{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:00:20Z","timestamp":1725742820557},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396922"},{"type":"electronic","value":"9783642396939"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39693-9_6","type":"book-chapter","created":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T01:42:27Z","timestamp":1375062147000},"page":"47-61","source":"Crossref","is-referenced-by-count":12,"title":["Identifying Peer Influence in Online Social Networks Using Transfer Entropy"],"prefix":"10.1007","author":[{"given":"Saike","family":"He","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Kainan","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-23808-6_2","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"D.M. Romero","year":"2011","unstructured":"Romero, D.M., Galuba, W., Asur, S., Huberman, B.A.: Influence and passivity in social media. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) ECML PKDD 2011, Part III. LNCS, vol.\u00a06913, pp. 18\u201333. Springer, Heidelberg (2011)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-69304-8_39","volume-title":"Intelligence and Security Informatics","author":"X. Zheng","year":"2008","unstructured":"Zheng, X., Li, H., Sun, A.: Exploring social dynamics in online bookmarking systems. In: Yang, C.C., et al. (eds.) ISI Workshops 2008. LNCS, vol.\u00a05075, pp. 390\u2013391. Springer, Heidelberg (2008)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Granovetter, M.: Threshold models of collective behavior. American Journal of Sociology, 1420\u20131443 (1978)","DOI":"10.1086\/226707"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D.J. Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature\u00a0393, 440\u2013442 (1998)","journal-title":"Nature"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Gruhl, D., Guha, R., Liben-Nowell, D., Tomkins, A.: Information diffusion through blogspace. In: Proceedings of the 13th International Conference on World Wide Web, pp. 491\u2013501. ACM (2004)","DOI":"10.1145\/988672.988739"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1232722.1232727","volume":"1","author":"J. Leskovec","year":"2007","unstructured":"Leskovec, J., Adamic, L.A., Huberman, B.A.: The dynamics of viral marketing. ACM Transactions on the Web (TWEB)\u00a01, 5 (2007)","journal-title":"ACM Transactions on the Web (TWEB)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.socnet.2005.01.007","volume":"27","author":"L. Adamic","year":"2005","unstructured":"Adamic, L., Adar, E.: How to search a social network. Social Networks\u00a027, 187\u2013203 (2005)","journal-title":"Social Networks"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Glass, K., Colbaugh, R.: Web analytics for security informatics. In: 2011 European Intelligence and Security Informatics Conference (EISIC), pp. 214\u2013219. IEEE (2011)","DOI":"10.1109\/EISIC.2011.66"},{"key":"6_CR10","unstructured":"Ghosh, R., Lerman, K.: Predicting influential users in online social networks. arXiv preprint arXiv:1005.4882 (2010)"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"21544","DOI":"10.1073\/pnas.0908800106","volume":"106","author":"S. Aral","year":"2009","unstructured":"Aral, S., Muchnik, L., Sundararajan, A.: Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences\u00a0106, 21544\u201321549 (2009)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1086\/320819","volume":"106","author":"C. Bulte Van den","year":"2001","unstructured":"Van den Bulte, C., Lilien, G.L.: Medical Innovation Revisited: Social Contagion versus Marketing Effort1. American Journal of Sociology\u00a0106, 1409\u20131435 (2001)","journal-title":"American Journal of Sociology"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1287\/mksc.1040.0071","volume":"23","author":"D. Godes","year":"2004","unstructured":"Godes, D., Mayzlin, D.: Using online conversations to study word-of-mouth communication. Marketing Science\u00a023, 545\u2013560 (2004)","journal-title":"Marketing Science"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Bemmaor, A.C.: Modeling the diffusion of new durable goods: Word-of-mouth effect versus consumer heterogeneity. In: Research Traditions in Marketing, pp. 201\u2013229. Springer (1994)","DOI":"10.1007\/978-94-011-1402-8_6"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"531","DOI":"10.2307\/2298123","volume":"60","author":"C.F. Manski","year":"1993","unstructured":"Manski, C.F.: Identification of endogenous social effects: The reflection problem. The Review of Economic Studies\u00a060, 531\u2013542 (1993)","journal-title":"The Review of Economic Studies"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: The million follower fallacy. In: 4th International AAAI Conference on Weblogs and Social Media (ICWSM), vol.