and recovers with tensor completion. The accuracy rate of electricity theft detection with data in the head end of AMI declined to 50%.</p>
</list-item>
<list-item>
<p>The goal of either matrix completion or tensor completion is to get the minimum norm of low-rank matrix/tensor. They recover data within a certain error range with higher linear correlation for the low rank of the data. It can be observed from <xref ref-type="table" rid="T5">Tables 5</xref>, <xref ref-type="table" rid="T6">6</xref> that there are notable errors in the recovered data of both algorithms. According to the Granger causality analysis by <xref ref-type="bibr" rid="B8">Jin et al. (2020</xref>), the one-to-one correspondence between electricity usage and loss of the detected user at the same time has a great influence on the final result, while both completion algorithms change correlation to a certain range, which results in the failure of Granger causality analysis&#x2013;based approach.</p>
</list-item>
</list>
</p>
<p>In conclusion, both matrix completion and tensor completion based approaches cannot recover data missing ideally and could negatively impact the precision of Granger causality&#x2013;based electricity theft detection. The proposed approach to implement electricity theft in DTU of DTSZ with edge computing could eliminate the impact of communication failure&#x2013;induced difficulty and facilitate precise electricity theft detection.</p>
</sec>
</sec>
<sec id="s5">
<title>5 Conclusion</title>
<p>The article analyzes communication failure&#x2019;s impact on data missing in the head end of AMI and points out that the false metering data could negatively impact electricity theft detection of LV users in DTSZ. Edge computing&#x2013;based approach is proposed to detect electricity theft of DTSZ in DTU with edge computing, which can identify anomaly users with authentic metering data in the edge and mitigate the difficulty of data recovery of missing/false data caused by communication failure. The real world metering data of a DTSZ is employed to produce distorted data caused by communication failure. Thereafter, produced data is recovered with matrix completion and tensor completion. Numerical simulation of these data shows that the Granger causality analysis&#x2013;based approach could identify anomaly users of electricity precisely with authentic data in the edge. However, all users are identified as anomaly users of electricity theft once the false data in the head end system is utilized. Once false/missing data are recovered with matrix completion or tensor completion, the accuracy of the Granger causality analysis&#x2013;based approach declines to 16.7% or 50%.</p>
<p>It should be pointed out that there is an anomaly LV user bypass meter, and its electricity usage is zero around the clock. Since there are numerous vacant apartments without electricity usage, it is rather difficult to detect these anomaly users since its meter data do not provide any useful information. We cannot detect these users precisely, even with authentic metering data. The way to identify these users requires further investigation.</p>
</sec>
</body>
<back>
<sec id="s6">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s7">
<title>Author Contributions</title>
<p>YZ implemented numerical simulation and wrote the manuscript. FC helped collect low voltage users&#x2019; metering data. HY revised the manuscript, and SS proposed the edge computing&#x2010;based approach.</p>
</sec>
<sec id="s8">
<title>Funding</title>
<p>This research is supported by the National Natural Science Foundation of China (no. 51777015).</p>
</sec>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of Interest</title>
<p>FC is employed by Changsha Electric Power Corporation.</p>
<p>The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. </p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Mcelroy</surname>
<given-names>M. B.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Shu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Transition towards Higher Penetration of Renewables: an Overview of Interlinked Technical, Environmental and Socio-Economic Challenges</article-title>. <source>J. Mod. Power Syst. Clean. Energy</source> <volume>7</volume>, <fpage>1</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1007/s40565-018-0438-9</pub-id> </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Covi</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Donati</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Kappel</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Heidari</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Payvand</surname>
<given-names>M.</given-names>
</name>
<etal/>
</person-group> (<year>2021</year>). <article-title>Adaptive Extreme Edge Computing for Wearable Devices</article-title>. <source>Front. Neurosci.</source> <volume>15</volume>, <fpage>611300</fpage>. <pub-id pub-id-type="doi">10.3389/fnins.2021.611300</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Deng</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Mu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Operational Planning of Centralized Charging Stations Utilizing Second-Life Battery Energy Storage Systems</article-title>. <source>IEEE Trans. Sustain. Energy</source> <volume>12</volume>, <fpage>387</fpage>&#x2013;<lpage>399</lpage>. <pub-id pub-id-type="doi">10.1109/tste.2020.3001015</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fan</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Sparse Fault Degradation Oriented Fisher Discriminant Analysis Based Fault Trace</article-title>. <source>Control Eng. China</source> <volume>7</volume>, <fpage>1239</fpage>&#x2013;<lpage>1244</lpage>. </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gong</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Luan</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>An</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X.</given-names>
</name>
<etal/>
