RESEARCH ARTICLES
Published 2025-04-15
Keywords
- matrix completion,
- K-means clustering algorithm,
- smart grid,
- data privacy,
- anomaly detection
How to Cite
Shaik Masood bee, Varidhireddy Vara Lakshmi, Reddeti Venkata Rakesh, Vidyapogula Likhi Prabhas Pal, & P Siva Lakshmi. (2025). Detecting Abnormal Power Usage In Smart Grids With Fusion Matrix And Clustering. International Journal of Computational Learning & Intelligence, 4(3), 562–569. https://doi.org/10.5281/zenodo.15224655
Copyright (c) 2025 Shaik Masood bee, Varidhireddy Vara Lakshmi, Reddeti Venkata Rakesh, Vidyapogula Likhi Prabhas Pal, P Siva Lakshmi

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
The advancement of new technologies such as the Internet of Things (IoT) and big data has made smart grids a key focus for the future of power systems. However, the increased communication between various participants in smart grids raises the risk of privacy breaches. Additionally, malicious attacks involving the injection of abnormal power data can result in financial losses and security issues. This study introduces a two-part solution to tackle these challenges: a matrix completion-based privacy protection scheme and an unsupervised learning-based anomaly detection scheme. The privacy protection scheme addresses data privacy concerns between different trust domains in the smart grid by using matrix completion to fill in missing data. It also improves privacy by adding noise with statistical properties similar to the original data. To improve anomaly detection, an enhanced K-means clustering algorithm is employed to eliminate outliers and refine clustering accuracy. Experimental results demonstrate that the proposed algorithm achieves an accuracy of 0.9, an F1 score of 0.7, and a Bayesian detection rate of 0.61 — all surpassing the performance of other algorithms. The AUC (Area Under the Curve) value of 0.79 confirms the effectiveness of the proposed method in detecting irregular electricity consumption patterns.References
- Gu, S., Du, X., Shi, Y., Sun, P., & Tai, H.-M. (2020). Power control for grid-connected converters to comply with safety limits during grid faults. IEEE Journal of Emerging and Selected Topics in Power Electronics, 8(1), 866–876. https://doi.org/10.1109/JESTPE.2018.2888552
- Zhang, S., Zhou, M., Liu, Z., Li, G., & Zhang, L. (2022). Hierarchical flexible operation of a VSC-MTDC interconnected hybrid grid with high renewable power integration. IEEE Transactions on Power Systems, 37(6), 4936–4949. https://doi.org/10.1109/TPWRS.2022.3155637
- Xin, Y., Zhang, B., Zhai, M., Li, Q., & Zhou, H. (2018). Smarter grid operation: New energy management systems in China. IEEE Power & Energy Magazine, 16(2), 36–45. https://doi.org/10.1109/MPE.2017.2779551
- Liu, Y., Yao, J., Pei, J., Zhao, Y., Sun, P., Zeng, D., & Chen, S. (2021). Enhanced transient stability control for grid-connected VSC under severe grid faults. IEEE Transactions on Energy Conversion, 36(1), 218–229. https://doi.org/10.1109/TEC.2020.3011203
- Lv, L., Wu, Z., Zhang, J., Zhang, L., Tan, Z., & Tian, Z. (2022). VMD and LSTM-based hybrid model for load forecasting in grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474–6482. https://doi.org/10.1109/TII.2021.3130237
- Ni, Z., & Paul, S. (2019). A multistage game-based reinforcement learning solution for smart grid security. IEEE Transactions on Neural Networks and Learning Systems, 30(9), 2684–2695. https://doi.org/10.1109/TNNLS.2018.2885530
- Eskandarpour, R., Gokhale, P., Khodaei, A., Chong, F. T., Passo, A., & Bahramirad, S. (2020). Enhancing grid security using quantum computing. IEEE Transactions on Power Systems, 35(5), 4135–4137. https://doi.org/10.1109/TPWRS.2020.3004073
- Sahoo, S., Dragicevic, T., & Blaabjerg, F. (2021). Cybersecurity challenges and vulnerabilities in grid-tied power converters. IEEE Journal of Emerging and Selected Topics in Power Electronics, 9(5), 5326–5340. https://doi.org/10.1109/JESTPE.2019.2953480
- Cuper, M., Lóderer, M., & Rozinajová, V. (2019). Clustering and statistical analysis for detecting abnormal load consumption in power grids. In Proceedings of the 20th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL) (pp. 464–475). https://doi.org/10.1007/978-3-030-33607-3_50
- Li, M., Zhang, K., Liu, J., Gong, H., & Zhang, Z. (2020). Blockchain-based anomaly detection for electricity consumption in smart grids. Pattern Recognition Letters, 138, 476–482. https://doi.org/10.1016/j.patrec.2020.07.020