\u00a014, p. 8 (2010)","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Wu, S., Hofman, J.M., Mason, W.A., Watts, D.J.: Who says what to whom on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 705\u2013714. ACM (2011)","DOI":"10.1145\/1963405.1963504"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone\u2019s an influencer: quantifying influence on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, pp. 65\u201374. ACM (2011)","DOI":"10.1145\/1935826.1935845"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591\u2013600. ACM (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"6_CR20","unstructured":"Bailey, N.T.: The mathematical theory of infectious diseases and its applications. Charles Griffin & Company Ltd, 5a Crendon Street, High Wycombe, Bucks HP13 6LE (1975)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Anderson, R.M., May, R.M., Anderson, B.: Infectious diseases of humans: dynamics and control. Wiley Online Library (1992)","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Granger, C.W.: Investigating causal relations by econometric models and cross-spectral methods. Econometrica: Journal of the Econometric Society, 424\u2013438 (1969)","DOI":"10.2307\/1912791"},{"key":"6_CR23","unstructured":"Saito, Y., Harashima, H.: Tracking of Information within Multichannel {EEG} record Causal analysis in {EEG}. In: Yamaguchi, N., Fujisawa, K. (eds.) Recent Advances in {EEG} and {EMG} Data Processing, pp. 133\u2013146. Elsevier (1981)"},{"key":"6_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/ecja.4400670602","volume":"67","author":"T. Kamitake","year":"1984","unstructured":"Kamitake, T., Harashima, H., Miyakawa, H.: A time-series analysis method based on the directed transformation. Electronics and Communications in Japan\u00a067, 1\u20139 (1984)","journal-title":"Electronics and Communications in Japan"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.physleta.2004.02.077","volume":"324","author":"D.P. Varn","year":"2004","unstructured":"Varn, D.P., Crutchfield, J.P.: From finite to infinite range order via annealing: The causal architecture of deformation faulting in annealed close-packed crystals. Physics Letters A\u00a0324, 299\u2013307 (2004)","journal-title":"Physics Letters A"},{"key":"6_CR26","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1007\/11553090_75","volume-title":"Advances in Artificial Life","author":"A.S. Klyubin","year":"2005","unstructured":"Klyubin, A.S., Polani, D., Nehaniv, C.L.: All else being equal be empowered. In: Capcarr\u00e8re, M.S., Freitas, A.A., Bentley, P.J., Johnson, C.G., Timmis, J. (eds.) ECAL 2005. LNCS (LNAI), vol.\u00a03630, pp. 744\u2013753. Springer, Heidelberg (2005)"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Lungarella, M., Sporns, O.: Mapping information flow in sensorimotor networks. PLoS Computational Biology 2, e144 (2006)","DOI":"10.1371\/journal.pcbi.0020144"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Ver Steeg, G., Galstyan, A.: Information transfer in social media. In: Proceedings of the 21st International Conference on World Wide Web, pp. 509\u2013518. ACM (2012)","DOI":"10.1145\/2187836.2187906"},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"238701","DOI":"10.1103\/PhysRevLett.103.238701","volume":"103","author":"L. Barnett","year":"2009","unstructured":"Barnett, L., Barrett, A.B., Seth, A.K.: Granger causality and transfer entropy are equivalent for Gaussian variables. Physical Review Letters\u00a0103, 238701 (2009)","journal-title":"Physical Review Letters"},{"key":"6_CR30","unstructured":"Pillai, S.U.: Probability, Random Variables, and Stochastic Processes. Tata McGraw-Hill Education (2002)"},{"key":"6_CR31","doi-asserted-by":"crossref","first-page":"046211","DOI":"10.1103\/PhysRevE.63.046211","volume":"63","author":"M. Palu\u0161","year":"2001","unstructured":"Palu\u0161, M., Kom\u00e1rek, V., Hrn\u010d\u00ed\u0159, Z., \u0160t\u011brbov\u00e1, K.: Synchronization as adjustment of information rates: detection from bivariate time series. Physical Review E 63, 046211 (2001)","journal-title":"Physical Review E"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2006.12.004","volume":"441","author":"K. Hlav\u00e1\u010dkov\u00e1-Schindler","year":"2007","unstructured":"Hlav\u00e1\u010dkov\u00e1-Schindler, K., Palu\u0161, M., Vejmelka, M., Bhattacharya, J.: Causality detection based on information-theoretic approaches in time series analysis. Physics Reports\u00a0441, 1\u201346 (2007)","journal-title":"Physics Reports"},{"key":"6_CR33","unstructured":"Zheng, X., Zhong, Y., Zeng, D., Wang, F.-Y.: Social influence and spread dynamics in social networks. Frontiers of Computer Science 6(5), 611\u2013620"},{"key":"6_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29047-3_16","volume-title":"Social Computing, Behavioral - Cultural Modeling and Prediction","author":"K. Ohara","year":"2012","unstructured":"Ohara, K., Saito, K., Kimura, M., Motoda, H.: Effect of in\/out-degree correlation on influence degree of two contrasting information diffusion models. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds.) SBP 2012. LNCS, vol.