</person-group> (<year>2018</year>). <article-title>Information Physical System of Active Distribution Network Based on Edge Computing</article-title>. <source>Power grid Technol.</source> <volume>10</volume>, <fpage>3128</fpage>&#x2013;<lpage>3135</lpage>. </citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>T</given-names>
</name>
<name>
<surname>GUO</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>SUN</surname>
<given-names>H</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Nontechnical loss detection based on stacked uncorrelated autoencoder and support vector machine</article-title>. <source>Automation of Electric Power Systems</source> <volume>1</volume>, <fpage>119</fpage>&#x2013;<lpage>125</lpage>. </citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Yin</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Meng</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Cheng</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Electric Power Network Data Transmission Schemepresent Situation and the Outlook Based on 5G Technology</article-title>. <source>Trans. China Electrotech. Soc.</source> <volume>17</volume>, <fpage>3581</fpage>&#x2013;<lpage>3593</lpage>. </citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jin</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Detection of Power Theft in High-Loss Areas Based on Granger Attribution Analysis</article-title>. <source>Automation Electr. Power Syst.</source> <volume>23</volume>, <fpage>82</fpage>&#x2013;<lpage>89</lpage>. </citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jin</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Review on Data-Driven Based Electricity Theft Detection Method and Research Prospect for Low False Positive Rate</article-title>. <source>Automation Electr. Power Syst.</source> <volume>1</volume>, <fpage>3</fpage>&#x2013;<lpage>14</lpage>. </citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Comprehensive Application of Optimal Benchmarking in Line Loss Lean Management of City-Level Power Grid Enterprises</article-title>. <source>Automation Electr. Power Syst.</source> <volume>23</volume>, <fpage>184</fpage>&#x2013;<lpage>191</lpage>.<pub-id pub-id-type="doi">10.7500/AEPS20180129003</pub-id> </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Yi</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Development Forms and Challenges of Ubiquitous Power Internet of Things</article-title>. <source>Automation Electr. Power Syst.</source> <volume>1</volume>, <fpage>13</fpage>&#x2013;<lpage>22</lpage>. </citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zeng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Security Situation Assessment of Smart Distribution Transformer Terminal Based on Information Entropy</article-title>. <source>South. Power Grid Technol.</source> <volume>1</volume>, <fpage>18</fpage>&#x2013;<lpage>23</lpage>. </citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zeng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Edge Computing Application, Architecture, and Challenges in Ubiquitous Power Internet of Things</article-title>. <source>Front. Energy Res.</source> <volume>10</volume>, <fpage>850252</fpage>. <pub-id pub-id-type="doi">10.3389/fenrg.2022.850252</pub-id> </citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nie</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Key Technologies and Application Scenarios Designed for Edge Modernization and Containerization of Distribution Transformer Terminals</article-title>. <source>Automation Electr. Power Syst.</source> <volume>3</volume>, <fpage>154</fpage>&#x2013;<lpage>161</lpage>. </citation>
</ref>
<ref id="B15">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Pan</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2017</year>). <source>Time Series Analysis-Macroeconomic Data Analysis Model</source>. <publisher-loc>Beijing</publisher-loc>: <publisher-name>Economic Science Press</publisher-name>, <fpage>121</fpage>&#x2013;<lpage>145</lpage>. </citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Partha</surname>
<given-names>P. B.</given-names>
</name>
<name>
<surname>Hongyun</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Mashima</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>V. W.</given-names>
</name>
<etal/>
</person-group> (<year>2020</year>). <article-title>Electricity Theft Pinpointing through Correlation Analysis of Master and Individual Meter Readings</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>4</volume>, <fpage>3031</fpage>&#x2013;<lpage>3042</lpage>.<pub-id pub-id-type="doi">10.1109/TSG.2019.2961136</pub-id> </citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ruan</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Qiu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>Z. Y.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>An Inertia-Based Data Recovery Scheme for False Data Injection Attack</article-title>. <source>IEEE Trans. Ind. Inf.</source> <volume>1</volume>, <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/TII.2022.3146859</pub-id> </citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shi</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Edge Computing: Vision and Challenges</article-title>. <source>IEEE Internet Things J.</source> <volume>3</volume>, <fpage>637</fpage>&#x2013;<lpage>646</lpage>. <pub-id pub-id-type="doi">10.1109/jiot.2016.2579198</pub-id> </citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Siamakz</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Dougherty</surname>
<given-names>E. R.</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>N. Q.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Optimal Bayesian Classification with Missing Values</article-title>. <source>IEEE Trans. Signal Process.</source> <volume>16</volume>, <fpage>4182</fpage>&#x2013;<lpage>4192</lpage>. </citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Song</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A Novel Approach for Missing Data Prediction in Coevolving Time Series</article-title>. <source>Computing</source> <volume>101</volume>, <fpage>1565</fpage>&#x2013;<lpage>1584</lpage>. <pub-id pub-id-type="doi">10.1007/s00607-018-0668-8</pub-id> </citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sun</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Cui</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Cui</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Detection Method of Power Data Outliers Based on Gaussian Kernel Function</article-title>. <source>Power Syst. Technol.</source> <volume>5</volume>, <fpage>1595</fpage>&#x2013;<lpage>1604</lpage>. </citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sundararajan</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Moghadasi</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Sarwat</surname>
