<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1383090</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2024.1383090</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Electricity theft detection in smart grid using machine learning</article-title>
<alt-title alt-title-type="left-running-head">Iftikhar et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fenrg.2024.1383090">10.3389/fenrg.2024.1383090</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Iftikhar</surname>
<given-names>Hasnain</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Khan</surname>
<given-names>Nitasha</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Raza</surname>
<given-names>Muhammad Amir</given-names>
</name>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2550491/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Abbas</surname>
<given-names>Ghulam</given-names>
</name>
<xref ref-type="aff" rid="aff5">
<sup>5</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2172493/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Khan</surname>
<given-names>Murad</given-names>
</name>
<xref ref-type="aff" rid="aff6">
<sup>6</sup>
</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Aoudia</surname>
<given-names>Mouloud</given-names>
</name>
<xref ref-type="aff" rid="aff7">
<sup>7</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Touti</surname>
<given-names>Ezzeddine</given-names>
</name>
<xref ref-type="aff" rid="aff8">
<sup>8</sup>
</xref>
<xref ref-type="aff" rid="aff9">
<sup>9</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Emara</surname>
<given-names>Ahmed</given-names>
</name>
<xref ref-type="aff" rid="aff10">
<sup>10</sup>
</xref>
<xref ref-type="aff" rid="aff11">
<sup>11</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2589254/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>Department of Mathematics</institution>, <institution>City University of Science and Information Technology</institution>, <addr-line>Peshawar</addr-line>, <addr-line>Khyber Pakhtunkhwa</addr-line>, <country>Pakistan</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Department of Statistics</institution>, <institution>Quaid-i-Azam University</institution>, <addr-line>Islamabad</addr-line>, <country>Pakistan</country>
</aff>
<aff id="aff3">
<sup>3</sup>
<institution>British Malaysian Institute</institution>, <institution>Universiti Kuala Lumpur</institution>, <addr-line>Sungai Pusu</addr-line>, <country>Malaysia</country>
</aff>
<aff id="aff4">
<sup>4</sup>
<institution>Department of Electrical Engineering</institution>, <institution>Mehran University of Engineering and Technology SZAB Campus Khairpur Mir&#x2019;s</institution>, <addr-line>Sindh</addr-line>, <country>Pakistan</country>
</aff>
<aff id="aff5">
<sup>5</sup>
<institution>School of Electrical Engineering</institution>, <institution>Southeast University</institution>, <addr-line>Nanjing</addr-line>, <country>China</country>
</aff>
<aff id="aff6">
<sup>6</sup>
<institution>Department of Statistics</institution>, <institution>Abdul Wali Khan University</institution>, <addr-line>Mardan</addr-line>, <country>Pakistan</country>
</aff>
<aff id="aff7">
<sup>7</sup>
<institution>Department of Industrial Engineering</institution>, <institution>College of Engineering</institution>, <institution>Northern Border University</institution>, <addr-line>Arar</addr-line>, <country>Saudi Arabia</country>
</aff>
<aff id="aff8">
<sup>8</sup>
<institution>Department of Electrical Engineering</institution>, <institution>College of Engineering</institution>, <institution>Northern Border University</institution>, <addr-line>Arar</addr-line>, <country>Saudi Arabia</country>
</aff>
<aff id="aff9">
<sup>9</sup>
<institution>Department of Electrical Engineering</institution>, <institution>Higher Institute of Applied Sciences and Technology of Kasserine</institution>, <institution>University of Kairouan</institution>, <addr-line>Kairouan</addr-line>, <country>Tunisia</country>
</aff>
<aff id="aff10">
<sup>10</sup>
<institution>Department of Electrical Engineering</institution>, <institution>University of Business and Technology</institution>, <addr-line>Jeddah</addr-line>, <country>Saudi Arabia</country>
</aff>
<aff id="aff11">
<sup>11</sup>
<institution>Department of Engineering Mathematics, and Physics</institution>, <institution>Faculty of Engineering</institution>, <institution>Alexandria University</institution>, <addr-line>Alexandria</addr-line>, <country>Egypt</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/808496/overview">Haris M. Khalid</ext-link>, University of Dubai, United Arab Emirates</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/811727/overview">Nishant Kumar</ext-link>, Indian Institute of Technology Jodhpur, India</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/615262/overview">Kenneth E. Okedu</ext-link>, Melbourne Institute of Technology, Australia</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Mouloud Aoudia, <email>mouloud.aoudia@nbu.edu.sa&#x200a;</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>20</day>
<month>03</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>12</volume>
<elocation-id>1383090</elocation-id>
<history>
<date date-type="received">
<day>06</day>
<month>02</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>06</day>
<month>03</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Iftikhar, Khan, Raza, Abbas, Khan, Aoudia, Touti and Emara.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Iftikhar, Khan, Raza, Abbas, Khan, Aoudia, Touti and Emara</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Nowadays, electricity theft is a major issue in many countries and poses a significant financial loss for global power utilities. Conventional Electricity Theft Detection (ETD) models face challenges such as the curse of dimensionality and highly imbalanced electricity consumption data distribution. To overcome these problems, a hybrid system Multi-Layer Perceptron (MLP) approach with Gated Recurrent Units (GRU) is proposed in this work. The proposed hybrid system is applied to analyze and solve electricity theft using data from the Chinese National Grid Corporation (CNGC). In the proposed hybrid system, first, preprocess the data; second, balance the data using the k-means Synthetic Minority Oversampling Technique (SMOTE) technique; third, apply the GTU model to the extracted purified data; fourth, apply the MLP model to the extracted purified data; and finally, evaluate the performance of the proposed system using different performance measures such as graphical analysis and a statistical test. To verify the consistency of our proposed hybrid system, we use three different ratios for training and testing the dataset. The outcomes show that the proposed hybrid system for ETD is highly accurate and efficient compared to the other models like Alexnet, GRU, Bidirectional Gated Recurrent Unit (BGRU) and Recurrent Neural Network (RNN).</p>
</abstract>
<kwd-group>
<kwd>electricity theft detection</kwd>
<kwd>anomaly detection</kwd>
<kwd>smart grid</kwd>
<kwd>machine learning</kwd>
<kwd>economic development</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Smart Grids</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Electric energy is a fundamental requirement for daily life activities and processes in the modern world. Using energy resources is essential for the economic development and growth of every country worldwide (<xref ref-type="bibr" rid="B40">Lowitzsch et al., 2020</xref>). However, crises can arise when energy consumption exceeds production, leading to a shortfall and interruption in energy supplies (<xref ref-type="bibr" rid="B54">Ren et al., 2021</xref>). Many underdeveloped and economically unstable countries, including the India, Indonesia, Malaysia, Pakistan, Nigeria, Ethopia and China, are currently facing energy crises (<xref ref-type="bibr" rid="B45">&#xd8;stergaard et al., 2021</xref>). Electricity is one of the primary forms of energy used globally, and the demand for it is rapidly increasing. However, many developed and developing countries face electricity crises due to Technical Losses (TL) and Non-Technical Losses (NTLs) (<xref ref-type="bibr" rid="B34">Kumar et al., 2019</xref>). NTLs are caused by fraud, electricity theft, tampering with the recording process, and non-billing of electricity (<xref ref-type="bibr" rid="B50">Rahman et al., 2020</xref>). To mitigate NTLs, modern methods for detecting fraud and electricity theft are required. NTLs are the primary cause of revenue loss in smart grids (<xref ref-type="bibr" rid="B57">Stracqualursi et al., 2023</xref>). Recent studies have revealed that NTLs result in global annual losses of USD 89.3 billion in the utility sector of electrical energy (<xref ref-type="bibr" rid="B16">de Souza et al., 2020</xref>). The problem of NTLs is still relevant in both developed and developing countries. Normally, energy losses in developed countries range between 0.5% and 3% yearly in revenue collection (<xref ref-type="bibr" rid="B47">Park and Kim, 2020</xref>; <xref ref-type="bibr" rid="B36">Kumar et al., 2020</xref>). In developing countries, the losses are approximately 4.5 billion USD annually, accounting for about 50% of electricity produced (<xref ref-type="bibr" rid="B49">Quasim et al., 2023</xref>). Developed countries like the United Kingdom (UK) and the United States of America (United States of America) face annual losses ranging from 1 to 6 billion USD (<xref ref-type="bibr" rid="B18">Duarte Soares et al., 2022</xref>). Pakistan also faces NTLs of 0.89 billion USD per annum due to non-billing and electricity theft (<xref ref-type="bibr" rid="B53">Rehan et al., 2023</xref>). NTLs can be intentional or unintentional, and many power supply companies try to detect and reduce them efficiently (<xref ref-type="bibr" rid="B62">Zhang et al., 2020</xref>). Due to the rise in electricity fraud, several methods have been adopted to automatically detect electricity theft, like assessing electricity consumption records (<xref ref-type="bibr" rid="B33">Kocaman and T&#xfc;men, 2020</xref>). Hardware and data-driven solutions are implemented to mitigate NTLs. Hardware solutions commonly use grid system variables, including power, voltage, and current, while data-driven solutions analyze and mine consumers&#x2019; load profiling and other information to detect NTLs (<xref ref-type="bibr" rid="B44">Muzumdar et al., 2022</xref>). However, it faces many obstacles in ETD and fraudulent consumers due to its technical theft strategies, including line tapping, meter tempering, etc., and needs extra devices for implementation (<xref ref-type="bibr" rid="B13">Chandrasekhar et al., 2020</xref>). Hence, it is costly, Furthermore, to tackle the NTLs and ETD in smart grids, Advanced Metering Infrastructure (AMI) is better than old mechanical metering (<xref ref-type="bibr" rid="B55">Saxena et al., 2021</xref>).</p>
<p>Due to the increase in the number of electricity thieves, the electric utilities are facing problems in providing electricity to their consumers in an efficient way (<xref ref-type="bibr" rid="B60">Xie, 2023</xref>). An accurate ETD is quite challenging due to the inaccurate classification on the imbalance electricity consumption data, the overfitting issues and the high false positive rate of the existing techniques (<xref ref-type="bibr" rid="B9">Blazakis et al., 2020</xref>). Therefore, intensified research is needed to accurately detect the electricity thieves and to recover a huge revenue loss for utility companies. To address the above limitations, this paper presents a new model, which is based on the supervised machine learning techniques and real electricity consumption data.</p>
<p>In this study, we propose a new hybrid system based on deep learning models that accurately detect electricity theft in smart grids while also being efficient. The first step involves preprocessing the data and replacing the missing values using a simple imputer method. Next, we use the standard-scalar approach to execute a min-max operation for data normalization. After data preparation is finished, we obtain samples for typical users. We then balance the data using k-means SMOTE to create samples for fraudulent users by altering honest samples with current theft attacks. In the third step, the balanced data from the previous stage is used for classification purposes. The MLP and GRU modules were created in Python<sup>&#xae;</sup> using balanced smart meter data and supplementary data as input for prediction. We apply efficient performance criteria in the final phase to investigate the results. To validate the proposed model&#x2019;s performance using various performance measures, including accuracy, F1-score, precision, and recall. In addition, we also test the consistency and efficiency of the trained model on new samples in the second phase to identify whether the new sample belongs to the honest class or the malicious. The main applications of this paper are: the proposed approach provides the solution for the problem present in the power sector, such as to wastage of electrical power due to electricity theft. This model can efficiently be applied by the utility companies using the real electricity consumption data to identify the electricity thieves and reduce the energy wastage and finally, the proposed approach can be used against the all types of consumers who steal the electricity.</p>
<p>The key contributions of this paper: A comprehensive data pre-processing is performed using interpolation, three sigma rule, and normalization methods to deal with missing values and outliers in the dataset. The data pre-processing step gives the refined input, which improves the performance of the classifier. A class balancing technique, K-means SMOOTHE, is proposed to address the problem of imbalance data. MLP is applied to predict final misclassification, which improves the performance along with MLP, GRU technique is utilized for efficient parameter optimization of the classifier. The complete procedure of the proposed hybrid system (MLP-GRU) for ETD is: first, preprocess the data; second, balance the data; third, apply the GRU model to the extracted purified data; fourth, apply the MLP model to the extracted purified data; and finally, evaluate the performance of the proposed system using different performance measures like a graphical analysis and a statistical test. We conduct extensive simulations on real electricity consumption data set and for comparative analysis, precision, recall, F1-score, Matthews Correlation Coefficient (MCC), Receiving Operating Characteristics Area Under Curve (ROC-AUC), and Precision Recall Area Under Curve (PR-AUC) are used as performance metrics.</p>
<p>The rest of the article is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> contains the existing literature and <xref ref-type="sec" rid="s3">Section 3</xref> consists of a proposed hybrid system. <xref ref-type="sec" rid="s4">Section 4</xref> discusses the results and compared the results with the best studies available in literature. Finally, <xref ref-type="sec" rid="s5">Section 5</xref> presents a conclusion and directions for future research work.</p>
</sec>
<sec id="s2">
<title>2 Review of existing literature</title>
