<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Time Series Anomaly Detection in Smart Homes: A Deep Learning Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Somayeh Zamani</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hamed Talebi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gunnar Stevens</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Amirkabir University of Technology</institution>
          ,
          <addr-line>Tehran</addr-line>
          ,
          <country country="IR">Iran</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Siegen</institution>
          ,
          <addr-line>Siegen</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Fixing energy leakage caused by diferent anomalies can result in significant energy savings and extended appliance life. Further, it assists grid operators in scheduling their resources to meet the actual needs of end users, while helping end users reduce their energy costs. In this paper, we analyze the patterns pertaining to the power consumption of dishwashers used in two houses of the REFIT dataset. Then two autoencoder (AE) architectures with 1D-CNN and TCN as backbones are trained to diferentiate the normal patterns from the abnormal ones. Our results indicate that TCN outperforms CNN1D in detecting anomalies in energy consumption. Finally, the data from the Fridge_Freezer and the Freezer of house No. 3 in REFIT is also used to evaluate our approach.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Time series</kwd>
        <kwd>Anomaly detection</kwd>
        <kwd>Deep learning</kwd>
        <kwd>Autoencoder</kwd>
        <kwd>Temporal convolutional networks</kwd>
        <kwd>Smart home</kwd>
        <kwd>Sustainability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        higher power consumption or damage in the most critical
cases [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Throughout recent years, the energy demand has signifi- Thus, for optimization purposes in smart homes, via
cantly gone up due to urban and industrial development implementing load monitoring systems and formulating
alongside an increase in population [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Therefore, cli- smart anomaly detection models using machine learning
mate change, global warming, and volatility in energy techniques, the abnormality can be mitigated [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. To do
prices have fuelled the interest in smart systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In so, it is essential to analyze the energy consumption of
this regard, the huge potential increase of replacing tra- households in order to identify consumption patterns and
ditional home appliances with new in-operation power- extract valuable information from smart homes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ][
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
consuming ones by 2040 has caused the residential sector In this paper, the power consumption patterns of
dishto account for roughly 60% over 2017-25 and 70% over washers used in houses No. 1 and 2 of the REFIT dataset
2025-40 of electricity demand increase of buildings. As are analyzed as examples of devices that are used based
such, household appliances need to be operating efi- on the needs of users. Then, the data for each usage of
ciently and used appropriately to achieve energy-saving the device is divided into diferent signals to properly
goals [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. train autoencoders with diferent backbones, including
      </p>
      <p>
        To this end, utilizing AI-based technologies and smart 1-dimensional CNN and TCN, to detect abnormal usage.
homes as novel interventions to recognize abnormal For this purpose, any predicted value that is greater than
power utilization and understand the reasons for each ab- twice the standard deviation of the electricity
consumpnormality could pave the way for end-consumers both to tion the day before is considered abnormal.
renovate wasteful devices and adopt a more sustainable The rest of the paper is organized as follows. We
proenergy consumption behavior [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ][
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref6">6</xref>
        ][
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Moreover, it vide related work on anomaly detection in energy
confacilitates the prediction of end-users power demand as sumption in Section 2. In Section 3, our methodology is
well as performing an optimal energy distribution by presented in details. Section 4 concludes the paper and
grid operators depending on specific end-users’ needs. discusses future work.
      </p>
      <p>In addition, electrical anomalies are less likely to remain
unnoticed for a long period of time which would result in
2. Related work
method, the feature representations are enforced to learn
important regularities of the data so that reconstruction
errors are minimized. Consequently, anomalies are
dififcult to reconstruct from the resulting representations
and are, therefore, subject to large reconstruction errors
[17].</p>
    </sec>
    <sec id="sec-2">
      <title>3. Methodology</title>
      <sec id="sec-2-1">
        <title>3.1. Dataset and preprocessing</title>
        <sec id="sec-2-1-1">
          <title>The REFIT Electrical Load Measurements dataset con</title>
          <p>
            tain cleaned electrical consumption data in Watts for 20
households in the UK at both the aggregate and
appliFigure 1: The architecture of the CNN-based autoencoder ance level. The data is related to a period of two years
(CNN-AE) comprising nine individual appliance measurements at
8-second intervals per house with 1,194,958,790 readings
[16]. The models proposed in this paper are trained using
level monitoring devices are needed to continuously mon- dishwasher data from houses No. 1 and 2. Furthermore,
itor the power consumption of individual appliances in data from the Fridge_Freezer and the Freezer of house
a house [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]. However, identifying anomalies, and their No. 3 is used to assess the efectiveness of our approach.