<given-names>A. I.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Survey on Synchrophasor Data Quality and Cybersecurity Challenges, and Evaluation of Their Interdependencies</article-title>. <source>J. Mod. Power Syst. Clean. Energy</source> <volume>7</volume>, <fpage>449</fpage>&#x2013;<lpage>467</lpage>. <pub-id pub-id-type="doi">10.1007/s40565-018-0473-6</pub-id> </citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Early Warning Method of Electricity Anti-theft in Distribution Station Area Based on the Spatiotemporal Correlation Matrix</article-title>. <source>Automation Electr. Power Syst.</source> <volume>19</volume>, <fpage>168</fpage>&#x2013;<lpage>176</lpage>. </citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tian</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Based on the Power of Big Data Area E - GDP Value Prediction</article-title>. <source>Electr. power Autom. Equip.</source> <volume>11</volume>, <fpage>198</fpage>&#x2013;<lpage>204</lpage>. </citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Power Quality Data Compression Storage Method for Distribution Network Based on Distributed Compressed Sensing and Edge Computing</article-title>. <source>Trans. China Electrotech. Soc.</source> <volume>21</volume>, <fpage>4553</fpage>&#x2013;<lpage>4564</lpage>. </citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2019b</year>). <article-title>A Reconstruction Method for Missing Data in Power System Measurement Using an Improved Generative Adversarial Network</article-title>. <source>Proc. CSEE.</source> <volume>1</volume>, <fpage>56</fpage>&#x2013;<lpage>64</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.181282</pub-id> </citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Hong</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Kang</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2019a</year>). <article-title>Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>10</volume>, <fpage>3125</fpage>&#x2013;<lpage>3148</lpage>. <pub-id pub-id-type="doi">10.1109/tsg.2018.2818167</pub-id> </citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Pen</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020b</year>). <article-title>Power Quality Data Repair Algorithm for Ubiquitous Power Internet of Things Based on Matrix Filling</article-title>. <source>Automation Electr. power Syst.</source> <volume>2</volume>, <fpage>13</fpage>&#x2013;<lpage>21</lpage>. </citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Review on Application of Artificial Intelligence in Power Systems and Integrated Energy System</article-title>. <source>Automation Electr. Power Syst.</source> <volume>1</volume>, <fpage>2</fpage>&#x2013;<lpage>14</lpage>. </citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Qi</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020a</year>). <article-title>Measurement Data Missing Reconstruction in Distribution Network Based on Generative Antagonism and Dual Semantic Perception</article-title>. <source>Automation Electr. power Syst.</source> <volume>18</volume>, <fpage>46</fpage>&#x2013;<lpage>54</lpage>. </citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>User-side Power-Stealing Behavior Detection Based on Real-Valued Deep Confidence Network</article-title>. <source>Power Syst. Technol.</source> <volume>3</volume>, <fpage>1083</fpage>&#x2013;<lpage>1091</lpage>. </citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Shou</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Tensor Completion Method for Missing Data in Low-Voltage Platform Region</article-title>. <source>Proc. CSEE.</source> <volume>22</volume>, <fpage>7328</fpage>&#x2013;<lpage>7337</lpage>. </citation>
</ref>
<ref id="B33">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Kang</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Xia</surname>
<given-names>Q.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A Novel Combined Data-Driven Approach for Electricity Theft Detection</article-title>. <source>IEEE Trans. Ind. Inf.</source> <volume>15</volume>, <fpage>1809</fpage>&#x2013;<lpage>1819</lpage>. <pub-id pub-id-type="doi">10.1109/tii.2018.2873814</pub-id> </citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhong</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Shan</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Jian</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>A Plug-And-Play and Topology Recognition Method for Platform Intelligent Terminal</article-title>. <source>Automation Electr. Power Syst.</source> <volume>10</volume>, <fpage>166</fpage>&#x2013;<lpage>173</lpage>. </citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>J. Y.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>V. O. K.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>An Extended Spatio-Temporal Granger Causality Model for Air Quality Estimation with Heterogeneous Urban Big Data</article-title>. <source>IEEE Trans. Big Data</source> <volume>3</volume>, <fpage>307</fpage>&#x2013;<lpage>319</lpage>. <pub-id pub-id-type="doi">10.1109/tbdata.2017.2651898</pub-id> </citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhuang</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Zeng</surname>
<given-names>Q.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Detection of Abnormal Power Consumption Patterns of Power Users Based on Unsupervised Learning</article-title>. <source>Proc. CSEE.</source> <volume>2</volume>, <fpage>379</fpage>&#x2013;<lpage>387</lpage>. </citation>
</ref>
</ref-list>
</back>
</article>