@inbook{48862,
  abstract     = {{Most runtime analyses of randomised search heuristics focus on the expected number of function evaluations to find a unique global optimum. We ask a fundamental question: if additional search points are declared optimal, or declared as desirable target points, do these additional optima speed up evolutionary algorithms? More formally, we analyse the expected hitting time of a target set OPT {$\cup$} S where S is a set of non-optimal search points and OPT is the set of optima and compare it to the expected hitting time of OPT. We show that the answer to our question depends on the number and placement of search points in S. For all black-box algorithms and all fitness functions we show that, if additional optima are placed randomly, even an exponential number of optima has a negligible effect on the expected optimisation time. Considering Hamming balls around all global optima gives an easier target for some algorithms and functions and can shift the phase transition with respect to offspring population sizes in the (1,{$\lambda$}) EA on One-Max. Finally, on functions where search trajectories typically join in a single search point, turning one search point into an optimum drastically reduces the expected optimisation time.}},
  author       = {{Bossek, Jakob and Sudholt, Dirk}},
  booktitle    = {{Proceedings of the 16th ACM/SIGEVO Conference on Foundations of Genetic Algorithms}},
  isbn         = {{978-1-4503-8352-3}},
  keywords     = {{evolutionary algorithms, pseudo-boolean functions, runtime analysis, theory}},
  pages        = {{1–11}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{Do Additional Optima Speed up Evolutionary Algorithms?}}},
  year         = {{2021}},
}

@inbook{48881,
  abstract     = {{Classic automated algorithm selection (AS) for (combinatorial) optimization problems heavily relies on so-called instance features, i.e., numerical characteristics of the problem at hand ideally extracted with computationally low-demanding routines. For the traveling salesperson problem (TSP) a plethora of features have been suggested. Most of these features are, if at all, only normalized imprecisely raising the issue of feature values being strongly affected by the instance size. Such artifacts may have detrimental effects on algorithm selection models. We propose a normalization for two feature groups which stood out in multiple AS studies on the TSP: (a) features based on a minimum spanning tree (MST) and (b) a k-nearest neighbor graph (NNG) transformation of the input instance. To this end we theoretically derive minimum and maximum values for properties of MSTs and k-NNGs of Euclidean graphs. We analyze the differences in feature space between normalized versions of these features and their unnormalized counterparts. Our empirical investigations on various TSP benchmark sets point out that the feature scaling succeeds in eliminating the effect of the instance size. Eventually, a proof-of-concept AS-study shows promising results: models trained with normalized features tend to outperform those trained with the respective vanilla features.}},
  author       = {{Heins, Jonathan and Bossek, Jakob and Pohl, Janina and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}},
  booktitle    = {{Proceedings of the 16th ACM/SIGEVO Conference on Foundations of Genetic Algorithms}},
  isbn         = {{978-1-4503-8352-3}},
  keywords     = {{automated algorithm selection, graph theory, instance features, normalization, traveling salesperson problem (TSP)}},
  pages        = {{1–15}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{On the Potential of Normalized TSP Features for Automated Algorithm Selection}}},
  year         = {{2021}},
}

@inproceedings{48876,
  abstract     = {{In recent years, Evolutionary Algorithms (EAs) have frequently been adopted to evolve instances for optimization problems that pose difficulties for one algorithm while being rather easy for a competitor and vice versa. Typically, this is achieved by either minimizing or maximizing the performance difference or ratio which serves as the fitness function. Repeating this process is useful to gain insights into strengths/weaknesses of certain algorithms or to build a set of instances with strong performance differences as a foundation for automatic per-instance algorithm selection or configuration. We contribute to this branch of research by proposing fitness-functions to evolve instances that show large performance differences for more than just two algorithms simultaneously. As a proof-of-principle, we evolve instances of the multi-component Traveling Thief Problem (TTP) for three incomplete TTP-solvers. Our results point out that our strategies are promising, but unsurprisingly their success strongly relies on the algorithms’ performance complementarity.}},
  author       = {{Bossek, Jakob and Wagner, Markus}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference Companion}},
  isbn         = {{978-1-4503-8351-6}},
  keywords     = {{evolutionary algorithms, evolving instances, fitness function, instance hardness, traveling thief problem (TTP)}},
  pages        = {{1423–1432}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{Generating Instances with Performance Differences for More than Just Two Algorithms}}},
  doi          = {{10.1145/3449726.3463165}},
  year         = {{2021}},
}

