<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Time Series Anomaly Detection in Smart Homes: A Deep Learning Approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Somayeh</forename><surname>Zamani</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Siegen</orgName>
								<address>
									<settlement>Siegen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hamed</forename><surname>Talebi</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Amirkabir University of Technology</orgName>
								<address>
									<settlement>Tehran</settlement>
									<country key="IR">Iran</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gunnar</forename><surname>Stevens</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Siegen</orgName>
								<address>
									<settlement>Siegen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Time Series Anomaly Detection in Smart Homes: A Deep Learning Approach</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4C69B8F634F94DEA350DC1FEA26E311A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-04-29T06:29+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Time series</term>
					<term>Anomaly detection</term>
					<term>Deep learning</term>
					<term>Autoencoder</term>
					<term>Temporal convolutional networks</term>
					<term>Smart home</term>
					<term>Sustainability</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Fixing energy leakage caused by different anomalies can result in significant energy savings and extended appliance life. Further, it assists grid operators in scheduling their resources to meet the actual needs of end users, while helping end users reduce their energy costs. In this paper, we analyze the patterns pertaining to the power consumption of dishwashers used in two houses of the REFIT dataset. Then two autoencoder (AE) architectures with 1D-CNN and TCN as backbones are trained to differentiate the normal patterns from the abnormal ones. Our results indicate that TCN outperforms CNN1D in detecting anomalies in energy consumption. Finally, the data from the Fridge_Freezer and the Freezer of house No. 3 in REFIT is also used to evaluate our approach.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Throughout recent years, the energy demand has significantly gone up due to urban and industrial development alongside an increase in population <ref type="bibr" target="#b0">[1]</ref>. Therefore, climate change, global warming, and volatility in energy prices have fuelled the interest in smart systems <ref type="bibr" target="#b1">[2]</ref>. In this regard, the huge potential increase of replacing traditional home appliances with new in-operation powerconsuming ones by 2040 has caused the residential sector to account for roughly 60% over 2017-25 and 70% over 2025-40 of electricity demand increase of buildings. As such, household appliances need to be operating efficiently and used appropriately to achieve energy-saving goals <ref type="bibr" target="#b2">[3]</ref>.</p><p>To this end, utilizing AI-based technologies and smart homes as novel interventions to recognize abnormal power utilization and understand the reasons for each abnormality could pave the way for end-consumers both to renovate wasteful devices and adopt a more sustainable energy consumption behavior <ref type="bibr" target="#b3">[4]</ref> <ref type="bibr" target="#b4">[5]</ref>[6] <ref type="bibr" target="#b6">[7]</ref>. Moreover, it facilitates the prediction of end-users power demand as well as performing an optimal energy distribution by grid operators depending on specific end-users' needs. In addition, electrical anomalies are less likely to remain unnoticed for a long period of time which would result in somayeh.zamani@uni-siegen.de (S. Zamani); hamed.talebi.aut@gmail.com (H. Talebi); gunnar.stevens@uni-siegen.de (G. Stevens) ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) higher power consumption or damage in the most critical cases <ref type="bibr" target="#b7">[8]</ref>.</p><p>Thus, for optimization purposes in smart homes, via implementing load monitoring systems and formulating smart anomaly detection models using machine learning techniques, the abnormality can be mitigated <ref type="bibr" target="#b8">[9]</ref>. To do so, it is essential to analyze the energy consumption of households in order to identify consumption patterns and extract valuable information from smart homes <ref type="bibr" target="#b7">[8]</ref> <ref type="bibr" target="#b9">[10]</ref>.</p><p>In this paper, the power consumption patterns of dishwashers used in houses No. 1 and 2 of the REFIT dataset are analyzed as examples of devices that are used based on the needs of users. Then, the data for each usage of the device is divided into different signals to properly train autoencoders with different backbones, including 1-dimensional CNN and TCN, to detect abnormal usage. For this purpose, any predicted value that is greater than twice the standard deviation of the electricity consumption the day before is considered abnormal.</p><p>The rest of the paper is organized as follows. We provide related work on anomaly detection in energy consumption in Section 2. In Section 3, our methodology is presented in details. Section 4 concludes the paper and discusses future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related work</head><p>In the context of energy usage, anomalies are defined as deviations from expected behavior that occur when the consumption of a household appliance does not correspond with its normal pattern <ref type="bibr">[3][11]</ref>. Among the key applications of anomaly detection by load monitoring, are forecasting maintenance and energy efficiency <ref type="bibr" target="#b11">[12]</ref>. Thus, a smart plug, smart appliance, and other appliance- level monitoring devices are needed to continuously monitor the power consumption of individual appliances in a house <ref type="bibr" target="#b7">[8]</ref>. However, identifying anomalies, and their nature of them should also be considered, which can be categorized, based on different dimensions. In the data science world, anomalies are seen as