<p>The problem of ETD and NTLs is rising quickly at global scale, and researchers are developing techniques to tackle this problem by applying statistical, machine learning, and deep learning models (<xref ref-type="bibr" rid="B25">Jaiswal et al., 2020</xref>). The machine learning models, including Random Forest (RF), Decision trees (DT), Bagging Ensemble (BE), Artificial Neural Networks (ANN), and K-Nearest Neighbors (KNN), were comparatively evaluated for automated ETD in smart grid environments and found RF yields 10% more improved accuracy in ETD compared to other used methods (<xref ref-type="bibr" rid="B64">Zidi et al., 2023</xref>). The rapid growth in NTLs and electricity thefts are the major challenges for distribution network operators. In (<xref ref-type="bibr" rid="B19">Fei et al., 2022</xref>) neural network model based on Neural Architecture Search (NAS) is developed to analyze and detect electricity theft in missing value scenarios through density-based spatial clustering of application and noise clustering technique and achieved an excellent result of AUC of 0.926 in the NTLs and ETD. The authors in (<xref ref-type="bibr" rid="B8">Banga et al., 2022</xref>) used different deep learning models for NTLs and ETD, including GRU, Long Short-Term Memory (LSTM) models, MLP, and Convolutional Neural Networks (CNN). However, these models lack efficient hyper parameter tuning, which leads to poor generalization for tackling these issues.</p>
<p>The researchers in (<xref ref-type="bibr" rid="B5">Asif et al., 2022</xref>) proposed hybrid deep learn ing models based on Bidirectional Long Short-Term Memory (Bi-LSTM) networks and Two-Dimensional Convolutional Neural Networks (2D-CNN) to detect NTLs in smart meters, and they outperformed other methods with ROC 0.97 and AUC 0.98 in smart meters data. In detecting NTLs and ETD, the problem of class imbalance, the curse of dimensionality reduction, and inappropriate tuning of hyper parameters arise in commonly used machine learning and deep learning models. Therefore, to cope with these problems, the authors in (<xref ref-type="bibr" rid="B59">Ullah et al., 2022</xref>) proposed a hybrid deep learning method based on Alexnet and Adaboost for ETD in smart grids. They achieved the best performance results compared to other methods used, and the problem of class imbalance and the curse of dimensionality is being tackled by under-sampling techniques and tuning hyper parameters by the Artificial bee Colony (ABC) optimization algorithm. Furthermore, the authors in (<xref ref-type="bibr" rid="B35">Kumar et al., 2022</xref>) proposed a hybrid method based on CNN and RF to predict ETD in power grids accurately. The RF is employed for classification, while CNN efficiently extracts the potential features. A deep learning-based hybrid model is designed by (<xref ref-type="bibr" rid="B23">Hasan et al., 2019</xref>), which uses the pros of both CNN and LSTM models and efficiently extracted the hidden patterns and temporal correlation in ETD of consumers in smart grid systems, respectively. The researchers in (<xref ref-type="bibr" rid="B22">Gupta et al., 2022</xref>) proposed a Deep Neural Network (DNN) model, first they resolved the dimensionality problem, and then important features were selected for the detection of fraud in the electricity consumption of the smart grid. The ETD results show the proposed method&#x2019;s best performance over the other used models. The problem of diverse theft patterns in electricity consumption due to a significant class imbalance in data leads to higher false positive rates, and ensemble models fail to detect NTLs. Hence, the authors in (<xref ref-type="bibr" rid="B3">Alameady et al., 2022</xref>) tried to overcome this issue by proposing hybrid neural networks named MLP-GRU for detecting electricity thefts in smart meter data by analyzing the auxiliary information of the consumers.</p>
<p>With the advent of smart meters, different types of electricity theft techniques have been adopted, and their detection is very difficult using conventional methods. The researchers in (<xref ref-type="bibr" rid="B39">Li et al., 2019</xref>) designed a statistical and machine learning-based Internet of Things (IoT) system to identify and notify electricity consumers about electricity thefts. Many studies based on data-driven techniques have been used for NTLs identification in the literature. Most studies have focused on boosting approaches, and less attention is given to bagging approaches like Extra Trees (ET) and RF (<xref ref-type="bibr" rid="B56">Siu et al., 2022</xref>). Furthermore, commonly used machine learning models such as Support Vector Machine (SVM) and neural networks yield a higher false positive rate and a lower detection rate in ETD (<xref ref-type="bibr" rid="B2">Ahir and Chakraborty, 2022</xref>). The authors in (<xref ref-type="bibr" rid="B20">Gong et al., 2020</xref>) have explored a Conditional Variation Auto-Encoder (CVAE) combined with CNN for extracting relevant features from high-dimensional data and presented a solution to the problem of data augmentation. Furthermore, many studies and experiments have been conducted on ETD in AMI through machine learning techniques (<xref ref-type="bibr" rid="B7">Aziz et al., 2020</xref>). The researchers in (<xref ref-type="bibr" rid="B27">Jokar et al., 2015</xref>) implemented a pattern recognition technique based on unsupervised learning models for ETD in the data set of smart meters.</p>
<p>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyber attacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system (<xref ref-type="bibr" rid="B30">Khalid et al., 2019</xref>).</p>
<p>IoT is a developing technology that provides the simplicity and benefits of exchanging data with other devices using the cloud or wireless networks. However, the changes and developments in the Internet of Things (IoT) environment are making IoT systems susceptible to cyber attacks which could possibly lead to malicious intrusions. The impacts of these intrusions could lead to physical and economical damages. This article primarily focuses on the IoT system/framework, the IoT, learning-based methods, and the difficulties faced by the IoT devices or systems after the occurrence of an attack. Learning-based methods are reviewed using different types of cyber attacks, such as denial-of-service (DoS), distributed denial-of-service (DDoS), probing, user-to-root (U2R), remote-to-local (R2L), botnet attack, spoofing, and man-in-the-middle (MITM) attacks (<xref ref-type="bibr" rid="B24">Inayat et al., 2022</xref>).</p>
<p>Synchrophasor-based wide-area monitoring system (WAMS) applications are vital for acquiring the real-time grid information under ambient and nonlinear conditions. The high dependence on sensor data and signal-processing software for daily grid operation is becoming a concern in an era prone to cyberattacks. To resolve this issue, a mixture density-based maximum likelihood (MDML) estimation was proposed to detect attack vectors. The algorithm was deployed at each monitoring node using a track-level fusion (TLF)-based architecture. A parallelized message passing interface (MPI)-based computing was processed to reduce its computational burden. This work adopted a mature application known as oscillation detection as an example of a monitoring candidate to demonstrate the proposed method (<xref ref-type="bibr" rid="B31">Khalid et al., 2023</xref>).</p>
<p>This paper introduces the theft detection method which uses comprehensive features in time and frequency domains in a deep neural network-based classification approach. We address dataset weaknesses such as missing data and class imbalance problems through data interpolation and synthetic data generation processes. We analyze and compare the contribution of features from both time and frequency domains, run experiments in combined and reduced feature space using principal component analysis and finally incorporate minimum redundancy maximum relevance scheme for validating the most important features. We improve the electricity theft detection performance by optimizing hyper-parameters using a Bayesian optimizer and we employ an adaptive moment estimation optimizer to carry out experiments using different values of key parameters to determine the optimal settings that achieve the best accuracy (<xref ref-type="bibr" rid="B38">Lepolesa et al., 2022</xref>).</p>
<p>This work proposes two novel methods to resolve the above-mentioned issues: Tomek Link Borderline Synthetic Minority Oversampling Technique with Support Vector Machine (TBSSVM) and Temporal Convolutional Network with Enhanced Multi-Layer Perceptron (TCN-EMLP). The former resamples the data by balancing the majority and minority class instances. Whereas, the latter classifies normal and fraudulent consumers. Moreover, deep learning models suffer from high variance in their final results due to the assignment of different weights. Therefore, an averaging ensemble strategy is applied in this work to reduce the high variance (<xref ref-type="bibr" rid="B4">Arif et al., 2022</xref>).</p>
<p>In previous literature, most research focused on non-malicious electricity consumption patterns and showed low detection rates for NTLs. In (<xref ref-type="bibr" rid="B17">Ding et al., 2019</xref>), the authors proposed a hybrid approach based on the enhanced internal structure of the LSTM model with a combination of the Gaussian Mixture Model (GMM). However, it only applies to low-dimensional data and is not robust to outliers. In further studies (<xref ref-type="bibr" rid="B26">Jindal et al., 2016</xref>), a hybrid method based on SVM has been proposed for detecting fraudulent consumers but has not shown an effective performance in the overall technical evaluation. The authors (<xref ref-type="bibr" rid="B29">Kabir et al., 2022</xref>; <xref ref-type="bibr" rid="B37">Kumari et al., 2022</xref>) proposed a hybrid deep learning model based on Multi-Layer Perceptron (MLP) and Gated Recurrent Unit (GRU) for the detection of electricity thefts and NTLs in smart meter data. The MLP network is used for analyzing non-malicious factors on auxiliary information in the daily consumption of electricity data, while the GRU network is used for analyzing smart meter data. Furthermore, a random search algorithm turns hyper-parameters and performs better than other methods.</p>
</sec>
<sec id="s3">
<title>3 Research method</title>
<p>In this section, we discuss in detail the complete procedure of the proposed hybrid system for ETD. To do this, first, preprocess the data; second, balance the data; third, apply the GRU model to the extracted purified data; fourth, apply the MLP model to the extracted purified data; and finally, evaluate the performance of the proposed system using different performance measures like a graphical analysis and a statistical test. The framework of proposed method is given in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Flow chart of the proposed model for ETD.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g001.tif"/>
</fig>
<sec id="s3-1">
<title>3.1 Preprocessing of raw data</title>
<p>In this work, the proposed hybrid system is applied to the electricity consumption data from the CNGC dataset, which is both authentic and accessible. The dataset contains 42,372 records of total consumer, of which 38,752 are honest and share information on regular basis, and 3615 are records of theft consumers. The dataset&#x2019;s sample interval is set to once per day. The entire electricity consumption value is represented in the dataset as rows, while the electricity consumption value for a certain day is provided as a column. Moreover, statistics are gathered during onsite inspections. However, the electricity consumption dataset comprises outliers, missing values, and extremely dispersed data. These irregularities must be corrected before developing the ETD model. Preprocessing is necessary in this case to recover the missing values, reduce the outliers, and normalize the data within a certain range. The entire amount of consumer data was 42,372 before pre-processing; however, five rows were eliminated by the Simple Imputer (SI) approach after preprocessing since all of the data in such rows were missing values. When this occurs, the SI is unsure of the value that should be ascribed. If the imputer discovers at least one actual value in the targeted record, it will impute some values rather than delete them. It is also crucial to keep in mind that the SI method operates column-wise, therefore you must transpose your data before using the imputer approach. Take the data&#x2019;s transposition once more after imputation to return it to its original shape. The electricity consumption patterns of two consumers, the dishonest consumer, and the honest consumer, are shown in <xref ref-type="fig" rid="F2">Figure 2</xref>. It demonstrates that the electrical thief has irregular electricity consumption patterns and that meter manipulation caused its electricity consumption value to decrease. In contrast, an unbiased consumer displays typical electricity consumption patterns.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>EC Pattern of honest (blue) and dishonest (red) customers.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g002.tif"/>
</fig>
</sec>
<sec id="s3-2">
<title>3.2 Data balancing and augmentation using K means SMOOTE</title>
<p>Once the data set has been cleaned, the next step is to balance the data set. In this regard, there are fewer dishonest users&#x2019; consumption samples in the real world. It is an unbalanced dataset, and the machine learning, deep learning, or hybrid models during training are biased toward the majority of class samples. Moreover, they neglect occurrences of minority classes that affect performance. Numerous resampling approaches have been presented in the literature to address this issue (<xref ref-type="bibr" rid="B15">Chung, 2014</xref>; <xref ref-type="bibr" rid="B63">Zheng et al., 2017</xref>; <xref ref-type="bibr" rid="B17">Ding et al., 2019</xref>). To do this, the k-means SMOTE algorithm and augmentation techniques are combined in this study to simultaneously over and under sample data classes to address the imbalance problem. Removing the majority of class links until both classes have an equal number of entities achieves the stated goal. The pseudo-code of the k-means SMOTE algorithm is given in <xref ref-type="table" rid="T1">Table 1</xref>, and an example of synthetic data generation through k-means SMOTE can be seen in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Pseudo-code of the k-means SMOTE algorithm.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">K-means SMOTE technique</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Inputs:</td>
</tr>
<tr>
<td align="left">Minority class samples Xmin</td>
</tr>
<tr>
<td align="left">Number of nearest neighbors K</td>
</tr>
<tr>
<td align="left">Output:</td>
</tr>
<tr>
<td align="left">Synthetically generated minority class samples (Xsyn)</td>
</tr>
<tr>
<td align="left">Cluster the minority class samples Xm in using the K-means algorithm with K clusters</td>
</tr>
<tr>
<td align="left">Let C1, C2,. and CK be the resulting clusters</td>
</tr>
<tr>
<td align="left">For each cluster Ci: a. Find the k-nearest neighbors of each sample in Ci using a distance metric (e.g., Euclidean distance). Let NNi denote the set of nearest neighbors of Ci.</td>
</tr>
<tr>
<td align="left">b. For each sample in Ci, randomly select one of its k nearest neighbors from NNi and generate N/K synthetic samples by interpolating between the sample and its selected neighbor. Add the synthetic samples to the set (Xsyn)</td>
</tr>
<tr>
<td align="left">c. Return the set of synthetically generated minority class samples (Xsyn)</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Synthetic data generation through k-means SMOTE.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g003.tif"/>
</fig>
</sec>
<sec id="s3-3">
<title>3.3 The proposed model</title>
