Vol. 4 No. 3 (2025): July
RESEARCH ARTICLES

Detecting Abnormal Power Usage In Smart Grids With Fusion Matrix And Clustering

Shaik Masood bee
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
Varidhireddy Vara Lakshmi
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
Reddeti Venkata Rakesh
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
Vidyapogula Likhi Prabhas Pal
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
P Siva Lakshmi
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India

Published 2025-04-15

Keywords

  • matrix completion,
  • K-means clustering algorithm,
  • smart grid,
  • data privacy,
  • anomaly detection

How to Cite

Shaik Masood bee, Varidhireddy Vara Lakshmi, Reddeti Venkata Rakesh, Vidyapogula Likhi Prabhas Pal, & P Siva Lakshmi. (2025). Detecting Abnormal Power Usage In Smart Grids With Fusion Matrix And Clustering. International Journal of Computational Learning & Intelligence, 4(3), 562–569. https://doi.org/10.5281/zenodo.15224655

Abstract

The advancement of new technologies such as the Internet of Things (IoT) and big data has made smart grids a key focus for the future of power systems. However, the increased communication between various participants in smart grids raises the risk of privacy breaches. Additionally, malicious attacks involving the injection of abnormal power data can result in financial losses and security issues. This study introduces a two-part solution to tackle these challenges: a matrix completion-based privacy protection scheme and an unsupervised learning-based anomaly detection scheme. The privacy protection scheme addresses data privacy concerns between different trust domains in the smart grid by using matrix completion to fill in missing data. It also improves privacy by adding noise with statistical properties similar to the original data. To improve anomaly detection, an enhanced K-means clustering algorithm is employed to eliminate outliers and refine clustering accuracy. Experimental results demonstrate that the proposed algorithm achieves an accuracy of 0.9, an F1 score of 0.7, and a Bayesian detection rate of 0.61 — all surpassing the performance of other algorithms. The AUC (Area Under the Curve) value of 0.79 confirms the effectiveness of the proposed method in detecting irregular electricity consumption patterns.

