A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems

D Du, M Zhu, X Li, M Fei, S Bu, L Wu… - Journal of Modern …, 2022 - ieeexplore.ieee.org
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …

Deep autoencoder-based anomaly detection of electricity theft cyberattacks in smart grids

A Takiddin, M Ismail, U Zafar… - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Designing an electricity theft cyberattack detector for the advanced metering infrastructures
(AMIs) is challenging due to the limited availability of electricity theft datasets (ie, malicious …

Detection methods in smart meters for electricity thefts: A survey

X Xia, Y Xiao, W Liang, J Cui - Proceedings of the IEEE, 2022 - ieeexplore.ieee.org
For accommodating rapidly increasing power demands, power systems are transitioning
from analog systems to systems with increasing digital control and communications …

Performance analysis of electricity theft detection for the smart grid: An overview

Z Yan, H Wen - IEEE Transactions on Instrumentation and …, 2021 - ieeexplore.ieee.org
Electricity theft has been a growing concern for the smart grid. It can be defined as follows:
illegal customers use energy from electric utilities without a contract or manipulate their …

Review of the data-driven methods for electricity fraud detection in smart metering systems

MM Badr, MI Ibrahem, HA Kholidy, MM Fouda, M Ismail - Energies, 2023 - mdpi.com
In smart grids, homes are equipped with smart meters (SMs) to monitor electricity
consumption and report fine-grained readings to electric utility companies for billing and …

Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

Electricity theft detection in AMI based on clustering and local outlier factor

Y Peng, Y Yang, Y Xu, Y Xue, R Song, J Kang… - IEEE …, 2021 - ieeexplore.ieee.org
As one of the key components of smart grid, advanced metering infrastructure (AMI) provides
an immense number of data, making technologies such as data mining more suitable for …

Deep learning for cybersecurity in smart grids: Review and perspectives

J Ruan, G Liang, J Zhao, H Zhao, J Qiu… - Energy Conversion …, 2023 - Wiley Online Library
Protecting cybersecurity is a non‐negotiable task for smart grids (SG) and has garnered
significant attention in recent years. The application of artificial intelligence (AI), particularly …

Robust data-driven detection of electricity theft adversarial evasion attacks in smart grids

A Takiddin, M Ismail, E Serpedin - IEEE Transactions on Smart …, 2022 - ieeexplore.ieee.org
Existing machine learning-based detectors of electricity theft cyberattacks are trained to
detect only simple traditional types of cyberattacks while neglecting complex ones like …