<p>After the data set has been cleaned and balanced, the next step is to model the purified data set. To this end, within the proposed hybrid system, we combine the features of MLP and GRU models to obtain a new hybrid deep learning model. The GRU network uses smart meter data from the CNGC dataset as input, and the MLP network observes ancillary data with techniques that explore non-harmful elements within electricity consumption data. The details about the GRU, MLP, and the proposed hybrid model (GRU-MLP) are in the following subsections.</p>
<sec id="s3-3-1">
<title>3.3.1 Gated recurrent unit</title>
<p>In general, it can be noticed that electricity consumption patterns fluctuate a lot more than those of regular consumers. To identify co-occurring connections in time series data, 1D data is supplied into the GRU model. To identify comparable dependencies in time series data, Chung et al. presented the GRU algorithm in (<xref ref-type="bibr" rid="B17">Ding et al., 2019</xref>). It features memory modules to store significant periodic patterns, which aids in managing unexpected variations in electricity consumption patterns brought on by regular occurrences like varying weather conditions, large home parties, weekends, etc. Moreover, it addresses the vanishing gradient issue with RNN. LSTM and GRU are regarded as RNN variations. The effectiveness of LSTM and GRU with an RNN model on various sequential datasets is compared by the authors in (<xref ref-type="bibr" rid="B12">Buzau et al., 2019</xref>). The vanishing gradient issue of the RNN is resolved by both models, which outperform it. The authors in (<xref ref-type="bibr" rid="B6">Aslam et al., 2020</xref>) conduct comprehensive tests on 10,000 RNN and LSTM designs. Their final experimental findings demonstrate that GRU is the only model that outperforms all others. Based on the analysis above, we chose GRU to extract the best features from the electricity consumption dataset because it performs well on sequential datasets. It has gates for resetting, updates and regulate the data that moves inside the network. The update gate determines how much historical data should be kept for decision-making in the future. Conversely, the reset gate determines how much historical data should be retained or deleted. Update and reset gate equations are related to one another. Yet, the use of weights and gates accounts for the distinction. The GRU model&#x2019;s mathematical Eqs <xref ref-type="disp-formula" rid="e1">1</xref>&#x2013;<xref ref-type="disp-formula" rid="e4">4</xref> (<xref ref-type="bibr" rid="B28">Kabir et al., 2021</xref>) are provided below:<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="normal">z</mml:mi>
<mml:mi mathvariant="normal">t</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>Z</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>
<disp-formula id="e2">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
<disp-formula id="e3">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mover accent="true">
<mml:mi>h</mml:mi>
<mml:mo>&#x5e;</mml:mo>
</mml:mover>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi mathvariant="italic">tanh</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
<mml:mo>,</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2217;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
<disp-formula id="e4">
<mml:math id="m4">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2217;</mml:mo>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2217;</mml:mo>
<mml:mover accent="true">
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
</mml:mrow>
</mml:msub>
<mml:mo>&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>In these equations, update gate <inline-formula id="inf1">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> controls the extent to which states information from the previous moment is substituted into the current state, and reset gate <inline-formula id="inf2">
<mml:math id="m6">
<mml:mrow>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> controls the extent to which state information from the previous moment is ignored. <inline-formula id="inf3">
<mml:math id="m7">
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the activation function. The candidate activation <inline-formula id="inf4">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> is computed with the reset gate <inline-formula id="inf5">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> (which control how much of the previous information needs to be retained), and &#x2217; denotes the element wise multiply operation. Finally, <inline-formula id="inf6">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> represents the actual activation of the proposed GRU unit at time t, which is a linear interpolation between the previous activation <inline-formula id="inf7">
<mml:math id="m11">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> and the candidate activation <inline-formula id="inf8">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
<sec id="s3-3-2">
<title>3.3.2 Multi-layered perceptron network</title>
<p>The MLP network is used to evaluate the auxiliary dataset. There are multiple layers of hidden neurons in the MLP. These hidden layers in the MLP network are selected using the validation dataset.<disp-formula id="e5">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2a;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>B</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>&#x201c;Where&#x201d;,&#x2009;<inline-formula id="inf9">
<mml:math id="m14">
<mml:mrow>
<mml:mi mathvariant="normal">&#x2148;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>.</mml:mo>
<mml:mi>N</mml:mi>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>
<disp-formula id="e6">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi>Y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2a;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>B</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<p>Eq. <xref ref-type="disp-formula" rid="e5">5</xref> specify that <inline-formula id="inf10">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> refers to the weights of layer n, <inline-formula id="inf11">
<mml:math id="m17">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for the input layer&#x2019;s prior hidden states, and <inline-formula id="inf12">
<mml:math id="m18">
<mml:mrow>
<mml:msub>
<mml:mi>B</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for the bias. The activation function, which activates the neuron, is called after the input values have been processed, and it decides whether or not to pass the values to the subsequent layer. The sigmoid activation function is represented by <inline-formula id="inf13">
<mml:math id="m19">
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. The output layer, designated as <inline-formula id="inf14">
<mml:math id="m20">
<mml:mrow>
<mml:msub>
<mml:mi>Y</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, is shown in Eq. <xref ref-type="disp-formula" rid="e6">6</xref>. In this study, the final output layer was activated using a sigmoid activation function for the binary classification, while the hidden layer was activated using the Rectified Linear Unit (ReLU) (<xref ref-type="bibr" rid="B42">Mukhopadhyay, 2019</xref>). Using a batch normalization layer to normalize the input values sped up the network convergence. A dropout layer was then included as a regularization method to avoid overfitting.</p>
</sec>
<sec id="s3-3-3">
<title>3.3.3 Hybrid MLP-GRU model</title>
<p>The hybrid neural network composed of MLP and GRU is introduced in the proposed work. Electricity consumption data is used as input into the proposed GRU-MLP network. The proposed methodology was motivated by research for identifying electricity theft done in (<xref ref-type="bibr" rid="B14">Cheng et al., 2021</xref>). The research in (<xref ref-type="bibr" rid="B61">Xu et al., 2018</xref>) generated the LSTM-MLP hybrid neural network classifier. The GRU module with 100 neurons receives the preprocessed smart meter energy consumption data. The number of neurons in the GRU layer is two times higher than in the MLP model. The GRU layer generalizes the embedding at a lower computational cost with comparatively fewer cells. Since the data includes low-dimensional features, auxiliary data with 20 neurons is sent as input to the MLP module. The data is normalized using the batch normalization approach until submitted to the final dense layer. The final layer has just one neuron with a sigmoid activation mechanism. The pseudo-code of the MLP-GRU technique is given in <xref ref-type="table" rid="T2">Table 2</xref>. On the other hand, an overview of the proposed hybrid system can be seen in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Pseudo-code of the MLP-GRU technique.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Algorithms of the proposed hybrid (MLP-GRU) model</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Inputs:</td>
</tr>
<tr>
<td align="left">SGCC dataset with features X and labels y</td>
</tr>
<tr>
<td align="left">Number of epochs n&#x2013;epochs</td>
</tr>
<tr>
<td align="left">Batch size batch&#x2013;size</td>
</tr>
<tr>
<td align="left">Learning rate lr</td>
</tr>
<tr>
<td align="left">Number of GRU units n&#x2013;units</td>
</tr>
<tr>
<td align="left">Number of MLP layers n&#x2013;layers</td>
</tr>
<tr>
<td align="left">Dropout rate dropout&#x2013;rate</td>
</tr>
<tr>
<td align="left">Output:</td>
</tr>
<tr>
<td align="left">Trained MLP-GRU model with confusion matrix</td>
</tr>
<tr>
<td align="left">Split the CNGC dataset into training, validation, and testing sets</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>An overview of the proposed hybrid system.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g004.tif"/>
</fig>
<p>Initialize the MLP-GRU model:<list list-type="simple">
<list-item>
<p>a. Create an MLP with n&#x2212;layers fully connected layers and Rectified Linear Unit (ReLU) activation function. Each layer should have dropout rate.</p>
</list-item>
<list-item>
<p>b. Create a GRU layer with n&#x2212;units hidden units and a sigmoid activation function.</p>
</list-item>
<list-item>
<p>c. Concatenate the output of the MLP and the GRU layer.</p>
</list-item>
<list-item>
<p>d. Add a final fully connected layer with a sigmoid activation function.</p>
</list-item>
</list>
</p>
<p>Train the MLP-GRU model:<list list-type="simple">
<list-item>
<p>a. Define the binary cross-entropy loss function and the Adam optimizer with learning rate.</p>
</list-item>
<list-item>
<p>b. Train the model for n-epochs with a batch size of batch-size.</p>
</list-item>
<list-item>
<p>c. Evaluate the model on the validation set after each epoch and save the best model.</p>
</list-item>
</list>
</p>
<p>The training, validation, testing and best performance data for MLP-GRU model for theft detection is given in <xref ref-type="fig" rid="F5">Figure 5</xref>.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Performance graph showing the training, validation, testing and best performance after nine epochs for MLP-GRU model.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g005.tif"/>
</fig>
</sec>
</sec>
<sec id="s3-4">
<title>3.4 Benchmark models</title>
<p>In this section, we explore some standard existing models that are compared with the proposed hybrid model, such as Alexnet, GRU, BGRU, and RNN as follows:<list list-type="simple">
<list-item>
<p>1. Alexnet: It is a deep CNN architecture that is widely recognized as one of the key break throughs in the field of computer vision and deep learning, as it achieved a significant improvement in image classification accuracy on the ImageNet dataset. The AlexNet architecture consists of five convolutional layers, followed by three fully connected layers and a final softmax layer for classification. It also incorporates several novel techniques, including ReLU as activation functions, data augmentation through image mirroring and cropping, and dropout regularization to prevent overfitting. One of the major contributions of AlexNet was demonstrating the effectiveness of deep learning for image recognition tasks and paving the way for subsequent advances in the field. Many state-of-the-art CNN architectures build on the foundations laid by AlexNet and continue to push the boundaries of image recognition and other computer vision tasks (<xref ref-type="bibr" rid="B32">Khan et al., 2024</xref>).</p>
</list-item>
<list-item>
<p>2. GRU: It is a type of RNN architecture that addresses the vanishing gradient problem and allows for capturing long-term dependencies in sequential data. It was introduced as an alternative to the traditional Long Short-Term Memory (LSTM) units, offering a simpler and more computationally efficient design. GRU units consist of update and reset gates, which control the flow of information within the network. The update gate determines how much of the previous hidden state should be retained and how much of the new input should be added. The reset gate helps the network decide how much of the previous hidden state is relevant for the current input. These gates enable GRUs to selectively update and reset their hidden state based on the input sequence, allowing them to capture both short-term and long-term dependencies. One advantage of GRUs over LSTMs is their simplified architecture, which leads to faster training times and requires fewer parameters. This can be particularly beneficial when dealing with large datasets or limited computational resources. Additionally, GRUs have shown comparable performance to LSTMs on various tasks, such as language modeling, speech recognition, machine translation, and sentiment analysis. The GRU technique has proven effective in modeling sequential data due to its ability to handle both short-term and long-term dependencies. It has been widely adopted in various fields, including natural language processing, time series analysis, and sequential data generation. Researchers and practitioners continue exploring and refining GRU-based models, exploring variations and combining them with other techniques to improve their performance and accuracy (<xref ref-type="bibr" rid="B43">Munawar et al., 2021</xref>).</p>
</list-item>
<list-item>
<p>3. BGRU: It is also a deep learning architecture commonly used for sequential data modeling, such as text, speech, and time series data. It is an extension of the standard GRU architecture incorporating bidirectional processing, allowing the network to learn from past and future input sequences. The architecture consists of two parallel GRU layers, one processing the input sequence in a forward direction and the other in a backward direction. The outputs of these two layers are then concatenated and passed through a dense layer for classification or regression. BGRU is particularly useful for applications where context information from past and future input sequences is important, such as in natural language processing tasks like sentiment analysis, named entity recognition, and machine translation. BGRU has been shown to achieve stateof-the-art performance on a wide range of tasks and is often used as a baseline model for comparison with more complex architectures. Overall, BGRU is a powerful and versatile deep-learning technique for sequential data modeling that has become increasingly popular recently. The RNNs are deep learning models commonly used for sequential data processing, such as text, speech, and time-series data. Unlike traditional neural networks that take fixed-size inputs and produce fixed-size outputs, RNNs are designed to operate on variable length sequences. They achieve this by including loops within the network that allow information to persist over time. This makes them particularly effective at processing inputs that have a temporal or sequential nature (<xref ref-type="bibr" rid="B21">Gul, 2020</xref>).</p>
</list-item>
<list-item>
