Abstract: One of the key methods for identifying anomalous activities, such as electricity theft, metering errors, cyber-attacks, and technical losses by distribution network operators (DNOs), is the ...
Abstract: Many learning algorithms such as kernel machines, nearest neighbors, clustering, or anomaly detection, are based on distances or similarities. Before similarities are used for training an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results