either single points that are not necessarily relevant to each other or a set of data points that constitute a pattern and, therefore, can be interpreted in relation to each other. The other dimension of anomaly detection that should be taken into account is the context which refers to a deviation in a particular context relating to the structure of the data <ref type="bibr" target="#b2">[3]</ref>[13] <ref type="bibr" target="#b13">[14]</ref>. For example, in the context of a warm season, a temperature report of -30 degrees Celsius can be anomalous; however, during a cold season, such a report may be more common <ref type="bibr" target="#b2">[3]</ref>. To this end, understanding the available data will provide a solid foundation for improving energy efficiency. For this purpose, there are thirty-one publicly available databases with several features, such as the geographical location, period of collection, number of monitored households, the sampling rate of collected data, and number of sub-metered appliances <ref type="bibr" target="#b14">[15]</ref>. Regarding this, a valuable dataset is REFIT which includes cleaned electrical consumption in Watts for 20 households in the UK at both the aggregate and appliance levels <ref type="bibr" target="#b15">[16]</ref>. On the other hand, Pang <ref type="bibr" target="#b10">[11]</ref> has provided a comprehensive overview of current anomaly detection methods to gain an important understanding of their inherent capabilities and limitations in addressing some largely unsolved challenges in anomaly detection. According to his study, Autoencoders, which are a subset of the generic normality feature learning category, aim to learn some low-dimensional feature representation space on which the given data instances can be well reconstructed. While this is a widely used method for data compression or dimension reduction, by using this method, the feature representations are enforced to learn important regularities of the data so that reconstruction errors are minimized. Consequently, anomalies are difficult to reconstruct from the resulting representations and are, therefore, subject to large reconstruction errors <ref type="bibr" target="#b16">[17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Methodology</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Dataset and preprocessing</head><p>The REFIT Electrical Load Measurements dataset contain cleaned electrical consumption data in Watts for 20 households in the UK at both the aggregate and appliance level. The data is related to a period of two years comprising nine individual appliance measurements at 8-second intervals per house with 1,194,958,790 readings <ref type="bibr" target="#b15">[16]</ref>. The models proposed in this paper are trained using dishwasher data from houses No. 1 and 2. Furthermore, data from the Fridge_Freezer and the Freezer of house No. 3 is used to assess the effectiveness of our approach.</p><p>To begin with, it is necessary to resample the data to convert it into equal time intervals r. Then using the following formula, the average sampling time, 𝑡 of the REFIT data is used to fill in a limited number of signals, n with no data. The remaining empty intervals are substituted with zero.</p><formula xml:id="formula_0">𝑛 = [︂ 4 * 𝑡 𝑟 ]︂<label>(1)</label></formula><p>Additionally, for devices used according to users' needs, consumption data must first be differentiated. The power consumption pattern may include turning the device on and off several times per usage. The matching data is therefore combined into relevant signals. Also, due to the possibility of failure in some devices that can result in constant operation for an extended period, we assume a maximum period for a device to operate. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">The proposed models</head><p>The development of time series anomaly detection algorithms has recently received considerable attention.</p><p>Autoencoder-based approaches are often used to identify anomalous behavior by analyzing the reconstruction error of the data <ref type="bibr" target="#b17">[18]</ref>[19] <ref type="bibr" target="#b19">[20]</ref>. Having learned a nonlinear transformation of the input data into a compressed representation, latent variables are used to reconstruct the original input. On the other hand, utilizing the convolution mechanism in sequential models is computationally optimal <ref type="bibr" target="#b20">[21]</ref>. Also, due to CNNs' equivariance properties and sparse interactions, they are translated from computer vision into the time domain using temporal convolutional networks (TCN) <ref type="bibr" target="#b19">[20]</ref>.</p><p>In the following sections, we will describe how we used autoencoders (AEs) for time series data that utilize 1-dimensional CNNs and TCNs as building blocks to detect energy anomalies in the REFIT dataset.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.1.">CNN-based autoencoder (CNN-AE)</head><p>We used TensorFlow to implement the architecture consisting of two smaller sequential models, an encoder and a decoder. Also, considering the speed of the model convergence, our CNN-based autoencoder is comprised of 3 layers of Conv1D using the data of the households' dishwashers. Furthermore, a nonlinear ReLu activation function is used in each convolution layer. In this model, a standard rate of 0.2 is considered for the dropout layer to randomly remove 20% of the upper layer during learning.</p><p>Figure <ref type="figure" target="#fig_1">1</ref>. shows the layers and the number of input and output parameters of each. The input layer is 320 × 1 (3200 seconds), calculated according to the maximum operation time of the device.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2.">TCN-based autoencoder (TCN-AE)</head><p>The temporal convolutional network (TCN) combines simplicity with auto-regressive prediction, residual blocks, and a very long memory. In general, a TCN can be broken down into three components: a list of dilation rates 𝐷 = {𝑞1, 𝑞2, ..., 𝑞𝑛 𝑟 }, the number of 𝑛 𝑓 𝑖𝑙𝑡𝑒𝑟𝑠 , and the kernel size 𝑘, which is the same for all filters in a TCN <ref type="bibr" target="#b19">[20]</ref> <ref type="bibr" target="#b21">[22]</ref>. Inspired by a classical (deep) autoencoder, the TCN autoencoder encodes sequences, along the temporal axis, of length 𝑇 into a compressed representation of length 𝑇 /𝑠 (where 𝑠 ∈ Z + ) and then tries to reconstruct the original sequence <ref type="bibr" target="#b19">[20]</ref>.