<p>4. RNN: The basic RNN architecture consists of a single recurrent layer that processes input sequences one element at a time while maintaining a hidden state that captures the network&#x2019;s internal representation of the input sequence up to that point. However, standard RNNs can suffer from the vanishing gradient problem, making it difficult to learn long-term dependencies in the data. More advanced RNN architectures have been developed to address this issue, including LSTM and GRU networks. These architectures incorporate specialized gating mechanisms that allow the network to selectively remember or forget information over time, making them more effective at processing longer input sequences. RNNs have shown impressive results in various applications, including natural language processing, speech recognition, and time-series forecasting (<xref ref-type="bibr" rid="B10">Bohani et al., 2021</xref>).</p>
</list-item>
</list>
</p>
</sec>
<sec id="s3-5">
<title>3.5 Performance matrix</title>
<p>This section provides an in-depth analysis to evaluate the proposed hybrid system performance with that of the considered benchmark models. In this study, accuracy, F1-score, precision, recall, and Matthews&#x2019; correlation coefficient (MCC) are performance indicators used to verify the effectiveness of the proposed techniques. These are derived from the confusion matrix parameters True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN), which, respectively, reflect the ratio of consumers who are classified as honest consumers correctly, incorrectly as normal consumers, fraudulent users correctly, and users incorrectly classified as fraudulent users. One of the most frequently used measures to show the model&#x2019;s percentage of precise prediction is accuracy. The mathematical Eq. <xref ref-type="disp-formula" rid="e7">7</xref> for the accuracy is given by (<xref ref-type="bibr" rid="B64">Zidi et al., 2023</xref>):<disp-formula id="e7">
<mml:math id="m21">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>N</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mi>N</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
</p>
<p>Increasing the True Positive Rate (TPR), Fraud Detection Rate (FDR), and low false positive rate is the main goal of ETD (<xref ref-type="bibr" rid="B26">Jindal et al., 2016</xref>). To detect NTLs using binary classification, the ROC-AUC is a suitable metric. To create it, TPR, also known as recall, is plotted against false positive rate while the decision thresholds are being adjusted. The range of the score is 0&#x2013;1. In the event of a class imbalance issue, it is a more precise measurement. False positive rate and TPR are helpful metrics for evaluating a model&#x2019;s effectiveness at detecting NTLs, but they do not account for precision. Hence, PR-AUC is a helpful metric that is also an appropriate measure for imbalanced datasets to assess the model&#x2019;s precision. Thus, the mathematical form for the precision, recall, F1-score, and MCC are given in Eqs <xref ref-type="disp-formula" rid="e8">8</xref>&#x2013;<xref ref-type="disp-formula" rid="e11">11</xref> (<xref ref-type="bibr" rid="B52">Razavi et al., 2019</xref>).<disp-formula id="e8">
<mml:math id="m22">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
<disp-formula id="e9">
<mml:math id="m23">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
<disp-formula id="e10">
<mml:math id="m24">
<mml:mrow>
<mml:mi>F</mml:mi>
<mml:mn>1</mml:mn>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>S</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>&#x2217;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#x2217;</mml:mo>
<mml:mi>R</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>l</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>R</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>
<disp-formula id="e11">
<mml:math id="m25">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>C</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mi>N</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2217;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:msqrt>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>P</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>N</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>N</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>F</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:msqrt>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>j</mml:mi>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(11)</label>
</disp-formula>
</p>
<p>In contrast to performance measures, to assess the significance of the differences in the prediction performance of the proposed models, the Diebold and Mariano Test (DMT) was performed (<xref ref-type="bibr" rid="B41">Meidan et al., 2020</xref>). The DMT is a widely used statistical test for comparing predictions obtained from different models. To assess whether the prediction accuracy of the proposed prediction model is significantly better than that of benchmark models, DMT statistic was introduced in this study, as determined by the Eq. <xref ref-type="disp-formula" rid="e12">12</xref>:<disp-formula id="e12">
<mml:math id="m26">
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#x305;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(12)</label>
</disp-formula>Where; <inline-formula id="inf15">
<mml:math id="m27">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>t</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf16">
<mml:math id="m28">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mover accent="true">
<mml:mi>z</mml:mi>
<mml:mo>&#x223c;</mml:mo>
</mml:mover>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mover accent="true">
<mml:mi>z</mml:mi>
<mml:mo>&#x223c;</mml:mo>
</mml:mover>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>,<disp-formula id="equ1">
<mml:math id="m29">
<mml:mrow>
<mml:mi>V</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mtext>and&#x2009;</mml:mtext>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>c</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>v</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>
<inline-formula id="inf17">
<mml:math id="m30">
<mml:mrow>
<mml:msub>
<mml:mover accent="true">
<mml:mi>z</mml:mi>
<mml:mo>&#x223c;</mml:mo>
</mml:mover>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>n</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the predicted value of the first predictive model and <inline-formula id="inf18">
<mml:math id="m31">
<mml:mrow>
<mml:msub>
<mml:mover accent="true">
<mml:mi>z</mml:mi>
<mml:mo>&#x223c;</mml:mo>
</mml:mover>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the predicted value of the second predictive model at time n. If the DMT statistic is negative, the first predictive model is statistically better than the second predictive model.</p>
</sec>
</sec>
<sec sec-type="results|discussion" id="s4">
<title>4 Results and discussion</title>
<p>Real-time consumer data for residential customers makes up the exploited data. The customers are divided into two groups based on similar indexing patterns and appropriately designated consumption categories. Each consumer&#x2019;s consumption pattern is represented by a staging numeric binary. Label 0 denotes an honest consumer, while label 1 denotes a dishonest one. Each consumer&#x2019;s tracked and reordered patterns are collected every 24&#xa0;h. For each of the theft versions, benign class data is modified to create harmful data. Data from both types is later combined. Due to the model&#x2019;s deviation towards the majority class, a data balancing strategy is necessary to minimize the class bias issue. The data is balanced using K-means SMOTE. The hyper-parameters and their appropriate values obtained during the tuning of the proposed MLP-GRU model are shown in <xref ref-type="table" rid="T3">Table 3</xref>. Due to their lengthy computation, we investigate fewer hyper-parameters.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Hyper parameters of MLP-GRU.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Hyper parameters</th>
<th align="left">Values</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Epoch</td>
<td align="left">30,50</td>
</tr>
<tr>
<td align="left">Batch size</td>
<td align="left">32,64</td>
</tr>
<tr>
<td align="left">Optimizer</td>
<td align="left">Adam, adammax, SGD</td>
</tr>
<tr>
<td align="left">Dropout</td>
<td align="left">0.3,0.2,0.5,0.01,0.1</td>
</tr>
<tr>
<td align="left">Activation</td>
<td align="left">Relu, elu, sigmoid</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The proposed model&#x2019;s training process is handled by the epoch variable. We accomplish 15 iterations, or epochs, of our model. The results show that the MLP-GRU&#x2019;s training accuracy (accuracy on seen data) gradually improves with each iteration, reaching a maximum of 86% in the last iteration. Whereas the MLP-GRU accuracy gradually rises as well, reaching 88% at the final iteration when utilizing the testing data (accuracy using unseen data). The CNGC dataset has some zero values, which makes it difficult for the proposed classifier to learn it correctly in the early iterations. As a result, during the first three epochs, training accuracy is higher than testing accuracy, indicating that overfitting has taken place. The suggested model successfully learns the zero values after the third iteration and the overfitting problem is fixed. At various iterations, the MLP-GRU loss is also calculated and recorded. The training loss is decreasing with each iteration, until it achieves a minimum of 0.108&#xa0;at the 10th iteration. The testing loss also decreases until the final iteration, when it hits 0.080. Due to the zero values included in the dataset, the model overfits during the first three iterations. After the third iteration, the model has learned both the dataset and the zero values, which eliminates the overfitting problem. Finally, the proposed model&#x2019;s training and testing accuracy leads to the conclusion that it generalizes effectively and avoids overfitting.</p>
<p>Using the same dataset, we trained the Alexnet, BGRU, and RNN models to compare our proposed hybrid model (MLP-GRU) to benchmark methods. Hence, <xref ref-type="table" rid="T4">Table 4</xref> displays the performance measures and PR-AUC for the MLP-GRU, Alexnet, BIGRU, and RNN models in three training and testing sets cases. In the first case of 50% training and 50% testing, the proposed MLP-GRU produced recall 90, precision 87, F1-Score 89, accuracy 87.80, test loss 32, AUC 91, ROC 100, and MCC 73, respectively. Meanwhile, Alexnet produces recall 85, precision 96, F1-Score 90, Accuracy 87.63, test loss 34, AUC 94, ROC 85, MCC 73, and GRU poorly performed with recall 75, precision 86, F1-Score 80, Accuracy 74.98, test loss 49, AUC 85, ROC 75, and MCC 46, respectively. Moreover, in the second case of 75% training and 25% testing, the proposed model yields recall 95, precision 95, F1-Score 91, accuracy 92.12, test loss 90, AUC 93, ROC 100, and MCC 76, respectively, and Alexnet yields the second-best results with recall, precision, F1-Score, Accuracy, Test loss, AUC, ROC, and MCC 94, 91.01, 20, 90, 97, and 82 accordingly. However, the results produced by other benchmarks were not up to par in the second case either. Similarly, the proposed models show the best performance in the third case of 90% training and 10% testing set with recall 95, precision 94, F1-Score 94, accuracy 93.33, test loss 20, AUC 95, ROC 100, and MCC 85, followed by Alexnet with recall 94, precision 86, F1-Score 90, accuracy 89.12, test loss 22, AUC 94, ROC 80, and MCC 64. Meanwhile, GRU again performed poorly with the metrics of recall 88, precision 86, F1-Score 87, accuracy 83.86, test loss 37, AUC 89, ROC 80, and MCC 64.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Performance measures of the proposed MLP-GRU with various training and testing case.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th colspan="9" align="center">Case 1: 50% training and 50% testing set.</th>
</tr>
<tr>
<th align="center">Methods</th>
<th align="center">Recall</th>
<th align="center">Precision</th>
<th align="center">F1-Score</th>
<th align="center">Accuracy</th>
<th align="center">Test loss</th>
<th align="center">AUC</th>
<th align="center">ROC</th>
<th align="center">MCC</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">MLP-GRU</td>
<td align="center">90</td>
<td align="center">87</td>
<td align="center">89</td>
<td align="center">87.80</td>
<td align="center">32</td>
<td align="center">91</td>
<td align="center">100</td>
<td align="center">73</td>
</tr>
<tr>
<td align="center">Alexnet</td>
<td align="center">85</td>
<td align="center">96</td>
<td align="center">90</td>
<td align="center">87.63</td>
<td align="center">34</td>
<td align="center">94</td>
<td align="center">85</td>
<td align="center">73</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">89</td>
<td align="center">82</td>
<td align="center">86</td>
<td align="center">83.55</td>
<td align="center">38</td>
<td align="center">88</td>
<td align="center">82</td>
<td align="center">66</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">89</td>
<td align="center">82</td>
<td align="center">85</td>
<td align="center">83.13</td>
<td align="center">35</td>
<td align="center">91</td>
<td align="center">89</td>
<td align="center">65</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">75</td>
<td align="center">86</td>
<td align="center">80</td>
<td align="center">74.98</td>
<td align="center">49</td>
<td align="center">85</td>
<td align="center">75</td>
<td align="center">46</td>
</tr>
<tr>
<td colspan="9" align="center" style="background-color:#BFBFBF">Case 2: 75% training and 25% testing set.</td>
</tr>
<tr>
<td align="center" style="background-color:#BFBFBF">Methods</td>
<td align="center" style="background-color:#BFBFBF">Recall</td>
<td align="center" style="background-color:#BFBFBF">Precision</td>
<td align="center" style="background-color:#BFBFBF">F1-Score</td>
<td align="center" style="background-color:#BFBFBF">Accuracy</td>
<td align="center" style="background-color:#BFBFBF">Test loss</td>
<td align="center" style="background-color:#BFBFBF">AUC</td>
<td align="center" style="background-color:#BFBFBF">ROC</td>
<td align="center" style="background-color:#BFBFBF">MCC</td>
</tr>
<tr>
<td align="center">MLP-GRU</td>
<td align="center">95</td>
<td align="center">95</td>
<td align="center">91</td>
<td align="center">92.12</td>
<td align="center">19</td>
<td align="center">93</td>
<td align="center">100</td>
<td align="center">76</td>
</tr>
<tr>
<td align="center">Alexnet</td>
<td align="center">94</td>
<td align="center">92</td>
<td align="center">93</td>
<td align="center">91.01</td>
<td align="center">20</td>
<td align="center">90</td>
<td align="center">97</td>
<td align="center">82</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">89</td>
<td align="center">73</td>
<td align="center">80</td>
<td align="center">78.24</td>
<td align="center">46</td>
<td align="center">84</td>
<td align="center">80</td>
<td align="center">57</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">87</td>
<td align="center">87</td>
<td align="center">87</td>
<td align="center">84.39</td>
<td align="center">35</td>
<td align="center">91</td>
<td align="center">88</td>
<td align="center">66</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">82</td>
<td align="center">89</td>
<td align="center">85</td>
<td align="center">81.57</td>
<td align="center">39</td>
<td align="center">90</td>
<td align="center">80</td>
<td align="center">60</td>
</tr>
<tr>
<td colspan="9" align="center" style="background-color:#BFBFBF">Case 3: 90% training and 10% testing set.</td>
</tr>
<tr>
<td align="center" style="background-color:#BFBFBF">Methods</td>
<td align="center" style="background-color:#BFBFBF">Recall</td>
