Login / Signup
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud.
Varun Badrinath Krishna
Carl A. Gunter
William H. Sanders
Published in:
IEEE J. Sel. Top. Signal Process. (2018)
Keyphrases
</>
dynamic programming
identity theft
anomaly detection
countermeasures
fraud detection
optimal solution
feature vectors
electric power
object detection
worst case
data mining techniques
privacy preserving
short term