{"id":845,"date":"2024-12-31T16:41:52","date_gmt":"2024-12-31T16:41:52","guid":{"rendered":"https:\/\/els-journal.net\/wp\/about\/"},"modified":"2025-04-27T08:28:34","modified_gmt":"2025-04-27T08:28:34","slug":"28202-deceptive-maneuvers-subverting-cnn-adaboost-model-for-energy-theft-detection","status":"publish","type":"page","link":"https:\/\/els-journal.net\/wp\/?page_id=845","title":{"rendered":"28202 Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection"},"content":{"rendered":"\n\n\n<h3>Vol. 28, No. 2 &#8211; December 2024<\/h3>\n<h3>Deceptive Maneuvers: Subverting CNN-AdaBoost\nModel for Energy Theft Detection<\/h3>\n<h5>https:\/\/doi.org\/10.53314\/ELS2428046N<\/h5>\n<h5>Santosh Nirmal and Pramod Patil<\/h5>\n<h5><b>Abstract<\/b><\/h5>\n<h5><p>As deep learning models become more prevalent in\nsmart grid systems, ensuring their accuracy in tasks like identifying\nabnormal customer behavior is increasingly important. As its\nuse is increased in smart grids to detect energy theft, crafting adversarial\ndata by attackers to deceive the model to get the desired\noutput is also increased. Evasion attacks (EA) attempt to evade\ndetection by misclassifying input data during testing. The manipulation\nof data inputs is done so that it is not noticeable to humans\nbut can cause the machine learning (ML) model to produce incorrect\nresults. Electricity theft has become a major problem for utility\ncompanies that need to be dealt with effectively. Convolutional\nNeural Network (CNN) and AdaBoost hybrid model have been developed\nthat promise to detect electricity theft with high accuracy.\nHowever, this model is also vulnerable to evasion attacks that can\nrender it ineffective.<\/p>\n<p>In this paper, to make the detection system more robust, we\npresent a generative method to create evasion attacks against a\nhybrid model combining Convolutional Neural Network and\nAdaboost (CNN-Adaboost). Generated adversarial data from the\nproposed algorithm is crafted on the model to test its performance.\nOur proposed attack is validated with State Grid Corporation of\nChina (SGCC) dataset. We test the CNN-Adaboost energy theft\ndetection model and other models\u2019 performance under 5% and\n10% evasion attacks. Our findings reveal model performance degradation\nunder our proposed generative evasion attack ranging\nfrom 96.35% to 89.23%. With the defence mechanism, we successfully\nincreased adversarial accuracy by up to 97% and decreased\nthe attack success rate (ASR) by up to 3%. These adversaries are\nuseful for designing robust and secure machine learning models,\noffering an improved solution compared to previous work in this\narea. We tested the model with varying percentages of adversarial\ndata to analyze its behavior effectively. These adversaries are\nuseful for designing robust and secure ML models. The proposed\nattack and defence can be utilized to test energy theft detection\n(ETD) models in industrial and commercial settings.<\/p><\/h5>\n<h5>Full text:  <a class=\"fas fa-file-pdf\" href=\"https:\/\/els-journal.net\/wp\/wp-content\/uploads\/2024\/12\/2024-28-2-02.pdf\" target=\"_blank\" rel=\"noopener\"><\/a><\/h5>\n\n\n\n\n<a target=\"_blank\" href=\"http:\/\/www.scopus.com\/inward\/citedby.uri?partnerID=HzOxMe3b&#038;doi=10.53314\/ELS2428046N&#038;origin=inward\" ref=\"scopus-citedby\" rel=\"noopener\"><image src=\"http:\/\/api.elsevier.com\/content\/abstract\/citation-count?doi=10.53314\/ELS2428046N&#038;httpAccept=image%2Fjpeg&#038;apiKey=87124910cd33413b75b0a6f4e70d58bd\" border=\"0\" alt=\"cited by count\"\/><\/a>\n\n\n\n\nGoogle Scholar Citations <a target=\"_blank\" class=\"fas fa-external-link-alt\" href=\"http:\/\/scholar.google.com\/scholar?hl=en&#038;lr=&#038;cites=http:\/\/dx.doi.org\/ELS2428046N\" rel=\"noopener\"><\/a>\n\n\n\n\n<center> <span class=\"__dimensions_badge_embed__\" data-doi=\"10.53314\/ELS2428046N\" data-style=\"small_circle\"><\/span> <\/center> <script async src=\"https:\/\/badge.dimensions.ai\/badge.js\" charset=\"utf-8\"><\/script>\n\n\n\n\n<center>Google Scholar Citations <a target=\"_blank\" class=\"fas fa-external-link-alt\" href=\"http:\/\/scholar.google.com\/scholar?hl=en&#038;lr=&#038;cites=http:\/\/dx.doi.org\/10.53314\/ELS2428046N\" rel=\"noopener\"><\/a><\/center>\n\n\n\n\n<a target=\"_blank\" href=\"http:\/\/www.scopus.com\/inward\/citedby.uri?partnerID=HzOxMe3b&#038;doi=10.53314\/ELS2428046N&#038;origin=inward\" ref=\"scopus-citedby\" rel=\"noopener\"><image src=\"http:\/\/api.elsevier.com\/content\/abstract\/citation-count?doi=10.53314\/ELS2428046N&#038;httpAccept=image%2Fjpeg&#038;apiKey=87124910cd33413b75b0a6f4e70d58bd\" border=\"0\" alt=\"cited by count\"\/><\/a>\n\n\n\n\n<center><span class=\"__dimensions_badge_embed__\" data-doi=\"10.53314\/ELS2428046N\" data-style=\"large_rectangle\"><\/span><\/center><script async src=\"https:\/\/badge.dimensions.ai\/badge.js\" charset=\"utf-8\"><\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":828,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-845","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/pages\/845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=845"}],"version-history":[{"count":4,"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/pages\/845\/revisions"}],"predecessor-version":[{"id":902,"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/pages\/845\/revisions\/902"}],"up":[{"embeddable":true,"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=\/wp\/v2\/pages\/828"}],"wp:attachment":[{"href":"https:\/\/els-journal.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}