<td align="center" style="background-color:#BFBFBF">Precision</td>
<td align="center" style="background-color:#BFBFBF">F1-Score</td>
<td align="center" style="background-color:#BFBFBF">Accuracy</td>
<td align="center" style="background-color:#BFBFBF">Test loss</td>
<td align="center" style="background-color:#BFBFBF">AUC</td>
<td align="center" style="background-color:#BFBFBF">ROC</td>
<td align="center" style="background-color:#BFBFBF">MCC</td>
</tr>
<tr>
<td align="center">MLP-GRU</td>
<td align="center">95</td>
<td align="center">94</td>
<td align="center">94</td>
<td align="center">93.33</td>
<td align="center">20</td>
<td align="center">95</td>
<td align="center">100</td>
<td align="center">85</td>
</tr>
<tr>
<td align="center">Alexnet</td>
<td align="center">94</td>
<td align="center">86</td>
<td align="center">90</td>
<td align="center">89.12</td>
<td align="center">22</td>
<td align="center">94</td>
<td align="center">95</td>
<td align="center">78</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">92</td>
<td align="center">80</td>
<td align="center">85</td>
<td align="center">82.46</td>
<td align="center">37</td>
<td align="center">90</td>
<td align="center">85</td>
<td align="center">64</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">93</td>
<td align="center">70</td>
<td align="center">80</td>
<td align="center">78.30</td>
<td align="center">68</td>
<td align="center">88</td>
<td align="center">86</td>
<td align="center">59</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">88</td>
<td align="center">86</td>
<td align="center">87</td>
<td align="center">83.86</td>
<td align="center">37</td>
<td align="center">89</td>
<td align="center">80</td>
<td align="center">64</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It is evident from the results that the proposed model outperformed other models, and Alexnet was found to be the second-best performer in all three cases because it uses a k-means smote sampling technique to balance the data. However, GRU, performs the least well among the classifiers, with an accuracy of 74.98% at a 50% training ratio. This is because GRU does not capture long-term dependencies from the huge time series data since it is based on the probability notion and employs neural network theory. Furthermore, the training using the majority of class samples makes it biased when identifying genuine incidents of electricity theft. As a result, GRU is unable to classify the vastly unbalanced dataset accurately. By achieving 87% accuracy, the Alexnet, in contrast, performs marginally better than the BGRU. Alexnet is a deep learning model that extracts hidden patterns from data on power use to detect electricity thieves. It has numerous stacks of hidden layers. However, because of the thick layers, it suffers from overfitting problems. It is unable to perform well across the board. Furthermore, we have compared our proposed model concerning execution time, and it is revealed in <xref ref-type="table" rid="T5">Table 5</xref> that the execution time of the proposed hybrid MLP-GRU is 106.837&#xa0;s in the first case of 50% training, 147.163&#xa0;s for 75% training, and 167.221&#xa0;s in 90% training set. This indicates that the proposed model is executed in less time than other benchmark models, including GRU, BGRU, and RNN, except for Alexnet. The Alexnet model here performed best in terms of less execution time due to the issues of imbalanced binary classification; this method works better in the least possible time.</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>Execution time of the proposed MLP-GRU with various training and testing cases.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Technique (epochs &#x3d; 30)</th>
<th align="center">50% training (sec)</th>
<th align="center">75% training (sec)</th>
<th align="center">90% training (sec)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">Alexnet</td>
<td align="center">88.118</td>
<td align="center">125.370</td>
<td align="center">136.577</td>
</tr>
<tr>
<td align="center">MLP-GRU</td>
<td align="center">106.837</td>
<td align="center">147.163</td>
<td align="center">167.221</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">182.175</td>
<td align="center">239.909</td>
<td align="center">665.178</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">185.077</td>
<td align="center">239.092</td>
<td align="center">248.284</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">1120.171</td>
<td align="center">1832.843</td>
<td align="center">1921.032</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Finally, the DMT results (test statistic values) are tabulated in <xref ref-type="table" rid="T6">Table 6</xref>. This table confirms that the prediction of the proposed hybrid system demonstrated that the GRU-MLP model significantly outperformed Alexnet, GRU, BGRU, and RNN. Moving forward, the corresponding test statistical values were negative in all cases at the 5% significance level using the loss square function. In the end, the performance of the proposed MLP-GRU <italic>versus</italic> the baseline models is plotted in <xref ref-type="fig" rid="F6">Figure 6</xref> for all three scenarios of training and testing, such as 50%, 50%; 75%, 25%; and 90%, 10%. The first scenario (50%, 50%) of performance matrices such as recall, precision, F1-Score, accuracy, test loss, AUC, ROC, and MCC is displayed in <xref ref-type="fig" rid="F6">Figure 6A</xref>. The MLP-GRU is represented by a blueviolet bar, Alexnet by a periwinkle blue bar, BGRU by a green bar, a pink bar for RNN, and GRU by a yellow bar for the first case of training and testing, respectively. Therefore, it is evident in the bar plot that the proposed MLP-GRU performed best, followed by Alexnet, and GRU showed poor performance for ET prediction in smart grids. Moreover, <xref ref-type="fig" rid="F6">Figures 6B, C</xref> explore the performance of these considered models for the second (75%, 25%) and third (90%, 10%) cases of the training and testing sets. After thoroughly evaluating the displayed plots, it was concluded that the proposed MLP-GRU model outperformed their competitors in the consistent prediction of electricity thefts in smart grids. However, the Alexnet model showed the second-best results. Additionally, we have plotted level plots of DMT <italic>p</italic>-values in <xref ref-type="fig" rid="F7">Figure 7</xref> for the proposed MLP-GRU, Alexnt, BGRU, RNN, and GRU to check their significance in predicting electricity thefts. However, <xref ref-type="fig" rid="F7">Figure 7A</xref> explores the <italic>p</italic>-values of the test for the first case of 50% training and 50% testing, <xref ref-type="fig" rid="F7">Figure 7B</xref> displays the second of 75% training and 25% testing, and the third one is plotted in <xref ref-type="fig" rid="F7">Figure 7C</xref> for 90% training and 10% testing set. It is confirmed from the plotted level plot that the proposed MLP-GRU significantly outperformed other used deep learning models in electricity theft prediction.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>The results (DM statistic) using the square loss function.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th colspan="6" align="center">Case 1: (50% training and 50% testing set)</th>
</tr>
<tr>
<th align="center">Models</th>
<th align="center">MLP-GRU</th>
<th align="center">Alexnet</th>
<th align="center">BGRU</th>
<th align="center">RNN</th>
<th align="center">GRU</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">MLP-GRU</td>
<td align="center">0.00</td>
<td align="center">&#x2212;0.49</td>
<td align="center">&#x2212;3.08</td>
<td align="center">&#x2212;3.05</td>
<td align="center">&#x2212;6.75</td>
</tr>
<tr>
<td align="center">Alexnet</td>
<td align="center">0.49</td>
<td align="center">0.00</td>
<td align="center">&#x2212;2.98</td>
<td align="center">&#x2212;2.61</td>
<td align="center">&#x2212;7.11</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">3.08</td>
<td align="center">2.98</td>
<td align="center">0.00</td>
<td align="center">2.42</td>
<td align="center">&#x2212;8.02</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">3.05</td>
<td align="center">2.61</td>
<td align="center">&#x2212;2.42</td>
<td align="center">0.00</td>
<td align="center">&#x2212;7.49</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">6.75</td>
<td align="center">7.11</td>
<td align="center">8.02</td>
<td align="center">7.49</td>
<td align="center">0.00</td>
</tr>
<tr>
<td colspan="6" align="center" style="background-color:#BFBFBF">Case 2: (75% training and 25% testing set)</td>
</tr>
<tr>
<td align="center" style="background-color:#BFBFBF">Models</td>
<td align="center" style="background-color:#BFBFBF">MLP-GRU</td>
<td align="center" style="background-color:#BFBFBF">Alexnet</td>
<td align="center" style="background-color:#BFBFBF">BGRU</td>
<td align="center" style="background-color:#BFBFBF">RNN</td>
<td align="center" style="background-color:#BFBFBF">GRU</td>
</tr>
<tr>
<td align="center">MLP-GRU</td>
<td align="center">0.00</td>
<td align="center">0.57 -</td>
<td align="center">&#x2212;1.13</td>
<td align="center">&#x2212;2.33</td>
<td align="center">0.05</td>
</tr>
<tr>
<td align="center">Alexnet</td>
<td align="center">0.57</td>
<td align="center">0.00</td>
<td align="center">&#x2212;0.11</td>
<td align="center">&#x2212;0.99</td>
<td align="center">0.96</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">1.13</td>
<td align="center">0.11</td>
<td align="center">0.00</td>
<td align="center">&#x2212;2.19</td>
<td align="center">1.62</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">2.33</td>
<td align="center">0.99</td>
<td align="center">2.19</td>
<td align="center">0.00</td>
<td align="center">2.29</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">&#x2212;0.05</td>
<td align="center">&#x2212;0.96</td>
<td align="center">&#x2212;1.62</td>
<td align="center">&#x2212;2.29</td>
<td align="center">0.00</td>
</tr>
<tr>
<td colspan="6" align="center" style="background-color:#BFBFBF">Case 3: (90% training and 10% testing set)</td>
</tr>
<tr>
<td align="center" style="background-color:#BFBFBF">Models</td>
<td align="center" style="background-color:#BFBFBF">MLP-GRU</td>
<td align="center" style="background-color:#BFBFBF">Alexnet</td>
<td align="center" style="background-color:#BFBFBF">BGRU</td>
<td align="center" style="background-color:#BFBFBF">RNN</td>
<td align="center" style="background-color:#BFBFBF">GRU</td>
</tr>
<tr>
<td align="center">MLP-GRU</td>
<td align="center">0.00</td>
<td align="center">&#x2212;2.40</td>
<td align="center">&#x2212;2.37</td>
<td align="center">&#x2212;3.12</td>
<td align="center">&#x2212;1.13</td>
</tr>
<tr>
<td align="center">Alexnet</td>
<td align="center">2.40</td>
<td align="center">0.00</td>
<td align="center">2.42</td>
<td align="center">1.21</td>
<td align="center">2.86</td>
</tr>
<tr>
<td align="center">BGRU</td>
<td align="center">2.37</td>
<td align="center">&#x2212;2.42</td>
<td align="center">0.00</td>
<td align="center">&#x2212;3.86</td>
<td align="center">3.43</td>
</tr>
<tr>
<td align="center">RNN</td>
<td align="center">3.12</td>
<td align="center">&#x2212;1.21</td>
<td align="center">3.86</td>
<td align="center">0.00</td>
<td align="center">4.57</td>
</tr>
<tr>
<td align="center">GRU</td>
<td align="center">1.13</td>
<td align="center">&#x2212;2.86</td>
<td align="center">&#x2212;3.43</td>
<td align="center">&#x2212;4.57</td>
<td align="center">0.00</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>The performance measures bar plot for the proposed MPL-GRU vs. benchmark models with different training and testing datasets; <bold>(A)</bold> 50%, 50%, <bold>(B)</bold> 75%, 25%, and <bold>(C)</bold> 90%, 10%.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g006.tif"/>
</fig>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>The level plots DMT results (<italic>p</italic>-values) for the proposed MPL-GRU vs. benchmark models with different training and testing datasets; <bold>(A)</bold> 50%, 50%, <bold>(B)</bold> 75%, 25%, and <bold>(C)</bold> 90%, 10%.</p>
</caption>
<graphic xlink:href="fenrg-12-1383090-g007.tif"/>
</fig>
<p>To evaluate the effectiveness of the proposed hybrid system for ETD by comparing its performance with other state-of-the-art methodologies reported in the literature. To achieve this, we have presented a comparison <xref ref-type="table" rid="T7">Table 7</xref> that highlights the superiority of the proposed hybrid system compared to the best approaches reported in the literature. For instance, study (<xref ref-type="bibr" rid="B32">Khan et al., 2024</xref>), the proposed method used the current study dataset and obtained performance measures [accuracy (91%), precision (97.96%), and area under curve (91.68%)] that were comparatively higher than our proposed hybrid technique [accuracy (93.3%), precision (97.5%), and area under curve (95%)]. In another study, (<xref ref-type="bibr" rid="B43">Munawar et al., 2021</xref>), the best-proposed method used the current study dataset and computed the performance metrics [accuracy (89.9%), F-score (90.86%), and area under curve (78%)] that were also comparatively higher than our proposed system. On the other hand (<xref ref-type="bibr" rid="B21">Gul, 2020</xref>), reported the best-proposed approach for detecting electricity theft in the smart grid. For comparison, the authors obtained the evaluation measures for this approach, such as accuracy (91.29%), F1 score (90.96%), and area under the curve (0.87%), which were comparatively greater than the current proposed hybrid system. However, in the work (<xref ref-type="bibr" rid="B10">Bohani et al., 2021</xref>), the best-proposed method used the present study dataset and computed the performance indicators, that is, accuracy (91%), F1score (88.99%), and area under the curve (86%) that were also relatively higher than our proposed hybrid system. Also, the best-proposed model of (<xref ref-type="bibr" rid="B52">Razavi et al., 2019</xref>) was applied to this work&#x2019;s dataset, and their performance measures were obtained. The best-proposed model of (<xref ref-type="bibr" rid="B41">Meidan et al., 2020</xref>) reported the performance measures values as the following: accuracy &#x3d; 57.70%, F-score &#x3d; 70.01%, and area under curve &#x3d; 77.01%, respectively, which are remarkably greater than our performance measures values: accuracy &#x3d; 93.3%, F-score &#x3d; 94.96%, and area under the curve &#x3d; 95%. In a previous study (<xref ref-type="bibr" rid="B46">Pamir et al., 2022</xref>), the authors used the same dataset as our proposed hybrid system and achieved higher performance measures. For example, the accuracy, F1-score, and area under curve achieved by their best method were 73.20%, 70.10%, and 69.50%, respectively, which were significantly better than our proposed measures. Another study (<xref ref-type="bibr" rid="B48">Qu et al., 2020</xref>) also used our dataset and achieved higher accuracy (87.90%), F-score (96.11%), and area under the curve (87.90%) than our proposed hybrid system. In summary, our proposed hybrid system achieved high accuracy but was outperformed by the best methodologies in the literature.</p>
<table-wrap id="T7" position="float">
<label>TABLE 7</label>
<caption>
<p>The proposed work <italic>versus</italic> the related work performance indicator on CNGC data.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Technique</th>
<th align="left">Data</th>
<th align="left">Performance</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">The proposed model</td>
<td align="left">CNGC</td>
<td align="left">Recall &#x3d; 95%, Precision &#x3d; 97.5% F1-Score &#x3d; 94% Accuracy &#x3d; 93.33%, Test loss &#x3d; 20% AUC &#x3d; 95%, ROC &#x3d; 100%, and MCC &#x3d; 85%</td>