nature of them should also be considered, which can be To begin with, it is necessary to resample the data
categorized, based on diferent dimensions. In the data to convert it into equal time intervals r. Then using
science world, anomalies are seen as either single points the following formula, the average sampling time,  of
that are not necessarily relevant to each other or a set the REFIT data is used to fill in a limited number of
of data points that constitute a pattern and, therefore, signals, n with no data. The remaining empty intervals
can be interpreted in relation to each other. The other are substituted with zero.
dimension of anomaly detection that should be taken ︂[ 4 *  ]︂
into account is the context which refers to a deviation in  =  (1)
a particular context relating to the structure of the data
[
            <xref ref-type="bibr" rid="ref3">3</xref>
            ][
            <xref ref-type="bibr" rid="ref13">13</xref>
            ][
            <xref ref-type="bibr" rid="ref14">14</xref>
            ]. For example, in the context of a warm sea- Additionally, for devices used according to users’ needs,
son, a temperature report of -30 degrees Celsius can be consumption data must first be diferentiated. The power
anomalous; however, during a cold season, such a report consumption pattern may include turning the device on
may be more common [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]. To this end, understanding and of several times per usage. The matching data is
the available data will provide a solid foundation for im- therefore combined into relevant signals. Also, due to
proving energy eficiency. For this purpose, there are the possibility of failure in some devices that can result
thirty-one publicly available databases with several fea- in constant operation for an extended period, we assume
tures, such as the geographical location, period of col- a maximum period for a device to operate.
lection, number of monitored households, the sampling
rate of collected data, and number of sub-metered
appliances [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]. Regarding this, a valuable dataset is REFIT
which includes cleaned electrical consumption in Watts
for 20 households in the UK at both the aggregate and
appliance levels [16]. On the other hand, Pang [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] has
provided a comprehensive overview of current anomaly
detection methods to gain an important understanding of
their inherent capabilities and limitations in addressing
some largely unsolved challenges in anomaly detection. Figure 2: The architecture of the TCN-based autoencoder
According to his study, Autoencoders, which are a sub- (TCN-AE)
set of the generic normality feature learning category,
aim to learn some low-dimensional feature
representation space on which the given data instances can be well 3.2. The proposed models
reconstructed. While this is a widely used method for
data compression or dimension reduction, by using this
          </p>
        </sec>
        <sec id="sec-2-1-2">
          <title>The development of time series anomaly detection algorithms has recently received considerable attention.</title>
          <p>Autoencoder-based approaches are often used to identify by a factor of . To do so, groups of size  are averaged
anomalous behavior by analyzing the reconstruction er- along the time axis.
ror of the data [18][19][20]. Having learned a nonlinear In the decoder module, the downsampled sequence
transformation of the input data into a compressed rep- is returned to its original length by performing a
nearresentation, latent variables are used to reconstruct the est neighbor interpolation on the upsampled sequence.
original input. On the other hand, utilizing the convolu- Upsampled sequences are passed through a second TCN
tion mechanism in sequential models is computationally with independent weights parameterized similarly to the
optimal [21]. Also, due to CNNs’ equivariance proper- encoder-TCN. As a final step, the input sequence is
reties and sparse interactions, they are translated from constructed with a Conv1D layer that ensures that the
computer vision into the time domain using temporal dimensionality of the input is matched (by setting  = 1
convolutional networks (TCN)[20]. and  = ) [20]. As described in the next section,</p>
          <p>In the following sections, we will describe how we the input sequence and its reconstruction will be used
used autoencoders (AEs) for time series data that utilize for detecting anomalies after TCN-AE has been trained.