</p><p>In Figure <ref type="figure" target="#fig_2">2</ref>, each layer of the TCN-AE is described by its parameters within the box. TCN-AE receives a sequence 𝑥[𝑛] of length 𝑇 and dimensionality 𝑑 as its input. Using a TCN, the encoder first processes input sequence 𝑥[𝑛] of length 𝑇 and dimension 𝑑. Afterward, a one-dimensional convolutional layer with 𝑞 = 1, 𝑘 = 1, and 𝑛 𝑓 𝑖𝑙𝑡𝑒𝑟𝑠 = 8 is used to reduce the dimensionality of the TCN's output. As the last layer in the encoder, the temporal average pooling layer downsamples the series by a factor of 𝑠. To do so, groups of size 𝑠 are averaged along the time axis.</p><p>In the decoder module, the downsampled sequence is returned to its original length by performing a nearest neighbor interpolation on the upsampled sequence. Upsampled sequences are passed through a second TCN with independent weights parameterized similarly to the encoder-TCN. As a final step, the input sequence is reconstructed with a Conv1D layer that ensures that the dimensionality of the input is matched (by setting 𝑘 = 1 and 𝑛 𝑓 𝑖𝑙𝑡𝑒𝑟𝑠 = 𝑑) <ref type="bibr" target="#b19">[20]</ref>. As described in the next section, the input sequence and its reconstruction will be used for detecting anomalies after TCN-AE has been trained. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Experimental results</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.1.">Anomaly detection</head><p>We compute a threshold value of 2𝜎 above the predicted value to measure the trend in electricity consumption over time, where 2𝜎 is the standard deviation on the day before the actual moment <ref type="bibr" target="#b22">[23]</ref>. An abnormal state is defined as a value exceeding the threshold for predicted electricity consumption at the actual moment. Equations ( <ref type="formula" target="#formula_1">2</ref>) and (3) show the calculation of 𝜎 and 𝛾 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 :</p><formula xml:id="formula_1">𝜎 = √︂ ∑︀ 𝑛 𝑖=1 (𝑥𝑖 − 𝑥) 2 𝑛 (<label>2</label></formula><formula xml:id="formula_2">)</formula><formula xml:id="formula_3">𝛾 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = ̂︀ 𝛾 + 2𝜎<label>(3)</label></formula><p>where 𝜎 is the standard deviation, 𝛾 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 is the threshold, ̂︀ 𝛾 is the predicted value, 𝑥𝑖 is the electricity consumption, 𝑥 is the average electricity consumption, and 𝑛 is the number of samples.</p><p>A normal electricity usage pattern detection for the dishwasher is shown in Figure <ref type="figure" target="#fig_3">3</ref> (a), where the real-time  <ref type="figure" target="#fig_3">3</ref> (b), anomalous consumption patterns occur when actual values exceed the threshold. Consequently, the method can distinguish between normal and abnormal consumption behavior.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.2.">Evaluation</head><p>As Table <ref type="table" target="#tab_0">1</ref>. and Table <ref type="table">2</ref>. show, for both architectures, the best performance is obtained with the data division ratio of 8:2, and clearly, TCN-AE is more efficient than CNN-AE. Our unsupervised approach has also been evaluated using the data from the Fridge_Freezer and the Freezer of house No. 3 in REFIT. The results in Table <ref type="table" target="#tab_1">3</ref>. confirm the best division ratio of 8:2 and the higher performance of TCN compared to CNN1D.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion and future work</head><p>This paper presents the starting point of our work on studying how would applying deep learning algorithms, and explainability improve energy efficiency, environmental sustainability, and user adoption. In this regard, first, we preprocessed our data by resampling and differentiating each usage. Next, the extracted patterns of dishwasher usage in houses No. 1 and 2 of the REFIT dataset were analyzed. Two deep learning models, CNN-AE and TCN-AE were then trained to detect abnormalities. While the TCN backbone performed better, we evaluated our models using the data from the refrigerators of house No. 3 in REFIT as well.</p><p>Through the implementation of energy monitoring systems and the formulation of intelligent anomaly de-tection techniques, abnormal behaviors can be mitigated. This is possible, especially if user-centric explainable recommender systems are combined with anomaly detection modules. However, there is no proper labeled dataset available to develop accurate algorithms or detect different types of anomalies. Accordingly, we plan to run a laboratory to build the first appropriately labeled energy anomaly dataset. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>AMLTS' 22 :</head><label>22</label><figDesc>Workshop on Applied Machine Learning Methods for Time Series Forecasting, co-located with the 31st ACM International Conference on Information and Knowledge Management (CIKM), October 17-21, 2022, Atlanta, USA * Corresponding author.