@inproceedings{48893,
  abstract     = {{Computing diverse sets of high-quality solutions has gained increasing attention among the evolutionary computation community in recent years. It allows practitioners to choose from a set of high-quality alternatives. In this paper, we employ a population diversity measure, called the high-order entropy measure, in an evolutionary algorithm to compute a diverse set of high-quality solutions for the Traveling Salesperson Problem. In contrast to previous studies, our approach allows diversifying segments of tours containing several edges based on the entropy measure. We examine the resulting evolutionary diversity optimisation approach precisely in terms of the final set of solutions and theoretical properties. Experimental results show significant improvements compared to a recently proposed edge-based diversity optimisation approach when working with a large population of solutions or long segments.}},
  author       = {{Nikfarjam, Adel and Bossek, Jakob and Neumann, Aneta and Neumann, Frank}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference}},
  isbn         = {{978-1-4503-8350-9}},
  keywords     = {{evolutionary algorithms, evolutionary diversity optimisation, high-order entropy, traveling salesperson problem}},
  pages        = {{600–608}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{Entropy-Based Evolutionary Diversity Optimisation for the Traveling Salesperson Problem}}},
  doi          = {{10.1145/3449639.3459384}},
  year         = {{2021}},
}

@inproceedings{48891,
  abstract     = {{Submodular functions allow to model many real-world optimisation problems. This paper introduces approaches for computing diverse sets of high quality solutions for submodular optimisation problems with uniform and knapsack constraints. We first present diversifying greedy sampling approaches and analyse them with respect to the diversity measured by entropy and the approximation quality of the obtained solutions. Afterwards, we introduce an evolutionary diversity optimisation (EDO) approach to further improve diversity of the set of solutions. We carry out experimental investigations on popular submodular benchmark problems and analyse trade-offs in terms of solution quality and diversity of the resulting solution sets.}},
  author       = {{Neumann, Aneta and Bossek, Jakob and Neumann, Frank}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference}},
  isbn         = {{978-1-4503-8350-9}},
  keywords     = {{evolutionary algorithms, evolutionary diversity optimisation, sub-modular functions}},
  pages        = {{261–269}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{Diversifying Greedy Sampling and Evolutionary Diversity Optimisation for Constrained Monotone Submodular Functions}}},
  doi          = {{10.1145/3449639.3459385}},
  year         = {{2021}},
}

@inbook{48892,
  abstract     = {{Evolutionary algorithms based on edge assembly crossover (EAX) constitute some of the best performing incomplete solvers for the well-known traveling salesperson problem (TSP). Often, it is desirable to compute not just a single solution for a given problem, but a diverse set of high quality solutions from which a decision maker can choose one for implementation. Currently, there are only a few approaches for computing a diverse solution set for the TSP. Furthermore, almost all of them assume that the optimal solution is known. In this paper, we introduce evolutionary diversity optimisation (EDO) approaches for the TSP that find a diverse set of tours when the optimal tour is known or unknown. We show how to adopt EAX to not only find a high-quality solution but also to maximise the diversity of the population. The resulting EAX-based EDO approach, termed EAX-EDO is capable of obtaining diverse high-quality tours when the optimal solution for the TSP is known or unknown. A comparison to existing approaches shows that they are clearly outperformed by EAX-EDO.}},
  author       = {{Nikfarjam, Adel and Bossek, Jakob and Neumann, Aneta and Neumann, Frank}},
  booktitle    = {{Proceedings of the 16th ACM}/SIGEVO Conference on Foundations of Genetic Algorithms}},
  isbn         = {{978-1-4503-8352-3}},
  keywords     = {{edge assembly crossover (EAX), evolutionary algorithms, evolutionary diversity optimisation (EDO), traveling salesperson problem (TSP)}},
  pages        = {{1–11}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{Computing Diverse Sets of High Quality TSP Tours by EAX-based Evolutionary Diversity Optimisation}}},
  year         = {{2021}},
}