1-dimensional CNNs and TCNs as building blocks to
detect energy anomalies in the REFIT dataset.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>3.3. Experimental results</title>
        <p>3.3.1. Anomaly detection
3.2.1. CNN-based autoencoder (CNN-AE)
We used TensorFlow to implement the architecture
consisting of two smaller sequential models, an encoder and
a decoder. Also, considering the speed of the model
convergence, our CNN-based autoencoder is comprised of
3 layers of Conv1D using the data of the households’
dishwashers. Furthermore, a nonlinear ReLu activation
function is used in each convolution layer. In this model,
a standard rate of 0.2 is considered for the dropout layer
to randomly remove 20% of the upper layer during
learning.</p>
        <p>Figure 1. shows the layers and the number of input and
output parameters of each. The input layer is 320 × 1
(3200 seconds), calculated according to the maximum
operation time of the device.
3.2.2. TCN-based autoencoder (TCN-AE)
The temporal convolutional network (TCN) combines
simplicity with auto-regressive prediction, residual
blocks, and a very long memory. In general, a TCN can
be broken down into three components: a list of dilation
rates  = {1, 2, ...,  }, the number of , and
the kernel size , which is the same for all filters in a TCN
[20][22]. Inspired by a classical (deep) autoencoder, the
TCN autoencoder encodes sequences, along the temporal
axis, of length  into a compressed representation of
length  / (where  ∈ Z+) and then tries to reconstruct
the original sequence[20]. √︂ ∑︀</p>
        <p>In Figure 2, each layer of the TCN-AE is described  = =1( − )2 (2)
by its parameters within the box. TCN-AE receives a 
sequence [] of length  and dimensionality  as its  ℎℎ = ̂︀ + 2 (3)
input. Using a TCN, the encoder first processes input
sequence [] of length  and dimension . Afterward, a where  is the standard deviation,  ℎℎ is the
one-dimensional convolutional layer with  = 1,  = 1, threshold, ̂︀ is the predicted value,  is the electricity
and  = 8 is used to reduce the dimensionality of consumption,  is the average electricity consumption,
the TCN’s output. As the last layer in the encoder, the and  is the number of samples.
temporal average pooling layer downsamples the series A normal electricity usage pattern detection for the
dishwasher is shown in Figure 3 (a), where the real-time
We compute a threshold value of 2 above the predicted
value to measure the trend in electricity consumption
over time, where 2 is the standard deviation on the
day before the actual moment [23]. An abnormal state is
defined as a value exceeding the threshold for predicted
electricity consumption at the actual moment. Equations
(2) and (3) show the calculation of  and  ℎℎ:</p>
        <p>Division Ratio</p>
        <p>Division Ratio
threshold curve follows the sequence trend, indicating tection techniques, abnormal behaviors can be mitigated.
the model depicts the dishwasher’s normal electricity us- This is possible, especially if user-centric explainable
age. As can be seen in the gfiure, the real power consump- recommender systems are combined with anomaly
detion curve does not exceed the threshold range, which tection modules. However, there is no proper labeled
indicates a normal level of electricity consumption. As dataset available to develop accurate algorithms or
deshown in Figure 3 (b), anomalous consumption patterns tect diferent types of anomalies. Accordingly, we plan to
occur when actual values exceed the threshold. Conse- run a laboratory to build the first appropriately labeled
quently, the method can distinguish between normal and energy anomaly dataset.
abnormal consumption behavior.