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The architecture of the CNN-based autoencoder (CNN-AE)</figDesc><graphic coords="2,89.29,84.19,203.36,148.59" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The architecture of the TCN-based autoencoder (TCN-AE)</figDesc><graphic coords="2,302.62,503.52,203.36,84.67" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: (a) Examples of the normal energy consumption of the dishwasher (b) Examples of the abnormal energy consumption of the dishwasher</figDesc><graphic coords="3,302.62,236.74,203.37,152.61" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Evaluation of CNN1D-AE performance with a different data division ratio</figDesc><table><row><cell>Model</cell><cell>Division Ratio</cell><cell>MAE</cell><cell>MAPE</cell></row><row><cell>CNN1D-AE</cell><cell>9:1</cell><cell>0.1781</cell><cell>%22.55</cell></row><row><cell>CNN1D-AE</cell><cell>8:2</cell><cell cols="2">0.1570 %20.07</cell></row><row><cell>CNN1D-AE</cell><cell>7:3</cell><cell>0.1702</cell><cell>%21.99</cell></row><row><cell>Table 2</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Evaluation of TCN-AE performance with a different data division ratio</cell><cell></cell></row><row><cell>Model</cell><cell>Division Ratio</cell><cell>MAE</cell><cell>MAPE</cell></row><row><cell>TCN-AE</cell><cell>9:1</cell><cell>0.1527</cell><cell>%21.39</cell></row><row><cell>TCN-AE</cell><cell>8:2</cell><cell cols="2">0.1371 %17.52</cell></row><row><cell>TCN-AE</cell><cell>7:3</cell><cell>0.1412</cell><cell>%19.88</cell></row><row><cell cols="2">threshold curve follows the sequence trend, indicating</cell><cell></cell><cell></cell></row><row><cell cols="2">the model depicts the dishwasher's normal electricity us-</cell><cell></cell><cell></cell></row><row><cell cols="2">age. As can be seen in the figure, the real power consump-</cell><cell></cell><cell></cell></row><row><cell cols="2">tion curve does not exceed the threshold range, which</cell><cell></cell><cell></cell></row><row><cell cols="2">indicates a normal level of electricity consumption. As</cell><cell></cell><cell></cell></row><row><cell>shown in Figure</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 3</head><label>3</label><figDesc>Evaluation of the model's performance using the Fridge_Freezer and the Freezer data of house #3</figDesc><table><row><cell>Model</cell><cell>Division Ratio</cell><cell>MAE</cell><cell>MAPE</cell></row><row><cell>CNN1D-AE</cell><cell>9:1</cell><cell>0.1678</cell><cell>%21.15</cell></row><row><cell>CNN1D-AE</cell><cell>8:2</cell><cell cols="2">0.1486 %19.17</cell></row><row><cell>CNN1D-AE</cell><cell>7:3</cell><cell>0.1649</cell><cell>%20.29</cell></row><row><cell>TCN-AE</cell><cell>9:1</cell><cell>0.1422</cell><cell>%18.21</cell></row><row><cell>TCN-AE</cell><cell>8:2</cell><cell cols="2">0.1264 %16.33</cell></row><row><cell>TCN-AE</cell><cell>7:3</cell><cell>0.1353</cell><cell>%17.70</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This research has been funded by the EU Horizon 2020 Marie Skłodowska-Curie International Training Network GECKO, Grant number 955422.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A framework for targeting household energy savings through habitual behavioural change</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pothitou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Kolios</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Varga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Sustainable Energy</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="686" to="700" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A systematic review of the smart home literature: A user perspective</title>
		<author>
			<persName><forename type="first">D</forename><surname>Marikyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Papagiannidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Alamanos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technological Forecasting and Social Change</title>
		<imprint>
			<biblScope unit="volume">138</biblScope>
			<biblScope unit="page" from="139" to="154" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A practical approach to residential appliances on-line anomaly detection: A case study of standard and smart refrigerators</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Hosseini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Agbossou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kelouwani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cardenas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Henao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="57905" to="57922" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cultivating energy literacy: results from a longitudinal living lab study of a home energy management system</title>
		<author>
			<persName><forename type="first">T</forename><surname>Schwartz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Denef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Stevens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ramirez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Wulf</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</title>
				<meeting>the SIGCHI Conference on Human Factors in Computing Systems</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1193" to="1202" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Himeur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ghanem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alsalemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bensaali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Amira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Energy</title>
		<imprint>
			<biblScope unit="volume">287</biblScope>
			<biblScope unit="page">116601</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">not servant: A human-centric smart home energy management system</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ji</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Qian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Guan</surname></persName>
		</author>
		<author>
			<persName><surname>Butler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Magazine</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="27" to="33" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Smart home energy management systems: Concept, configurations, and scheduling strategies</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">W</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kuang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Renewable and Sustainable Energy Reviews</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page" from="30" to="40" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Detection of Anomalies in Household Appliances from Disaggregated Load Consumption</title>
		<author>