- Ahmad, T., Chen, H., Wang, J., & Guo, Y. (2018). Review of modeling techniques for electricity theft detection in smart grids. Renewable and Sustainable Energy Reviews, 82(3), 2916–2933. https://doi.org/10.1016/j.rser.2017.10.040
- Aligholian, A., Farajollahi, M., & Mohsenian-Rad, H. (2019). Unsupervised learning for real-time anomaly detection in smart meter data. In Proceedings of the IEEE Power and Energy Society General Meeting (PESGM) (pp. 1–5). https://doi.org/10.1109/pesgm40551.2019.8973564
- Maciel, L. A., Souza, M. A., & de Freitas, H. C. (2020). FPGA-based K-means/K-modes architecture for network intrusion detection. IEEE Transactions on Circuits and Systems II: Express Briefs, 67(8), 1459–1463. https://doi.org/10.1109/TCSII.2019.2939826
- Wang, X., Shao, C., Xu, S., Zhang, S., Xu, W., & Guan, Y. (2020). Private clinic location optimization using K-means clustering and evaluation models. IEEE Access, 8, 23069–23081. https://doi.org/10.1109/ACCESS.2020.2967797
- Minjie, Z., & Yilian, Z. (2023). PCA and OCSVM-based abnormal traffic detection in power IoT terminals. In Proceedings of the IEEE 6th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (pp. 549–553). https://doi.org/10.1109/ITNEC56291.2023.10082380
- Guha, D., Chatterjee, R., & Sikdar, B. (2023). LSTM-based variational autoencoder for anomaly detection in power grids. IEEE Systems Journal, 17(3), 4313–4323. https://doi.org/10.1109/JSYST.2023.3266554
- Mallik, R. K. (2018). Eigen-analysis and applications of the exponential correlation matrix. IEEE Transactions on Wireless Communications, 17(7), 4690–4705. https://doi.org/10.1109/TWC.2018.2829781
- Akaber, P., Moussa, B., Ghafouri, M., Atallah, R., Agba, B. L., Assi, C., & Debbabi, M. (2020). CASeS: Security metric deployment for smart grids. IEEE Transactions on Smart Grid, 11(3), 2676–2687. https://doi.org/10.1109/TSG.2019.2959937
- Li, X., Li, J., Li, H., Yin, S., & Cai, Z. (2023). Detection of abnormal commutation states in converters based on AC current characteristics. IEEE Transactions on Power Delivery, 38(2), 1052–1063. https://doi.org/10.1109/TPWRD.2022.3204621
- Li, M. (2019). Generalized Lagrange multiplier and KKT conditions for distributed optimization. IEEE Transactions on Circuits and Systems II: Express Briefs, 66(2), 252–256. https://doi.org/10.1109/TCSII.2018.2842085
- Zhou, N., Cheng, H., Qin, J., Du, Y., & Chen, B. (2019). High-order manifold constrained sparse PCA for image representation. IEEE Transactions on Circuits and Systems for Video Technology, 29(7), 1946–1961. https://doi.org/10.1109/TCSVT.2018.2856827
- Gao, Y.-L., Wu, M.-J., Liu, J.-X., Zheng, C.-H., & Wang, J. (2022). Hypergraph-based robust PCA for clustering and gene selection. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 19(4), 2420–2430. https://doi.org/10.1109/TCBB.2021.3065054
- Madapuri, R. K., & Mahesh, P. C. S. (2017). HBS-CRA: Scaling impact of change request towards fault proneness: Defining a heuristic and biases scale (HBS) of change request artifacts (CRA). Cluster Computing, 22(S5), 11591–11599. https://doi.org/10.1007/s10586-017-1424-0
- Dwaram, J. R., & Madapuri, R. K. (2022). Crop yield forecasting by long short‐term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. Concurrency and Computation: Practice and Experience, 34(27). https://doi.org/10.1002/cpe.7310
- Reddy, B. S. H. (2025). Deep learning-based detection of hair and scalp diseases using CNN and image processing. Milestone Transactions on Medical Technometrics, 3(1), 145–155. https://doi.org/10.5281/zenodo.14965660
- Reddy, B. S. H., Venkatramana, R., & Jayasree, L. (2025). Enhancing apple fruit quality detection with augmented YOLOv3 deep learning algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944
- Ahmed, S. T., Kaladevi, A. C., Shankar, A., & Alqahtani, F. (2025). Privacy Enhanced Edge-AI Healthcare Devices Authentication: A Federated Learning Approach. IEEE Transactions on Consumer Electronics.
- Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.
- Syed Thouheed Ahmed, S., Sandhya, M., & Shankar, S. (2018, August). ICT’s role in building and understanding indian telemedicine environment: A study. In Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017 (pp. 391-397). Singapore: Springer Singapore.
- Sreedhar Kumar, S., Ahmed, S. T., & NishaBhai, V. B. (2019). Type of supervised text classification system for unstructured text comments using probability theory technique. International Journal of Recent Technology and Engineering (IJRTE), 8(10).
- Ahmed, S. T., Basha, S. M., Arumugam, S. R., & Kodabagi, M. M. (2021). Pattern Recognition: An Introduction. MileStone Research Publications.