3.3.2. Evaluation</p>
        <sec id="sec-2-2-1">
          <title>As Table 1. and Table 2. show, for both architectures, the</title>
          <p>best performance is obtained with the data division ratio
of 8:2, and clearly, TCN-AE is more eficient than
CNNAE. Our unsupervised approach has also been evaluated
using the data from the Fridge_Freezer and the Freezer
of house No. 3 in REFIT. The results in Table 3. confirm
the best division ratio of 8:2 and the higher performance
of TCN compared to CNN1D.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Conclusion and future work</title>
      <p>This paper presents the starting point of our work on
studying how would applying deep learning algorithms,
and explainability improve energy eficiency,
environmental sustainability, and user adoption. In this regard,
ifrst, we preprocessed our data by resampling and
diferentiating each usage. Next, the extracted patterns of
dishwasher usage in houses No. 1 and 2 of the REFIT dataset
were analyzed. Two deep learning models, CNN-AE and
TCN-AE were then trained to detect abnormalities. While
the TCN backbone performed better, we evaluated our
models using the data from the refrigerators of house No.
3 in REFIT as well.</p>
      <p>Through the implementation of energy monitoring
systems and the formulation of intelligent anomaly
de</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <sec id="sec-4-1">
        <title>This research has been funded by the EU Horizon 2020 Marie Skłodowska-Curie International Training Network GECKO, Grant number 955422.</title>
        <p>Model</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pothitou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Kolios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Varga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <article-title>A framework for targeting household energy savings through habitual behavioural change</article-title>
          ,
          <source>International Journal of Sustainable Energy</source>
          <volume>35</volume>
          (
          <year>2016</year>
          )
          <fpage>686</fpage>
          -
          <lpage>700</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Marikyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Papagiannidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Alamanos</surname>
          </string-name>
          ,
          <article-title>A systematic review of the smart home literature: A user perspective</article-title>
          ,
          <source>Technological Forecasting and Social Change</source>
          <volume>138</volume>
          (
          <year>2019</year>
          )
          <fpage>139</fpage>
          -
          <lpage>154</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Hosseini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Agbossou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kelouwani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cardenas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Henao</surname>
          </string-name>
          ,
          <article-title>A practical approach to residential appliances on-line anomaly detection: A case study of standard and smart refrigerators</article-title>
          ,
          <source>IEEE Access 8</source>
          (
          <year>2020</year>
          )
          <fpage>57905</fpage>
          -
          <lpage>57922</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Schwartz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Denef</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Stevens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ramirez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Wulf</surname>
          </string-name>
          ,
          <article-title>Cultivating energy literacy: results from a longitudinal living lab study of a home energy management system</article-title>
          ,
          <source>in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>1193</fpage>
          -
          <lpage>1202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Himeur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ghanem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alsalemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bensaali</surname>
          </string-name>
          , [16]
          <string-name>
            <given-names>D.</given-names>
            <surname>Murray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Stankovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Stankovic</surname>
          </string-name>
          ,
          <article-title>An electriA</article-title>
          . Amira,
          <article-title>Artificial intelligence based anomaly cal load measurements dataset of United Kingdom detection of energy consumption in buildings: A re- households from a two-year longitudinal study, Sciview, current trends and new perspectives</article-title>
          ,
          <source>Applied entific data 4</source>
          (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . Energy 287 (
          <year>2021</year>
          )
          <fpage>116601</fpage>
          . [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Neumann</surname>
          </string-name>
          , A. K. Roy-
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Qian</surname>
          </string-name>
          , H. Wu, Chowdhury,
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <article-title>Learning temporal regX. Guan, Butler, not servant: A human-centric ularity in video sequences, in: Proceedings of the smart home energy management system</article-title>
          ,
          <source>IEEE IEEE conference on computer vision and pattern Communications Magazine</source>
          <volume>55</volume>
          (
          <year>2017</year>
          )
          <fpage>27</fpage>
          -
          <lpage>33</lpage>
          . recognition,
          <year>2016</year>
          , pp.
          <fpage>733</fpage>
          -
          <lpage>742</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. W.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kuang</surname>
          </string-name>
          , [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hawkins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Baxter</surname>
          </string-name>
          ,
          <string-name>
            <surname>Outlier X. Liu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Smart home energy management detection using replicator neural networks, in: Insystems: Concept, configurations, and scheduling ternational Conference on Data Warehousing and strategies</article-title>
          , Renewable and
          <string-name>
            <given-names>Sustainable</given-names>
            <surname>Energy Re- Knowledge Discovery</surname>
          </string-name>
          , Springer,
          <year>2002</year>
          , pp.