</tr>
<tr>
<td align="left">Time and Location Gated Recurrent Unit (<xref ref-type="bibr" rid="B46">Pamir et al., 2022</xref>)</td>
<td align="left">CNGC</td>
<td align="left">Accuracy &#x3d; 91%, Precision &#x3d; 97.96%, and AUC &#x3d; 91.68%</td>
</tr>
<tr>
<td align="left">Wide and Deep Convolutional Neural (<xref ref-type="bibr" rid="B63">Zheng et al., 2017</xref>)</td>
<td align="left">CNGC</td>
<td align="left">AUC &#x3d; 0.78, Mean Absolute Percentage Error &#x3d; 0.90</td>
</tr>
<tr>
<td align="left">SMOTE, LSTM (<xref ref-type="bibr" rid="B48">Qu et al., 2020</xref>)</td>
<td align="left">CNGC</td>
<td align="left">Accuracy &#x3d; 0.89, Precision &#x3d; 0.90, Recall &#x3d; 0.87</td>
</tr>
<tr>
<td align="left">SMOTE-LINK, Kernel, BGRU (<xref ref-type="bibr" rid="B51">Ramos et al., 2016</xref>)</td>
<td align="left">CNGC</td>
<td align="left">AUC &#x3d; 0.86, Precision &#x3d; 0.80, Recall &#x3d; 0.89</td>
</tr>
<tr>
<td align="left">CNN-LSTM (<xref ref-type="bibr" rid="B23">Hasan et al., 2019</xref>)</td>
<td align="left">CNGC</td>
<td align="left">Accuracy &#x3d; 0.74, Precision &#x3d; 0.725, recall &#x3d; 0.85, F1-score &#x3d; 0.779, ROC &#x3d; 0.817</td>
</tr>
<tr>
<td align="left">SVM (<xref ref-type="bibr" rid="B58">Toma et al., 2019</xref>)</td>
<td align="left">CNGC</td>
<td align="left">Accuracy &#x3d; 0.577, Precision &#x3d; 0.545, recall &#x3d; 0.851, F1-score &#x3d; 0.701, ROC &#x3d; 0817</td>
</tr>
<tr>
<td align="left">LR (<xref ref-type="bibr" rid="B11">Buzau et al., 2018</xref>)</td>
<td align="left">CNGC</td>
<td align="left">Accuracy &#x3d; 0.732, Precision &#x3d; 0.804, recall &#x3d; 0.622, F1-score &#x3d; 0.701, ROC &#x3d; 0.645</td>
</tr>
<tr>
<td align="left">LSTM (<xref ref-type="bibr" rid="B1">Adil et al., 2020</xref>)</td>
<td align="left">CNGC</td>
<td align="left">Accuracy &#x3d; 0.879, Precision &#x3d; 0.889, recall &#x3d; 0.910, F1-score &#x3d; 0.9611, ROC &#x3d; 0.879</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec sec-type="conclusion" id="s5">
<title>5 Conclusion</title>
<p>ETD is a significant issue in many countries, leading to a substantial financial loss for power utilities worldwide. However, conventional methods for ETD face challenges such as the curse of dimensionality and an imbalanced distribution of electricity consumption data. To overcome these problems, this study proposes a hybrid system named MLP-GRU that analyzes and solves electricity theft using data from the CNGC. The proposed hybrid system consists of several steps. Firstly, the data undergoes preprocessing. Secondly, the k-means SMOTE technique is used to balance the data. Thirdly, the GRU model is applied to the extracted, purified data. Fourthly, the MLP model is also applied to the extracted, purified data. Finally, the performance of the proposed system is evaluated using various performance measures like a graphical analysis and a statistical test. To verify the consistency of the proposed hybrid system, the dataset is trained and tested using three different ratios. The study&#x2019;s results show that the proposed hybrid system for ETD is highly accurate and efficient compared to other models including Alexnet, GRU, BGRU and RNN. In our case, Hybrid MLP-GRU has solved complex nonlinear problem. It handles large amounts of input data and makes quick predictions after training. The same accuracy ratio can be achieved even with smaller samples.</p>
<p>The main advantage of this research is introducing an effective ETD model for power utilities, which enables them to minimize financial loss. Furthermore, the accurate and prompt detection of energy thieves decreases line losses in transformers and other grid components. The suggested model also has certain drawbacks. The model can only be trained using high-frequency data on electricity consumption, which restricts its ability to capture the minutest electricity consumption trends. Its accuracy was also reduced as a result, more cases of misclassification occur. Furthermore, there is no method for tweaking the hyper parameters, so it can take much computing time. In the future, we will improve its performance by using the minimum frequency dataset and decreasing the delay in identifying electricity theft in the CNGC dataset. Finally, the authors believe that the system proposed in this work can be extended to the ETD in other parts of the country and the world.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s7">
<title>Author contributions</title>
<p>HI: Writing&#x2013;original draft, Writing&#x2013;review and editing. NK: Writing&#x2013;original draft, Writing&#x2013;review and editing. MR: Writing&#x2013;original draft, Writing&#x2013;review and editing. GA: Writing&#x2013;original draft, Writing&#x2013;review and editing. MK: Writing&#x2013;original draft, Writing&#x2013;review and editing. MA: Writing&#x2013;original draft, Writing&#x2013;review and editing. ET: Writing&#x2013;original draft, Writing&#x2013;review and editing. AE: Writing&#x2013;original draft, Writing&#x2013;review and editing.</p>
</sec>
<sec sec-type="funding-information" id="s8">
<title>Funding</title>
<p>The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.</p>
</sec>
<ack>
<p>The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA for funding this research work through the project number &#x201c;NBU-FFR-2024-1475-03&#x201d;.</p>
</ack>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Adil</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Qasim</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Ullah</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Shafiq</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Choi</surname>
<given-names>J. G.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>LSTM and bat-based RUSBoost approach for electricity theft detection</article-title>. <source>Appl. Sci.</source> <volume>10</volume> (<issue>12</issue>), <fpage>4378</fpage>. <pub-id pub-id-type="doi">10.3390/app10124378</pub-id>
</citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ahir</surname>
<given-names>R. K.</given-names>
</name>
<name>
<surname>Chakraborty</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Pattern-based and context-aware electricity theft detection in smart grid</article-title>. <source>Sustain. Energy, Grids Netw.</source> <volume>32</volume>, <fpage>100833</fpage>. <pub-id pub-id-type="doi">10.1016/j.segan.2022.100833</pub-id>
</citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alameady</surname>
<given-names>M. H.</given-names>
</name>
<name>
<surname>Albermany</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>George</surname>
<given-names>L. E.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Energy theft detection and preventive measures for IoT using machine learning</article-title>. <source>Math. Statistician Eng. Appl.</source>, <volume>7</volume>, <fpage>155</fpage>&#x2013;<lpage>168</lpage>.</citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arif</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Alghamdi</surname>
<given-names>T. A.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>Z. A.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Towards efficient energy utilization using big data analytics in smart cities for electricity theft detection</article-title>. <source>Big Data Res.</source> <volume>27</volume>, <fpage>100285</fpage>. <pub-id pub-id-type="doi">10.1016/j.bdr.2021.100285</pub-id>
</citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Asif</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Nazeer</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Alkhammash</surname>
<given-names>E. H.</given-names>
</name>
<name>
<surname>Hadjouni</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Data augmentation using BiWGAN, feature extraction and classification by hybrid 2DCNN and BiLSTM to detect non-technical losses in smart grids</article-title>. <source>IEEE Access</source> <volume>10</volume>, <fpage>27467</fpage>&#x2013;<lpage>27483</lpage>. <pub-id pub-id-type="doi">10.1109/access.2022.3150047</pub-id>
</citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Aslam</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Ahmed</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Almogren</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Shafiq</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Zuair</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>An attention guided semi-supervised learning mechanism to detect electricity frauds in the distribution systems</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>221767</fpage>&#x2013;<lpage>221782</lpage>. <pub-id pub-id-type="doi">10.1109/access.2020.3042636</pub-id>
</citation>
</ref>
<ref id="B7">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Aziz</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hassan Naqvi</surname>
<given-names>S. Z.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>M. U.</given-names>
</name>
<name>
<surname>Aslam</surname>
<given-names>T.</given-names>
</name>
</person-group>, (<year>2020</year>). <article-title>Electricity theft detection using empirical mode decomposition and K-nearest neighbors</article-title>, <conf-name>2020 International Conference on Emerging Trends in Smart Technologies (ICETST)</conf-name>. <conf-loc>Karachi, Pakistan</conf-loc>, <publisher-name>IEEE</publisher-name>.</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Banga</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Ahuja</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Sharma</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Accurate detection of electricity theft using classification algorithms and Internet of Things in smart grid</article-title>. <source>Arabian J. Sci. Eng.</source> <volume>47</volume> (<issue>8</issue>), <fpage>9583</fpage>&#x2013;<lpage>9599</lpage>. <pub-id pub-id-type="doi">10.1007/s13369-021-06313-z</pub-id>
</citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Blazakis</surname>
<given-names>K. V.</given-names>
</name>
<name>
<surname>Kapetanakis</surname>
<given-names>T. N.</given-names>
</name>
<name>
<surname>Stavrakakis</surname>
<given-names>G. S.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Effective electricity theft detection in power distribution grids using an adaptive neuro fuzzy inference system</article-title>. <source>Energies</source> <volume>13</volume> (<issue>12</issue>), <fpage>3110</fpage>. <pub-id pub-id-type="doi">10.3390/en13123110</pub-id>
</citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bohani</surname>
<given-names>F. A.</given-names>
</name>
<name>
<surname>Suliman</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Saripuddin</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Sameon</surname>
<given-names>S. S.</given-names>
</name>
<name>
<surname>Md Salleh</surname>
<given-names>N. S.</given-names>
</name>
<name>
<surname>Nazeri</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>A comprehensive analysis of supervised learning techniques for electricity theft detection</article-title>. <source>J. Electr. Comput. Eng.</source> <volume>2021</volume>, <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1155/2021/9136206</pub-id>
</citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Buzau</surname>
<given-names>M. M.</given-names>
</name>
<name>
<surname>Tejedor-Aguilera</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Cruz-Romero</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Gomez-Exposito</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Detection of non-technical losses using smart meter data and supervised learning</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>10</volume> (<issue>3</issue>), <fpage>2661</fpage>&#x2013;<lpage>2670</lpage>. <pub-id pub-id-type="doi">10.1109/tsg.2018.2807925</pub-id>
</citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Buzau</surname>
<given-names>M.-M.</given-names>
</name>
<name>
<surname>Tejedor-Aguilera</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Cruz-Romero</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Gomez-Exposito</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Hybrid deep neural networks for detection of non-technical losses in electricity smart meters</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>35</volume> (<issue>2</issue>), <fpage>1254</fpage>&#x2013;<lpage>1263</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2019.2943115</pub-id>
</citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chandrasekhar</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Vivekananthan</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Khandelwal</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>S. J.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Green energy from working surfaces: a contact electrification&#x2013;enabled data theft protection and monitoring smart table</article-title>. <source>Mater. Today Energy</source> <volume>18</volume>, <fpage>100544</fpage>. <pub-id pub-id-type="doi">10.1016/j.mtener.2020.100544</pub-id>
</citation>
</ref>
<ref id="B14">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Cheng</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>S.</given-names>
</name>
</person-group>, (<year>2021</year>). <article-title>A rolling bearing fault diagnosis model based on WCNN-BiGRU</article-title>, <conf-name>2021 China automation congress (CAC)</conf-name>. <conf-loc>Beijing, China</conf-loc>, <publisher-name>IEEE</publisher-name>.</citation>
</ref>
<ref id="B15">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Chung</surname>
<given-names>J.</given-names>
</name>
</person-group>, <article-title>Empirical evaluation of gated recurrent neural networks on sequence modeling</article-title>
<comment>. <ext-link ext-link-type="uri" xlink:href="https://arxiv.org/abs/1412.3555">https://arxiv.org/abs/1412.3555</ext-link>, arXiv preprint arXiv:1412.3555</comment>, <year>2014</year>.</citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>de Souza</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Pereira</surname>
<given-names>J. L.</given-names>
</name>
<name>
<surname>Alves</surname>
<given-names>G. d. O.</given-names>
</name>
<name>
<surname>de Oliveira</surname>
<given-names>B. C.</given-names>
</name>
<name>
<surname>Melo</surname>
<given-names>I. D.</given-names>
</name>
<name>
<surname>Garcia</surname>
<given-names>P. A.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Detection and identification of energy theft in advanced metering infrastructures</article-title>. <source>Electr. Power Syst. Res.</source> <volume>182</volume>, <fpage>106258</fpage>. <pub-id pub-id-type="doi">10.1016/j.epsr.2020.106258</pub-id>
</citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ding</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Real-time anomaly detection based on long short-Term memory and Gaussian Mixture Model</article-title>. <source>Comput. Electr. Eng.</source> <volume>79</volume>, <fpage>106458</fpage>. <pub-id pub-id-type="doi">10.1016/j.compeleceng.2019.106458</pub-id>
</citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Duarte Soares</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>de Souza Queiroz</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>L&#xf3;pez</surname>
<given-names>G. P.</given-names>
</name>
<name>
<surname>Carre&#xf1;o-Franco</surname>
<given-names>E. M.</given-names>
</name>
<name>
<surname>L&#xf3;pez-Lezama</surname>
<given-names>J. M.</given-names>
</name>
<name>
<surname>Mu&#xf1;oz-Galeano</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>BiGRU-CNN neural network applied to electric energy theft detection</article-title>. <source>Electronics</source> <volume>11</volume> (<issue>5</issue>), <fpage>693</fpage>. <pub-id pub-id-type="doi">10.3390/electronics11050693</pub-id>
</citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fei</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Non-technical losses detection using missing values&#x2019; pattern and neural architecture search</article-title>. <source>Int. J. Electr. Power &#x26; Energy Syst.</source> <volume>134</volume>, <fpage>107410</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2021.107410</pub-id>
</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gong</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Liao</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Data augmentation for electricity theft detection using conditional variational auto-encoder</article-title>. <source>Energies</source> <volume>13</volume> (<issue>17</issue>), <fpage>4291</fpage>. <pub-id pub-id-type="doi">10.3390/en13174291</pub-id>
</citation>
</ref>
<ref id="B21">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Gul</surname>
<given-names>H.</given-names>
</name>
</person-group>, <article-title>Detection of non-technical losses using sampling techniques and advance machine learning techniques to secure smart meters</article-title>. <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/374373661_Detection_of_non-technical_losses_using_sampling_techniques_and_advance_machine_learning_techniques_to_secure_smart_meters">https://www.researchgate.net/publication/374373661_Detection_of_non-technical_losses_using_sampling_techniques_and_advance_machine_learning_techniques_to_secure_smart_meters</ext-link>, <year>2020</year>.</citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gupta</surname>
<given-names>A. K.</given-names>
</name>
<name>
<surname>Routray</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Naikan</surname>
<given-names>V. A.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Detection of power theft in low voltage distribution systems: a review from the Indian perspective</article-title>. <source>IETE J. Res.</source> <volume>68</volume> (<issue>6</issue>), <fpage>4180</fpage>&#x2013;<lpage>4197</lpage>. <pub-id pub-id-type="doi">10.1080/03772063.2020.1787881</pub-id>
</citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hasan</surname>
<given-names>M. N.</given-names>
</name>
<name>
<surname>Toma</surname>
<given-names>R. N.</given-names>
</name>
<name>
<surname>Nahid</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Islam</surname>
<given-names>M. M. M.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>J. M.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Electricity theft detection in smart grid systems: a CNN-LSTM based approach</article-title>. <source>Energies</source> <volume>12</volume> (<issue>17</issue>), <fpage>3310</fpage>. <pub-id pub-id-type="doi">10.3390/en12173310</pub-id>
</citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Inayat</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Zia</surname>
<given-names>M. F.</given-names>
</name>
<name>
<surname>Mahmood</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Khalid</surname>
<given-names>H. M.</given-names>
</name>
<name>
<surname>Benbouzid</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Learning-based methods for cyber attacks detection in IoT systems: a survey on methods, analysis, and future prospects</article-title>. <source>Electronics</source> <volume>11</volume> (<issue>9</issue>), <fpage>1502</fpage>. <pub-id pub-id-type="doi">10.3390/electronics11091502</pub-id>
</citation>
</ref>
<ref id="B25">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Jaiswal</surname>
<given-names>V. K.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>H. K.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>K.</given-names>
</name>
</person-group> (<year>2020</year>).<article-title>Arduino gsm based power theft detection and energy metering</article-title> , <conf-name>5th international conference on communication and electronics systems (ICCES)</conf-name>. <conf-loc>Coimbatore, India</conf-loc>, <publisher-name>IEEE</publisher-name>
</citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jindal</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Dua</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Kaur</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Mishra</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Decision tree and SVM-based data analytics for theft detection in smart grid</article-title>. <source>IEEE Trans. Industrial Inf.</source> <volume>12</volume> (<issue>3</issue>), <fpage>1005</fpage>&#x2013;<lpage>1016</lpage>. <pub-id pub-id-type="doi">10.1109/tii.2016.2543145</pub-id>
</citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jokar</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Arianpoo</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Leung</surname>
<given-names>V. C.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Electricity theft detection in AMI using customers&#x2019; consumption patterns</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>7</volume> (<issue>1</issue>), <fpage>216</fpage>&#x2013;<lpage>226</lpage>. <pub-id pub-id-type="doi">10.1109/tsg.2015.2425222</pub-id>
</citation>
</ref>
<ref id="B28">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Kabir</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Pamir</surname>
</name>
<name>
<surname>Ullah</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Munawar</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Asif</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
</person-group>, (<year>2021</year>). <article-title>Detection of non-technical losses using MLP-GRU based neural network to secure smart grids</article-title>, <conf-name>Complex, Intelligent and Software Intensive Systems: Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021)</conf-name>. <conf-loc>Cham, Germany</conf-loc>. <publisher-name>Springer</publisher-name>.</citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kabir</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Qasim</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Aldegheishem</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Alrajeh</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Mohammed</surname>
<given-names>E. A.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Detecting nontechnical losses in smart meters using a MLP-GRU deep model and augmenting data via theft attacks</article-title>. <source>Sustainability</source> <volume>14</volume> (<issue>22</issue>), <fpage>15001</fpage>. <pub-id pub-id-type="doi">10.3390/su142215001</pub-id>
</citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Khalid</surname>
<given-names>H. M.</given-names>
</name>
<name>
<surname>Muyeen</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>J.C.-H.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Cyber-attacks in a looped energy-water nexus: an inoculated sub-observer-based approach</article-title>. <source>IEEE Syst. J.</source> <volume>14</volume> (<issue>2</issue>), <fpage>2054</fpage>&#x2013;<lpage>2065</lpage>. <pub-id pub-id-type="doi">10.1109/jsyst.2019.2941759</pub-id>
</citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Khalid</surname>
<given-names>H. M.</given-names>
</name>
<name>
<surname>Qasaymeh</surname>
<given-names>M. M.</given-names>
</name>
<name>
<surname>Muyeen</surname>
<given-names>S. M.</given-names>
</name>
<name>
<surname>Moursi</surname>
<given-names>M. S. E.</given-names>
</name>
<name>
<surname>Foley</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Sweidan</surname>
<given-names>T. O.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>WAMS operations in power grids: a track fusion-based mixture density estimation-driven grid resilient approach toward cyberattacks</article-title>. <source>IEEE Syst. J.</source> <volume>17</volume>, <fpage>3950</fpage>&#x2013;<lpage>3961</lpage>. <pub-id pub-id-type="doi">10.1109/jsyst.2023.3285492</pub-id>
</citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Khan</surname>
<given-names>N.</given-names>
</name>
</person-group>, (<year>2024</year>). <article-title>A novel deep learning technique to detect electricity theft in smart grids using AlexNet</article-title>. <source>IET Renewable Power Generation</source>. <volume>17</volume>, <fpage>12846</fpage>, <pub-id pub-id-type="doi">10.1049/rpg2.12846</pub-id>
</citation>
</ref>
<ref id="B33">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kocaman</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>T&#xfc;men</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Detection of electricity theft using data processing and LSTM method in distribution systems</article-title>. <source>S&#x101;dhan&#x101;</source> <volume>45</volume> (<issue>1</issue>), <fpage>286</fpage>. <pub-id pub-id-type="doi">10.1007/s12046-020-01512-0</pub-id>
</citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Panigrahi</surname>
<given-names>B. K.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Grid synchronisation framework for partially shaded solar PV&#x2010;based microgrid using intelligent control strategy</article-title>. <source>IET Generation, Transm. Distribution</source> <volume>13</volume> (<issue>6</issue>), <fpage>829</fpage>&#x2013;<lpage>837</lpage>. <pub-id pub-id-type="doi">10.1049/iet-gtd.2018.6079</pub-id>
</citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Panigrahi</surname>
<given-names>B. K.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Voltage sensorless based model predictive control with battery management system: for solar PV powered on-board EV charging</article-title>. <source>IEEE Trans. Transp. Electrification</source> <volume>9</volume>, <fpage>2583</fpage>&#x2013;<lpage>2592</lpage>. <pub-id pub-id-type="doi">10.1109/tte.2022.3213253</pub-id>
</citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Panigrahi</surname>
<given-names>B. K.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A framework of L-HC and AM-MKF for accurate harmonic supportive control schemes</article-title>. <source>IEEE Trans. Circuits Syst. I Regul. Pap.</source> <volume>67</volume> (<issue>12</issue>), <fpage>5246</fpage>&#x2013;<lpage>5256</lpage>. <pub-id pub-id-type="doi">10.1109/tcsi.2020.2996775</pub-id>
</citation>
</ref>
<ref id="B37">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumari</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Panigrahi</surname>
<given-names>B. K.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>A framework of reduced sensor rooftop SPV system using parabolic curve fitting MPPT technology for household consumers</article-title>. <source>IEEE Trans. Consumer Electron.</source> <volume>69</volume> (<issue>1</issue>), <fpage>29</fpage>&#x2013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1109/tce.2022.3209974</pub-id>
</citation>
</ref>
<ref id="B38">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lepolesa</surname>
<given-names>L. J.</given-names>
</name>
<name>
<surname>Achari</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Cheng</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Electricity theft detection in smart grids based on deep neural network</article-title>. <source>Ieee Access</source> <volume>10</volume>, <fpage>39638</fpage>&#x2013;<lpage>39655</lpage>. <pub-id pub-id-type="doi">10.1109/access.2022.3166146</pub-id>
</citation>
</ref>
<ref id="B39">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Logenthiran</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Phan</surname>
<given-names>V. T.</given-names>
</name>
<name>
<surname>Woo</surname>
<given-names>W. L.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A novel smart energy theft system (SETS) for IoT-based smart home</article-title>. <source>IEEE Internet Things J.</source> <volume>6</volume> (<issue>3</issue>), <fpage>5531</fpage>&#x2013;<lpage>5539</lpage>. <pub-id pub-id-type="doi">10.1109/jiot.2019.2903281</pub-id>
</citation>
</ref>
<ref id="B40">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lowitzsch</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Hoicka</surname>
<given-names>C. E.</given-names>
</name>
<name>
<surname>van Tulder</surname>
<given-names>F. J.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Renewable energy communities under the 2019 European Clean Energy Package&#x2013;Governance model for the energy clusters of the future?</article-title> <source>Renew. Sustain. Energy Rev.</source> <volume>122</volume>, <fpage>109489</fpage>. <pub-id pub-id-type="doi">10.1016/j.rser.2019.109489</pub-id>
</citation>
</ref>
<ref id="B41">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Meidan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Sachidananda</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Sagron</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Elovici</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Shabtai</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A novel approach for detecting vulnerable IoT devices connected behind a home NAT</article-title>. <source>Comput. Secur.</source> <volume>97</volume>, <fpage>101968</fpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2020.101968</pub-id>
</citation>
</ref>
<ref id="B42">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Mukhopadhyay</surname>
<given-names>R.</given-names>
</name>
</person-group>, (<year>2019</year>). &#x201c;<article-title>Model learning for robotic manipulators using recurrent neural networks</article-title>,&#x201d; in <conf-name>TENCON 2019-2019 IEEE Region 10 Conference (TENCON)</conf-name> <conf-loc>Kochi, India</conf-loc>, (<publisher-name>IEEE</publisher-name>).</citation>
</ref>
<ref id="B43">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Munawar</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Asif</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kabir</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Pamir</surname>
</name>
<name>
<surname>Ullah</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
</person-group>, (<year>2021</year>). <article-title>Electricity theft detection in smart meters using a hybrid bi-directional GRU bi-directional LSTM model</article-title>, <conf-name>Complex, Intelligent and Software Intensive Systems: Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021)</conf-name>. <conf-loc>Cham, Germany</conf-loc>, <publisher-name>Springer</publisher-name>
</citation>
</ref>
<ref id="B44">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Muzumdar</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Modi</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Vyjayanthi</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Designing a blockchain-enabled privacy-preserving energy theft detection system for smart grid neighborhood area network</article-title>. <source>Electr. Power Syst. Res.</source> <volume>207</volume>, <fpage>107884</fpage>. <pub-id pub-id-type="doi">10.1016/j.epsr.2022.107884</pub-id>
</citation>
</ref>
<ref id="B45">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>&#xd8;stergaard</surname>
<given-names>P. A.</given-names>
</name>
<name>
<surname>Duic</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Noorollahi</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Kalogirou</surname>
<given-names>S. A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Recent advances in renewable energy technology for the energy transition</article-title>. <source>Elsevier</source> <volume>179</volume>, <fpage>877</fpage>&#x2013;<lpage>884</lpage>. <pub-id pub-id-type="doi">10.1016/j.renene.2021.07.111</pub-id>
</citation>
</ref>
<ref id="B46">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pamir</surname>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Asif</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Javed</surname>
<given-names>M. U.</given-names>
</name>
<name>