References

  1. Gu, S., Du, X., Shi, Y., Sun, P., & Tai, H.-M. (2020). Power control for grid-connected converters to comply with safety limits during grid faults. IEEE Journal of Emerging and Selected Topics in Power Electronics, 8(1), 866–876. https://doi.org/10.1109/JESTPE.2018.2888552
  2. Zhang, S., Zhou, M., Liu, Z., Li, G., & Zhang, L. (2022). Hierarchical flexible operation of a VSC-MTDC interconnected hybrid grid with high renewable power integration. IEEE Transactions on Power Systems, 37(6), 4936–4949. https://doi.org/10.1109/TPWRS.2022.3155637
  3. Xin, Y., Zhang, B., Zhai, M., Li, Q., & Zhou, H. (2018). Smarter grid operation: New energy management systems in China. IEEE Power & Energy Magazine, 16(2), 36–45. https://doi.org/10.1109/MPE.2017.2779551
  4. Liu, Y., Yao, J., Pei, J., Zhao, Y., Sun, P., Zeng, D., & Chen, S. (2021). Enhanced transient stability control for grid-connected VSC under severe grid faults. IEEE Transactions on Energy Conversion, 36(1), 218–229. https://doi.org/10.1109/TEC.2020.3011203
  5. Lv, L., Wu, Z., Zhang, J., Zhang, L., Tan, Z., & Tian, Z. (2022). VMD and LSTM-based hybrid model for load forecasting in grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474–6482. https://doi.org/10.1109/TII.2021.3130237
  6. Ni, Z., & Paul, S. (2019). A multistage game-based reinforcement learning solution for smart grid security. IEEE Transactions on Neural Networks and Learning Systems, 30(9), 2684–2695. https://doi.org/10.1109/TNNLS.2018.2885530
  7. Eskandarpour, R., Gokhale, P., Khodaei, A., Chong, F. T., Passo, A., & Bahramirad, S. (2020). Enhancing grid security using quantum computing. IEEE Transactions on Power Systems, 35(5), 4135–4137. https://doi.org/10.1109/TPWRS.2020.3004073
  8. Sahoo, S., Dragicevic, T., & Blaabjerg, F. (2021). Cybersecurity challenges and vulnerabilities in grid-tied power converters. IEEE Journal of Emerging and Selected Topics in Power Electronics, 9(5), 5326–5340. https://doi.org/10.1109/JESTPE.2019.2953480
  9. Cuper, M., Lóderer, M., & Rozinajová, V. (2019). Clustering and statistical analysis for detecting abnormal load consumption in power grids. In Proceedings of the 20th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL) (pp. 464–475). https://doi.org/10.1007/978-3-030-33607-3_50
  10. Li, M., Zhang, K., Liu, J., Gong, H., & Zhang, Z. (2020). Blockchain-based anomaly detection for electricity consumption in smart grids. Pattern Recognition Letters, 138, 476–482. https://doi.org/10.1016/j.patrec.2020.07.020
  11. Ahmad, T., Chen, H., Wang, J., & Guo, Y. (2018). Review of modeling techniques for electricity theft detection in smart grids. Renewable and Sustainable Energy Reviews, 82(3), 2916–2933. https://doi.org/10.1016/j.rser.2017.10.040
  12. Aligholian, A., Farajollahi, M., & Mohsenian-Rad, H. (2019). Unsupervised learning for real-time anomaly detection in smart meter data. In Proceedings of the IEEE Power and Energy Society General Meeting (PESGM) (pp. 1–5). https://doi.org/10.1109/pesgm40551.2019.8973564
  13. Maciel, L. A., Souza, M. A., & de Freitas, H. C. (2020). FPGA-based K-means/K-modes architecture for network intrusion detection. IEEE Transactions on Circuits and Systems II: Express Briefs, 67(8), 1459–1463. https://doi.org/10.1109/TCSII.2019.2939826
  14. Wang, X., Shao, C., Xu, S., Zhang, S., Xu, W., & Guan, Y. (2020). Private clinic location optimization using K-means clustering and evaluation models. IEEE Access, 8, 23069–23081. https://doi.org/10.1109/ACCESS.2020.2967797
  15. Minjie, Z., & Yilian, Z. (2023). PCA and OCSVM-based abnormal traffic detection in power IoT terminals. In Proceedings of the IEEE 6th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (pp. 549–553). https://doi.org/10.1109/ITNEC56291.2023.10082380
  16. Guha, D., Chatterjee, R., & Sikdar, B. (2023). LSTM-based variational autoencoder for anomaly detection in power grids. IEEE Systems Journal, 17(3), 4313–4323. https://doi.org/10.1109/JSYST.2023.3266554
  17. Mallik, R. K. (2018). Eigen-analysis and applications of the exponential correlation matrix. IEEE Transactions on Wireless Communications, 17(7), 4690–4705. https://doi.org/10.1109/TWC.2018.2829781
  18. Akaber, P., Moussa, B., Ghafouri, M., Atallah, R., Agba, B. L., Assi, C., & Debbabi, M. (2020). CASeS: Security metric deployment for smart grids. IEEE Transactions on Smart Grid, 11(3), 2676–2687. https://doi.org/10.1109/TSG.2019.2959937
  19. Li, X., Li, J., Li, H., Yin, S., & Cai, Z. (2023). Detection of abnormal commutation states in converters based on AC current characteristics. IEEE Transactions on Power Delivery, 38(2), 1052–1063. https://doi.org/10.1109/TPWRD.2022.3204621
  20. Li, M. (2019). Generalized Lagrange multiplier and KKT conditions for distributed optimization. IEEE Transactions on Circuits and Systems II: Express Briefs, 66(2), 252–256. https://doi.org/10.1109/TCSII.2018.2842085
  21. Zhou, N., Cheng, H., Qin, J., Du, Y., & Chen, B. (2019). High-order manifold constrained sparse PCA for image representation. IEEE Transactions on Circuits and Systems for Video Technology, 29(7), 1946–1961. https://doi.org/10.1109/TCSVT.2018.2856827
  22. Gao, Y.-L., Wu, M.-J., Liu, J.-X., Zheng, C.-H., & Wang, J. (2022). Hypergraph-based robust PCA for clustering and gene selection. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 19(4), 2420–2430. https://doi.org/10.1109/TCBB.2021.3065054
  23. Madapuri, R. K., & Mahesh, P. C. S. (2017). HBS-CRA: Scaling impact of change request towards fault proneness: Defining a heuristic and biases scale (HBS) of change request artifacts (CRA). Cluster Computing, 22(S5), 11591–11599. https://doi.org/10.1007/s10586-017-1424-0
  24. Dwaram, J. R., & Madapuri, R. K. (2022). Crop yield forecasting by long short‐term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. Concurrency and Computation: Practice and Experience, 34(27). https://doi.org/10.1002/cpe.7310
  25. Reddy, B. S. H. (2025). Deep learning-based detection of hair and scalp diseases using CNN and image processing. Milestone Transactions on Medical Technometrics, 3(1), 145–155. https://doi.org/10.5281/zenodo.14965660
  26. Reddy, B. S. H., Venkatramana, R., & Jayasree, L. (2025). Enhancing apple fruit quality detection with augmented YOLOv3 deep learning algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944
  27. Ahmed, S. T., Kaladevi, A. C., Shankar, A., & Alqahtani, F. (2025). Privacy Enhanced Edge-AI Healthcare Devices Authentication: A Federated Learning Approach. IEEE Transactions on Consumer Electronics.
  28. Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.
  29. Syed Thouheed Ahmed, S., Sandhya, M., & Shankar, S. (2018, August). ICT’s role in building and understanding indian telemedicine environment: A study. In Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017 (pp. 391-397). Singapore: Springer Singapore.
  30. Sreedhar Kumar, S., Ahmed, S. T., & NishaBhai, V. B. (2019). Type of supervised text classification system for unstructured text comments using probability theory technique. International Journal of Recent Technology and Engineering (IJRTE), 8(10).
  31. Ahmed, S. T., Basha, S. M., Arumugam, S. R., & Kodabagi, M. M. (2021). Pattern Recognition: An Introduction. MileStone Research Publications.