@article{48854,
  abstract     = {{We contribute to the theoretical understanding of randomized search heuristics for dynamic problems. We consider the classical vertex coloring problem on graphs and investigate the dynamic setting where edges are added to the current graph. We then analyze the expected time for randomized search heuristics to recompute high quality solutions. The (1+1) Evolutionary Algorithm and RLS operate in a setting where the number of colors is bounded and we are minimizing the number of conflicts. Iterated local search algorithms use an unbounded color palette and aim to use the smallest colors and, consequently, the smallest number of colors. We identify classes of bipartite graphs where reoptimization is as hard as or even harder than optimization from scratch, i.e., starting with a random initialization. Even adding a single edge can lead to hard symmetry problems. However, graph classes that are hard for one algorithm turn out to be easy for others. In most cases our bounds show that reoptimization is faster than optimizing from scratch. We further show that tailoring mutation operators to parts of the graph where changes have occurred can significantly reduce the expected reoptimization time. In most settings the expected reoptimization time for such tailored algorithms is linear in the number of added edges. However, tailored algorithms cannot prevent exponential times in settings where the original algorithm is inefficient.}},
  author       = {{Bossek, Jakob and Neumann, Frank and Peng, Pan and Sudholt, Dirk}},
  issn         = {{0178-4617}},
  journal      = {{Algorithmica}},
  keywords     = {{Dynamic optimization, Evolutionary algorithms, Running time analysis}},
  number       = {{10}},
  pages        = {{3148–3179}},
  title        = {{{Time Complexity Analysis of Randomized Search Heuristics for the Dynamic Graph Coloring Problem}}},
  doi          = {{10.1007/s00453-021-00838-3}},
  volume       = {{83}},
  year         = {{2021}},
}

@inproceedings{46315,
  abstract     = {{We propose a novel method for automated algorithm selection in the domain of single-objective continuous black-box optimization. In contrast to existing methods, we use convolutional neural networks as the selection apparatus which bases its decision on a so-called ‘fitness map’. This fitness map is a 2D representation of a two dimensional search space where different gray scales indicate the quality of found solutions in certain areas. Our devised approach uses a modular CMA-ES framework which offers the option to create the conventional CMA-ES, CMA-ES with the alternate step-size adaptation and many other variants proposed over the years. In total, 4 608 different configurations are possible where most configurations are of complementary nature. In this proof-of-concept work, we consider a subset of 32 possible configurations. The developed method is evaluated against an excerpt of BBOB functions and its performance is compared against baselines that are commonly used in automated algorithm selection - the best standalone algorithm (configuration) and the best obtainable sequence of configurations. While the results indicate that the use of the fitness map is not superior on every benchmark problem, it indubitably shows its merit on more hard-to-solve problems. This offers a promising perspective for generalizing to other types of optimization problems and problem domains.}},
  author       = {{Prager, Raphael Patrick and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}},
  booktitle    = {{2021 IEEE Symposium Series on Computational Intelligence (SSCI)}},
  pages        = {{1--8}},
  title        = {{{Towards Feature-Free Automated Algorithm Selection for Single-Objective Continuous Black-Box Optimization}}},
  doi          = {{10.1109/SSCI50451.2021.9660174}},
  year         = {{2021}},
}

@inproceedings{46312,
  abstract     = {{Abuse and hate are penetrating social media and many comment sections of news media companies. These platform providers invest considerable efforts to mod- erate user-generated contributions to prevent losing readers who get appalled by inappropriate texts. This is further enforced by legislative actions, which make non-clearance of these comments a punishable action. While (semi-)automated solutions using Natural Language Processing and advanced Machine Learning techniques are getting increasingly sophisticated, the domain of abusive language detection still struggles as large non-English and well-curated datasets are scarce or not publicly available. With this work, we publish and analyse the largest annotated German abusive language comment datasets to date. In contrast to existing datasets, we achieve a high labelling standard by conducting a thorough crowd-based an- notation study that complements professional moderators’ decisions, which are also included in the dataset. We compare and cross-evaluate the performance of baseline algorithms and state-of-the-art transformer-based language models, which are fine-tuned on our datasets and an existing alternative, showing the usefulness for the community.}},
  author       = {{Assenmacher, Dennis and Niemann, Marco and Müller, Kilian and Seiler, Moritz and Riehle, Dennis M. and Trautmann, Heike}},
  booktitle    = {{Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1 (NeurIPS Datasets and Benchmarks 2021)}},
  pages        = {{1–14}},
  title        = {{{RP-Mod & RP-Crowd: Moderator- and Crowd-Annotated German News Comment Datasets}}},
  year         = {{2021}},
}