<surname>Yahaya</surname>
<given-names>A. S.</given-names>
</name>
<etal/>
</person-group> (<year>2022</year>). <article-title>Synthetic theft attacks and long short term memory-based preprocessing for electricity theft detection using gated recurrent unit</article-title>. <source>Energies</source> <volume>15</volume> (<issue>8</issue>), <fpage>2778</fpage>. <pub-id pub-id-type="doi">10.3390/en15082778</pub-id>
</citation>
</ref>
<ref id="B47">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Park</surname>
<given-names>C. H.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Energy theft detection in advanced metering infrastructure based on anomaly pattern detection</article-title>. <source>Energies</source> <volume>13</volume> (<issue>15</issue>), <fpage>3832</fpage>. <pub-id pub-id-type="doi">10.3390/en13153832</pub-id>
</citation>
</ref>
<ref id="B48">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Qu</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Abu-Siada</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Yao</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Detection of electricity theft behavior based on improved synthetic minority oversampling technique and random forest classifier</article-title>. <source>Energies</source> <volume>13</volume> (<issue>8</issue>), <fpage>2039</fpage>. <pub-id pub-id-type="doi">10.3390/en13082039</pub-id>
</citation>
</ref>
<ref id="B49">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Quasim</surname>
<given-names>M. T.</given-names>
</name>
<name>
<surname>Nisa</surname>
<given-names>K. u.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>M. Z.</given-names>
</name>
<name>
<surname>Husain</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Alam</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Shuaib</surname>
<given-names>M.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities</article-title>. <source>J. Cloud Comput.</source> <volume>12</volume> (<issue>1</issue>), <fpage>158</fpage>. <pub-id pub-id-type="doi">10.1186/s13677-023-00525-4</pub-id>
</citation>
</ref>
<ref id="B50">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rahman</surname>
<given-names>M. M.</given-names>
</name>
<name>
<surname>Oni</surname>
<given-names>A. O.</given-names>
</name>
<name>
<surname>Gemechu</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Assessment of energy storage technologies: a review</article-title>. <source>Energy Convers. Manag.</source> <volume>223</volume>, <fpage>113295</fpage>. <pub-id pub-id-type="doi">10.1016/j.enconman.2020.113295</pub-id>
</citation>
</ref>
<ref id="B51">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ramos</surname>
<given-names>C. C.</given-names>
</name>
<name>
<surname>Rodrigues</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>de Souza</surname>
<given-names>A. N.</given-names>
</name>
<name>
<surname>Papa</surname>
<given-names>J. P.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>On the study of commercial losses in Brazil: a binary black hole algorithm for theft characterization</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>9</volume> (<issue>2</issue>), <fpage>676</fpage>&#x2013;<lpage>683</lpage>. <pub-id pub-id-type="doi">10.1109/tsg.2016.2560801</pub-id>
</citation>
</ref>
<ref id="B52">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Razavi</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Gharipour</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Fleury</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Akpan</surname>
<given-names>I. J.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A practical feature-engineering framework for electricity theft detection in smart grids</article-title>. <source>Appl. energy</source> <volume>238</volume>, <fpage>481</fpage>&#x2013;<lpage>494</lpage>. <pub-id pub-id-type="doi">10.1016/j.apenergy.2019.01.076</pub-id>
</citation>
</ref>
<ref id="B53">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rehan</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Raza</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Aman</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Abro</surname>
<given-names>A. G.</given-names>
</name>
<name>
<surname>Ismail</surname>
<given-names>I. M. I.</given-names>
</name>
<name>
<surname>Munir</surname>
<given-names>S.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>Untapping the potential of bioenergy for achieving sustainable energy future in Pakistan</article-title>. <source>Energy</source> <volume>275</volume>, <fpage>127472</fpage>. <pub-id pub-id-type="doi">10.1016/j.energy.2023.127472</pub-id>
</citation>
</ref>
<ref id="B54">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ren</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Ba</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Digitalization and energy: how does internet development affect China&#x27;s energy consumption?</article-title> <source>Energy Econ.</source> <volume>98</volume>, <fpage>105220</fpage>. <pub-id pub-id-type="doi">10.1016/j.eneco.2021.105220</pub-id>
</citation>
</ref>
<ref id="B55">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Saxena</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Panigrahi</surname>
<given-names>B. K.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>An MPC based algorithm for a multipurpose grid integrated solar PV system with enhanced power quality and PCC voltage assist</article-title>. <source>IEEE Trans. Energy Convers.</source> <volume>36</volume> (<issue>2</issue>), <fpage>1469</fpage>&#x2013;<lpage>1478</lpage>. <pub-id pub-id-type="doi">10.1109/tec.2021.3059754</pub-id>
</citation>
</ref>
<ref id="B56">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Siu</surname>
<given-names>J. Y.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Panda</surname>
<given-names>S. K.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Command authentication using multiagent system for attacks on the economic dispatch problem</article-title>. <source>IEEE Trans. Industry Appl.</source> <volume>58</volume> (<issue>4</issue>), <fpage>4381</fpage>&#x2013;<lpage>4393</lpage>. <pub-id pub-id-type="doi">10.1109/tia.2022.3172240</pub-id>
</citation>
</ref>
<ref id="B57">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Stracqualursi</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Rosato</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Di Lorenzo</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Panella</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Araneo</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Systematic review of energy theft practices and autonomous detection through artificial intelligence methods</article-title>. <source>Renew. Sustain. Energy Rev.</source> <volume>184</volume>, <fpage>113544</fpage>. <pub-id pub-id-type="doi">10.1016/j.rser.2023.113544</pub-id>
</citation>
</ref>
<ref id="B58">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Toma</surname>
<given-names>R. N.</given-names>
</name>
<name>
<surname>Hasan</surname>
<given-names>M. N.</given-names>
</name>
<name>
<surname>Nahid</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Electricity theft detection to reduce non-technical loss using support vector machine in smart grid</article-title>, <conf-name>2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)</conf-name>. <conf-loc>Dhaka, Bangladesh</conf-loc>, <publisher-name>IEEE</publisher-name>
</citation>
</ref>
<ref id="B59">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ullah</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Asif</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Javed</surname>
<given-names>M. U.</given-names>
</name>
<name>
<surname>Yahaya</surname>
<given-names>A. S.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Alexnet, adaboost and artificial bee colony based hybrid model for electricity theft detection in smart grids</article-title>. <source>Ieee Access</source> <volume>10</volume>, <fpage>18681</fpage>&#x2013;<lpage>18694</lpage>. <pub-id pub-id-type="doi">10.1109/access.2022.3150016</pub-id>
</citation>
</ref>
<ref id="B60">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Xie</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2023</year>).<article-title>An energy theft detection framework with privacy protection for smart grid</article-title>. <conf-name>2023 International Joint Conference on Neural Networks (IJCNN)</conf-name>, <conf-loc>Gold Coast, Australia</conf-loc>, <publisher-name>IEEE</publisher-name>.</citation>
</ref>
<ref id="B61">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>An intrusion detection system using a deep neural network with gated recurrent units</article-title>. <source>IEEE Access</source> <volume>6</volume>, <fpage>48697</fpage>&#x2013;<lpage>48707</lpage>. <pub-id pub-id-type="doi">10.1109/access.2018.2867564</pub-id>
</citation>
</ref>
<ref id="B62">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Ai</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Energy theft detection in an edge data center using threshold-based abnormality detector</article-title>. <source>Int. J. Electr. Power &#x26; Energy Syst.</source> <volume>121</volume>, <fpage>106162</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2020.106162</pub-id>
</citation>
</ref>
<ref id="B63">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Niu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Dai</surname>
<given-names>H. N.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids</article-title>. <source>IEEE Trans. Industrial Inf.</source> <volume>14</volume> (<issue>4</issue>), <fpage>1606</fpage>&#x2013;<lpage>1615</lpage>. <pub-id pub-id-type="doi">10.1109/tii.2017.2785963</pub-id>
</citation>
</ref>
<ref id="B64">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zidi</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Mihoub</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Mian Qaisar</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Krichen</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Abu Al-Haija</surname>
<given-names>Q.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment</article-title>. <source>J. King Saud University-Computer Inf. Sci.</source> <volume>35</volume> (<issue>1</issue>), <fpage>13</fpage>&#x2013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.1016/j.jksuci.2022.05.007</pub-id>
</citation>
</ref>
</ref-list>
<sec id="s11">
<title>Nomenclature</title>
<table-wrap id="udT1" position="float">
<table>
<tbody valign="top">
<tr>
<td align="left">
<bold>(ETD)</bold>
</td>
<td align="left">Electricity Theft Detection</td>
</tr>
<tr>
<td align="left">
<bold>(MLP)</bold>
</td>
<td align="left">Multi-Layer Perceptron</td>
</tr>
<tr>
<td align="left">
<bold>(GTU)</bold>
</td>
<td align="left">Gated Recurrent Units</td>
</tr>
<tr>
<td align="left">
<bold>(CNGC)</bold>
</td>
<td align="left">Chinese National Grid Corporation</td>
</tr>
<tr>
<td align="left">
<bold>(SMOTE)</bold>
</td>
<td align="left">Synthetic Minority Oversampling Technique</td>
</tr>
<tr>
<td align="left">
<bold>(BGRU)</bold>
</td>
<td align="left">Bidirectional Gated Recurrent Unit</td>
</tr>
<tr>
<td align="left">
<bold>(RNN)</bold>
</td>
<td align="left">Recurrent Neural Network</td>
</tr>
<tr>
<td align="left">
<bold>(TL)</bold>
</td>
<td align="left">Technical Losses</td>
</tr>
<tr>
<td align="left">
<bold>(NTLs)</bold>
</td>
<td align="left">Non-Technical Losses</td>
</tr>
<tr>
<td align="left">
<bold>(UK)</bold>
</td>
<td align="left">United Kingdom</td>
</tr>
<tr>
<td align="left">
<bold>(USA)</bold>
</td>
<td align="left">United States of America</td>
</tr>
<tr>
<td align="left">
<bold>(AMI)</bold>
</td>
<td align="left">Advanced Metering Infrastructure</td>
</tr>
<tr>
<td align="left">
<bold>(RF)</bold>
</td>
<td align="left">Random Forest</td>
</tr>
<tr>
<td align="left">
<bold>(DT)</bold>
</td>
<td align="left">Decision trees</td>
</tr>
<tr>
<td align="left">
<bold>(BE)</bold>
</td>
<td align="left">Bagging Ensemble</td>
</tr>
<tr>
<td align="left">
<bold>(ANN)</bold>
</td>
<td align="left">Artificial Neural Networks</td>
</tr>
<tr>
<td align="left">
<bold>(KNN)</bold>
</td>
<td align="left">K-Nearest Neighbors</td>
</tr>
<tr>
<td align="left">
<bold>(NAS)</bold>
</td>
<td align="left">Neural Architecture Search</td>
</tr>
<tr>
<td align="left">
<bold>(AUC)</bold>
</td>
<td align="left">Area Under the Curve</td>
</tr>
<tr>
<td align="left">
<bold>(LSTM)</bold>
</td>
<td align="left">Long Short-Term Memory</td>
</tr>
<tr>
<td align="left">
<bold>(CNN)</bold>
</td>
<td align="left">Convolutional Neural Networks</td>
</tr>
<tr>
<td align="left">
<bold>(Bi-LSTM)</bold>
</td>
<td align="left">Bidirectional Long Short-Term Memory</td>
</tr>
<tr>
<td align="left">
<bold>(2D-CNN)</bold>
</td>
<td align="left">Two-Dimensional Convolutional Neural Networks</td>
</tr>
<tr>
<td align="left">
<bold>(ABC)</bold>
</td>
<td align="left">Artificial bee Colony</td>
</tr>
<tr>
<td align="left">
<bold>(DNN)</bold>
</td>
<td align="left">Deep Neural Network</td>
</tr>
<tr>
<td align="left">
<bold>(IoT)</bold>
</td>
<td align="left">Internet of Things</td>
</tr>
<tr>
<td align="left">
<bold>(SVM)</bold>
</td>
<td align="left">Support Vector Machine</td>
</tr>
<tr>
<td align="left">
<bold>(CVAE)</bold>
</td>
<td align="left">Conditional Variation Auto-Encoder</td>
</tr>
<tr>
<td align="left">
<bold>(IoT)</bold>
</td>
<td align="left">Internet of Things</td>
</tr>
<tr>
<td align="left">
<bold>(DoS)</bold>
</td>
<td align="left">Denial-of-Service</td>
</tr>
<tr>
<td align="left">
<bold>(DDoS)</bold>
</td>
<td align="left">Distributed Denial-of-Service</td>
</tr>
<tr>
<td align="left">
<bold>(U2R)</bold>
</td>
<td align="left">User-to-Root</td>
</tr>
<tr>
<td align="left">
<bold>(R2L)</bold>
</td>
<td align="left">Remote-to-Local</td>
</tr>
<tr>
<td align="left">
<bold>(MITM)</bold>
</td>
<td align="left">Man-in-the-Middle</td>
</tr>
<tr>
<td align="left">
<bold>(WAMS)</bold>
</td>
<td align="left">Wide Area Monitoring System</td>
</tr>
<tr>
<td align="left">
<bold>(MDML)</bold>
</td>
<td align="left">Mixture Density-based Maximum Likelihood</td>
</tr>
<tr>
<td align="left">
<bold>(TLF)</bold>
</td>
<td align="left">Track-Level Fusion</td>
</tr>
<tr>
<td align="left">
<bold>(MPI)</bold>
</td>
<td align="left">Message Passing Interface</td>
</tr>
<tr>
<td align="left">
<bold>(TBSSVM)</bold>
</td>
<td align="left">Technique with Support Vector Machine</td>
</tr>
<tr>
<td align="left">
<bold>(TCN-EMLP)</bold>
</td>
<td align="left">Temporal Convolutional Network with Enhanced Multi-Layer Perceptron</td>
</tr>
<tr>
<td align="left">
<bold>(GMM)</bold>
</td>
<td align="left">Gaussian Mixture Model</td>
</tr>
<tr>
<td align="left">
<bold>(SI)</bold>
</td>
<td align="left">Simple Imputer</td>
</tr>
<tr>
<td align="left">
<bold>(ReLU)</bold>
</td>
<td align="left">Rectified Linear Unit</td>
</tr>
<tr>
<td align="left">
<bold>(LSTM)</bold>
</td>
<td align="left">Long Short-Term Memory</td>
</tr>
<tr>
<td align="left">
<bold>(MCC)</bold>
</td>
<td align="left">Matthews&#x2019; correlation coefficient</td>
</tr>
<tr>
<td align="left">
<bold>(TP)</bold>
</td>
<td align="left">True Positive</td>
</tr>
<tr>
<td align="left">
<bold>(TN)</bold>
</td>
<td align="left">True Negative</td>
</tr>
<tr>
<td align="left">
<bold>(FP)</bold>
</td>
<td align="left">False Positive</td>
</tr>
<tr>
<td align="left">
<bold>(FN)</bold>
</td>
<td align="left">False Negative</td>
</tr>
<tr>
<td align="left">
<bold>(TPR)</bold>
</td>
<td align="left">True Positive Rate</td>
</tr>
<tr>
<td align="left">
<bold>(FDR)</bold>
</td>
<td align="left">Fraud Detection Rate</td>
</tr>
<tr>
<td align="left">
<bold>(DMT)</bold>
</td>
<td align="left">Diebold and Mariano Test.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</back>
</article>