          <fpage>170</fpage>
          -
          <lpage>180</lpage>
          . views 61 (
          <year>2016</year>
          )
          <fpage>30</fpage>
          -
          <lpage>40</lpage>
          . [19]
          <string-name>
            <given-names>P.</given-names>
            <surname>Malhotra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ramakrishnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Anand</surname>
          </string-name>
          , L. Vig,
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Castangia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sappa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Girmay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Camarda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Shrof, LSTM-based encoderE</article-title>
          . Macii, E. Patti,
          <article-title>Detection of Anomalies in House- decoder for multi-sensor anomaly detection</article-title>
          ,
          <source>arXiv hold Appliances from Disaggregated Load Con- preprint arXiv:1607.00148</source>
          (
          <year>2016</year>
          ). sumption, in: 2021 International Conference on [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Thill</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Konen</surname>
          </string-name>
          , T. Bäck,
          <article-title>Time series encodings Smart Energy Systems and Technologies (SEST), with temporal convolutional networks</article-title>
          ,
          <source>in: InterIEEE</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . national Conference on Bioinspired Methods and
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alsalemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Himeur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bensaali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Amira</surname>
          </string-name>
          , Their Applications, Springer,
          <year>2020</year>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>173</lpage>
          .
          <article-title>Appliance-level monitoring with micro-moment</article-title>
          [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>Convolutional neural networks for sensmart plugs</article-title>
          , arXiv preprint arXiv:
          <year>2012</year>
          .
          <volume>05787</volume>
          (
          <year>2020</year>
          ). tence classification,
          <source>arXiv preprint arXiv:1408.5882</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>K. Das</surname>
          </string-name>
          ,
          <article-title>Detecting patterns of anomalies</article-title>
          ,
          <source>Carnegie</source>
          (
          <year>2014</year>
          ). Mellon University,
          <year>2009</year>
          . [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Z.</given-names>
            <surname>Kolter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Koltun</surname>
          </string-name>
          ,
          <article-title>An empirical evalua-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Pang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V. D.</given-names>
            <surname>Hengel</surname>
          </string-name>
          ,
          <article-title>Deep tion of generic convolutional and recurrent netlearning for anomaly detection: A review, ACM works for sequence modeling</article-title>
          ,
          <source>arXiv preprint Computing Surveys (CSUR) 54</source>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>38</lpage>
          . arXiv:
          <year>1803</year>
          .
          <volume>01271</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ullah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Khan</surname>
          </string-name>
          , L. Liu,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gao</surname>
          </string-name>
          , [23]
          <string-name>
            <given-names>H.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <surname>High-Dimensional EnK</surname>
          </string-name>
          . Sun,
          <article-title>Predictive maintenance of power substa- ergy Consumption Anomaly Detection: A Deep tion equipment by infrared thermography using Learning-Based Method for Detecting Anomalies, a machine-learning approach</article-title>
          ,
          <source>Energies</source>
          <volume>10</volume>
          (
          <year>2017</year>
          )
          <article-title>Energies 15 (</article-title>
          <year>2022</year>
          )
          <fpage>6139</fpage>
          .
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Chandola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , Anomaly Detection:
          <string-name>
            <given-names>A</given-names>
            <surname>Survey. ACM Computing</surname>
          </string-name>
          <article-title>Surveys</article-title>
          , vol
          <volume>41</volume>
          (
          <year>2009</year>
          )
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>X.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jermaine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ranka</surname>
          </string-name>
          ,
          <article-title>Conditional anomaly detection</article-title>
          ,
          <source>IEEE Transactions on knowledge and Data Engineering</source>
          <volume>19</volume>
          (
          <year>2007</year>
          )
          <fpage>631</fpage>
          -
          <lpage>645</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Himeur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alsalemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bensaali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Amira</surname>
          </string-name>
          ,
          <article-title>Building power consumption datasets: Survey, taxonomy and future directions, Energy and Buildings (</article-title>
          <year>2020</year>
          )
          <fpage>110404</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>