			<persName><forename type="first">M</forename><surname>Castangia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sappa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Girmay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Camarda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Macii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Patti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2021 International Conference on Smart Energy Systems and Technologies (SEST), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Alsalemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Himeur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bensaali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Amira</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2012.05787</idno>
		<title level="m">Appliance-level monitoring with micro-moment smart plugs</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Detecting patterns of anomalies</title>
		<author>
			<persName><forename type="first">K</forename><surname>Das</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>Carnegie Mellon University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Deep learning for anomaly detection: A review</title>
		<author>
			<persName><forename type="first">G</forename><surname>Pang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V D</forename><surname>Hengel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys (CSUR)</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="page" from="1" to="38" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Predictive maintenance of power substation equipment by infrared thermography using a machine-learning approach</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Energies</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">1987</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Anomaly Detection: A Survey</title>
		<author>
			<persName><forename type="first">V</forename><surname>Chandola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Banerjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="page">15</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Conditional anomaly detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Jermaine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ranka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="631" to="645" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<author>
			<persName><forename type="first">Y</forename><surname>Himeur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alsalemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bensaali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Amira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Building power consumption datasets: Survey, taxonomy and future directions</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page">110404</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">An electrical load measurements dataset of United Kingdom households from a two-year longitudinal study</title>
		<author>
			<persName><forename type="first">D</forename><surname>Murray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Stankovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Stankovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific data</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Learning temporal regularity in video sequences</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Neumann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Roy-Chowdhury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">S</forename><surname>Davis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE conference on computer vision and pattern recognition</title>
				<meeting>the IEEE conference on computer vision and pattern recognition</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="733" to="742" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Outlier detection using replicator neural networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hawkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Baxter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ternational Conference on Data Warehousing and Knowledge Discovery</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="170" to="180" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Malhotra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ramakrishnan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Anand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Vig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Shroff</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1607.00148</idno>
		<title level="m">LSTM-based encoderdecoder for multi-sensor anomaly detection</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Time series encodings with temporal convolutional networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Thill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Konen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Bäck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Bioinspired Methods and Their Applications</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="161" to="173" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Kim</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1408.5882</idno>
		<title level="m">Convolutional neural networks for sentence classification</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Bai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Z</forename><surname>Kolter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Koltun</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1803.01271</idno>
		<title level="m">An empirical evaluation of generic convolutional and recurrent networks for sequence modeling</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">High-Dimensional Energy Consumption Anomaly Detection: A Deep Learning-Based Method for Detecting Anomalies</title>
		<author>
			<persName><forename type="first">H</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Yin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Jiang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Energies</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">6139</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