@inproceedings{46313,
  abstract     = {{Classic automated algorithm selection (AS) for (combinatorial) optimization problems heavily relies on so-called instance features, i.e., numerical characteristics of the problem at hand ideally extracted with computationally low-demanding routines. For the traveling salesperson problem (TSP) a plethora of features have been suggested. Most of these features are, if at all, only normalized imprecisely raising the issue of feature values being strongly affected by the instance size. Such artifacts may have detrimental effects on algorithm selection models. We propose a normalization for two feature groups which stood out in multiple AS studies on the TSP: (a) features based on a minimum spanning tree (MST) and (b) a k-nearest neighbor graph (NNG) transformation of the input instance. To this end we theoretically derive minimum and maximum values for properties of MSTs and k-NNGs of Euclidean graphs. We analyze the differences in feature space between normalized versions of these features and their unnormalized counterparts. Our empirical investigations on various TSP benchmark sets point out that the feature scaling succeeds in eliminating the effect of the instance size. Eventually, a proof-of-concept AS-study shows promising results: models trained with normalized features tend to outperform those trained with the respective vanilla features.}},
  author       = {{Heins, Jonathan and Bossek, Jakob and Pohl, Janina and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}},
  booktitle    = {{Proceedings of the 16$^th$ ACM/SIGEVO Conference on Foundations of genetic Algorithms (FOGA XVI)}},
  editor       = {{Computing Machinery Association, for}},
  pages        = {{1–15}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{On the Potential of Normalized TSP Features for Automated Algorithm Selection}}},
  doi          = {{10.1145/3450218.3477308}},
  year         = {{2021}},
}

@inproceedings{46319,
  abstract     = {{The detection of orchestrated and potentially manipulative campaigns in social media is far more meaningful than an- alyzing single account behaviour but also more challenging in terms of pattern recognition, data processing, and com- putational complexity. While supervised learning methods need an enormous amount of reliable ground truth data to find rather inflexible patterns, classical unsupervised learn- ing techniques need a lot of computational power to handle large amount of data. This makes them infeasible for real- time analysis. In this work, we demonstrate the applicability of text stream clustering for the real-time detection of coordi- nated campaigns.}},
  author       = {{Assenmacher, D and Adam, L and Trautmann, Heike and Grimme, C}},
  booktitle    = {{Proceedings of the Florida Artificial Intelligence Research Society Conference}},
  title        = {{{Towards Real-Time and Unsupervised Campaign Detection in Social Media}}},
  year         = {{2020}},
}

@inproceedings{46328,
  abstract     = {{In this paper, we rely on previous work proposing a modularized version of CMA-ES, which captures several alterations to the conventional CMA-ES developed in recent years. Each alteration provides significant advantages under certain problem properties, e.g., multi-modality, high conditioning. These distinct advancements are implemented as modules which result in 4608 unique versions of CMA-ES. Previous findings illustrate the competitive advantage of enabling and disabling the aforementioned modules for different optimization problems. Yet, this modular CMA-ES is lacking a method to automatically determine when the activation of specific modules is auspicious and when it is not. We propose a well-performing instance-specific algorithm configuration model which selects an (almost) optimal configuration of modules for a given problem instance. In addition, the structure of this configuration model is able to capture inter-dependencies between modules, e.g., two (or more) modules might only be advantageous in unison for some problem types, making the orchestration of modules a crucial task. This is accomplished by chaining multiple random forest classifiers together into a so-called Classifier Chain based on a set of numerical features extracted by means of Exploratory Landscape Analysis (ELA) to describe the given problem instances.}},
  author       = {{Prager, Raphael Patrick and Trautmann, Heike and Wang, Hao and Bäck, Thomas H. W. and Kerschke, Pascal}},
  booktitle    = {{Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI)}},
  pages        = {{996–1003}},
  title        = {{{Per-Instance Configuration of the Modularized CMA-ES by Means of Classifier Chains and Exploratory Landscape Analysis}}},
  doi          = {{10.1109/SSCI47803.2020.9308510}},
  year         = {{2020}},
}

@inproceedings{46320,
  abstract     = {{The identification of coordinated campaigns within Social Media is a complex task that is often hindered by missing labels and large amounts of data that have to be processed. We propose a new two-phase framework that uses unsupervised stream clustering for detecting suspicious trends over time in a first step. Afterwards, traditional offline analyses are applied to distinguish between normal trend evolution and malicious manipulation attempts. We demonstrate the applicability of our framework in the context of the final days of the Brexit in 2019/2020.}},
  author       = {{Assenmacher, D and Clever, L and Pohl, JS and Trautmann, Heike and Grimme, C}},
  booktitle    = {{Proceedings of the International Conference on Human-Computer Interaction (HCII 2020): Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis}},
  editor       = {{Meiselwitz, G}},
  isbn         = {{978-3-030-49570-1}},
  pages        = {{201–214}},
  publisher    = {{Springer International Publishing}},
  title        = {{{A Two-Phase Framework for Detecting Manipulation Campaigns in Social Media}}},
  doi          = {{10.1007/978-3-030-49570-1_14}},
  year         = {{2020}},
}