\u00a07227, pp. 131\u2013138. Springer, Heidelberg (2012)"},{"key":"6_CR35","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web (1999)"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Jeh, G., Widom, J.: Scaling personalized web search. In: Proceedings of the 12th International Conference on World Wide Web, pp. 271\u2013279. ACM (2003)","DOI":"10.1145\/775189.775191"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Wu, B., Davison, B.D.: Identifying link farm spam pages. Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, pp. 820\u2013829 (2005)","DOI":"10.1145\/1062745.1062762"},{"key":"6_CR38","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H.: Link spam alliances. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 517\u2013528. VLDB Endowment (2005)"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbors: Web spam detection using the web topology. In: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 423\u2013430. ACM (2007)","DOI":"10.1145\/1277741.1277814"},{"key":"6_CR40","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1287\/mnsc.15.5.215","volume":"15","author":"F.M. Bass","year":"1969","unstructured":"Bass, F.M.: A New Product Growth for Model Consumer Durables. Management Science\u00a015, 215\u2013227 (1969)","journal-title":"Management Science"},{"key":"6_CR41","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1103\/PhysRevLett.85.461","volume":"85","author":"T. Schreiber","year":"2000","unstructured":"Schreiber, T.: Measuring information transfer. Physical Review Letters\u00a085, 461\u2013464 (2000)","journal-title":"Physical Review Letters"},{"key":"6_CR42","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1016\/S1053-8119(03)00202-7","volume":"19","author":"K.J. Friston","year":"2003","unstructured":"Friston, K.J., Harrison, L., Penny, W.: Dynamic causal modelling. Neuroimage\u00a019, 1273\u20131302 (2003)","journal-title":"Neuroimage"},{"key":"6_CR43","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10827-010-0262-3","volume":"30","author":"R. Vicente","year":"2011","unstructured":"Vicente, R., Wibral, M., Lindner, M., Pipa, G.: Transfer entropy\u2014a model-free measure of effective connectivity for the neurosciences. Journal of Computational Neuroscience\u00a030, 45\u201367 (2011)","journal-title":"Journal of Computational Neuroscience"},{"key":"6_CR44","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1038\/nature03459","volume":"435","author":"A.-L. Barabasi","year":"2005","unstructured":"Barabasi, A.-L.: The origin of bursts and heavy tails in human dynamics. Nature\u00a0435, 207\u2013211 (2005)","journal-title":"Nature"},{"key":"6_CR45","doi-asserted-by":"crossref","first-page":"066138","DOI":"10.1103\/PhysRevE.69.066138","volume":"69","author":"A. Kraskov","year":"2004","unstructured":"Kraskov, A., St\u00f6gbauer, H., Grassberger, P.: Estimating mutual information. Physical Review E 69, 066138 (2004)","journal-title":"Physical Review E"},{"key":"6_CR46","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1162\/biot.2006.1.3.302","volume":"1","author":"J.D. Victor","year":"2006","unstructured":"Victor, J.D.: Approaches to information-theoretic analysis of neural activity. Biological Theory\u00a01, 302\u2013316 (2006)","journal-title":"Biological Theory"},{"key":"6_CR47","unstructured":"Hildebrand, F.B.: Introduction to numerical analysis. Dover Publications (1987)"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Hopcroft, J., Lou, T., Tang, J.: Who will follow you back?: reciprocal relationship prediction. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1137\u20131146. ACM (2011)","DOI":"10.1145\/2063576.2063740"},{"key":"6_CR49","unstructured":"Leavitt, A., Burchard, E., Fisher, D., Gilbert, S.: The influentials: New approaches for analyzing influence on twitter. Web Ecology Project 29 (2009), http:\/\/tinyurl.com\/lzjlzq"},{"key":"6_CR50","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1086\/266687","volume":"21","author":"E. Katz","year":"1957","unstructured":"Katz, E.: The two-step flow of communication: An up-to-date report on an hypothesis. Public Opinion Quarterly\u00a021, 61\u201378 (1957)","journal-title":"Public Opinion Quarterly"},{"key":"6_CR51","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/BF00240425","volume":"2","author":"T.W. Valente","year":"1996","unstructured":"Valente, T.W.: Network models of the diffusion of innovations. Computational & Mathematical Organization Theory\u00a02, 163\u2013164 (1996)","journal-title":"Computational & Mathematical Organization Theory"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39693-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T14:29:41Z","timestamp":1715783381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39693-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396922","9783642396939"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39693-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}