@inproceedings{46325,
  abstract     = {{Clustering is an important technique in data analysis which can reveal hidden patterns and unknown relationships in the data. A common problem in clustering is the proper choice of parameter settings. To tackle this, automated algorithm configuration is available which can automatically find the best parameter settings. In practice, however, many of our today’s data sources are data streams due to the widespread deployment of sensors, the internet-of-things or (social) media. Stream clustering aims to tackle this challenge by identifying, tracking and updating clusters over time. Unfortunately, none of the existing approaches for automated algorithm configuration are directly applicable to the streaming scenario. In this paper, we explore the possibility of automated algorithm configuration for stream clustering algorithms using an ensemble of different configurations. In first experiments, we demonstrate that our approach is able to automatically find superior configurations and refine them over time.}},
  author       = {{Carnein, Matthias and Trautmann, Heike and Bifet, Albert and Pfahringer, Bernhard}},
  booktitle    = {{Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD ’19)}},
  isbn         = {{978-3-030-43823-4}},
  pages        = {{137–143}},
  title        = {{{Towards Automated Configuration of Stream Clustering Algorithms}}},
  doi          = {{10.1007/978-3-030-43823-4_12}},
  year         = {{2020}},
}

@inproceedings{46321,
  abstract     = {{Social bots have recently gained attention in the context of public opinion manipulation on social media platforms. While a lot of research effort has been put into the classification and detection of such automated programs, it is still unclear how technically sophisticated those bots are, which platforms they target, and where they originate from. To answer these questions, we gathered repository data from open source collaboration platforms to identify the status-quo of social bot development as well as first insights into the overall skills of publicly available bot code.}},
  author       = {{Assenmacher, Dennis and Frischlich , Lena and Trautmann, Heike and Grimme, Christian and Adam, Lena}},
  booktitle    = {{Disinformation in open online media}},
  editor       = {{Grimme, Christian and Preuß, Mike and Takes, Frank and Waldherr, Annie}},
  pages        = {{101–114}},
  publisher    = {{Springer}},
  title        = {{{Inside the tool set of automation: Free social bot code revisited}}},
  year         = {{2020}},
}

@inproceedings{46326,
  abstract     = {{Machine learning has become one of the most important tools in data analysis. However, selecting the most appropriate machine learning algorithm and tuning its hyperparameters to their optimal values remains a difficult task. This is even more difficult for streaming applications where automated approaches are often not available to help during algorithm selection and configuration. This paper proposes the first approach for automated algorithm selection and configuration of stream clustering algorithms. We train an ensemble of different stream clustering algorithms and configurations in parallel and use the best performing configuration to obtain a clustering solution. By drawing new configurations from better performing ones, we are able to improve the ensemble performance over time. In large experiments on real and artificial data we show how our ensemble approach can improve upon default configurations and can also compete with a-posteriori algorithm configuration. Our approach is considerably faster than a-posteriori approaches and applicable in real-time. In addition, it is not limited to stream clustering and can be generalised to all streaming applications, including stream classification and regression.}},
  author       = {{Carnein, Matthias and Trautmann, Heike and Bifet, Albert and Pfahringer, Bernhard}},
  booktitle    = {{Proceedings of the 14$^th$ Learning and Intelligent Optimization Conference (LION 2020)}},
  pages        = {{80–95}},
  title        = {{{confStream: Automated Algorithm Selection and Configuration of Stream Clustering Algorithms}}},
  doi          = {{10.1007/978-3-030-53552-0_10}},
  year         = {{2020}},
}

@inproceedings{46327,
  abstract     = {{In online media environments, nostalgia can be used as important ingredient of propaganda strategies, specifically, by creating societal pessimism. This work addresses the automated detection of nostalgic text as a first step towards automatically identifying nostalgia-based manipulation strategies. We compare the performance of standard machine learning approaches on this challenge and demonstrate the successful transfer of the best performing approach to real-world nostalgia detection in a case study.}},
  author       = {{Lena, Clever and Frischlich, Lena and Trautmann, Heike and Grimme, Christian}},
  booktitle    = {{Disinformation in open online media}},
  editor       = {{Grimme, Christian and Preuß, Mike and Takes, Frank and Waldherr, Annie}},
  pages        = {{48–58}},
  title        = {{{Automated detection of nostalgic text in the context of societal pessimism}}},
  year         = {{2020}},
}

@inproceedings{46329,
  abstract     = {{The past decade has been characterized by a strong increase in the use of social media and a continuous growth of public online discussion. With the failure of purely manual moderation, platform operators started searching for semi-automated solutions, where the application of Natural Language Processing (NLP) and Machine Learning (ML) techniques is promising. However, this requires huge financial investments for algorithmic implementations, data collection, and model training, which only big players can afford. To support smaller or medium-sized media enterprises (SME), we developed an integrated comment moderation system as an IT platform. This platform acts as a service provider and offers Analytics as a Service (AaaS) to SMEs. Operating such a platform, however, requires a robust technology stack, integrated workflows and well-defined interfaces between all parties. In this paper, we develop and discuss a suitable IT architecture and present a prototypical implementation.}},
  author       = {{Riehle, Dennis M. and Niemann, Marco and Brunk, Jens and Assenmacher, Dennis and Trautmann, Heike and Becker, Jörg}},
  booktitle    = {{Social Computing and Social Media. Participation, User Experience, Consumer Experience, and Applications of Social Computing}},
  editor       = {{Meiselwitz, Gabriele}},
  isbn         = {{978-3-030-49576-3}},
  pages        = {{71–86}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Building an Integrated Comment Moderation System – Towards a Semi-automatic Moderation Tool}}},
  year         = {{2020}},
}

@article{46333,
  abstract     = {{ Recently, social bots, (semi-) automatized accounts in social media, gained global attention in the context of public opinion manipulation. Dystopian scenarios like the malicious amplification of topics, the spreading of disinformation, and the manipulation of elections through “opinion machines” created headlines around the globe. As a consequence, much research effort has been put into the classification and detection of social bots. Yet, it is still unclear how easy an average online media user can purchase social bots, which platforms they target, where they originate from, and how sophisticated these bots are. This work provides a much needed new perspective on these questions. By providing insights into the markets of social bots in the clearnet and darknet as well as an exhaustive analysis of freely available software tools for automation during the last decade, we shed light on the availability and capabilities of automated profiles in social media platforms. Our results confirm the increasing importance of social bot technology but also uncover an as yet unknown discrepancy of theoretical and practically achieved artificial intelligence in social bots: while literature reports on a high degree of intelligence for chat bots and assumes the same for social bots, the observed degree of intelligence in social bot implementations is limited. In fact, the overwhelming majority of available services and software are of supportive nature and merely provide modules of automation instead of fully fledged “intelligent” social bots. }},
  author       = {{Assenmacher, Dennis and Clever, Lena and Frischlich, Lena and Quandt, Thorsten and Trautmann, Heike and Grimme, Christian}},
  journal      = {{Social Media + Society}},
  number       = {{3}},
  pages        = {{2056305120939264}},
  title        = {{{Demystifying Social Bots: On the Intelligence of Automated Social Media Actors}}},
  doi          = {{10.1177/2056305120939264}},
  volume       = {{6}},
  year         = {{2020}},
}

@inproceedings{46332,
  abstract     = {{Multimodality is one of the biggest difficulties for optimization as local optima are often preventing algorithms from making progress. This does not only challenge local strategies that can get stuck. It also hinders meta-heuristics like evolutionary algorithms in convergence to the global optimum. In this paper we present a new concept of gradient descent, which is able to escape local traps. It relies on multiobjectivization of the original problem and applies the recently proposed and here slightly modified multi-objective local search mechanism MOGSA. We use a sophisticated visualization technique for multi-objective problems to prove the working principle of our idea. As such, this work highlights the transfer of new insights from the multi-objective to the single-objective domain and provides first visual evidence that multiobjectivization can link single-objective local optima in multimodal landscapes.}},
  author       = {{Steinhoff, Vera and Kerschke, Pascal and Aspar, Pelin and Trautmann, Heike and Grimme, Christian}},
  booktitle    = {{Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI)}},
  pages        = {{2445–2452}},
  title        = {{{Multiobjectivization of Local Search: Single-Objective Optimization Benefits From Multi-Objective Gradient Descent}}},
  doi          = {{10.1109/SSCI47803.2020.9308259}},
  year         = {{2020}},
}

