Beyond Passive Aggregation: Active Auditing and Topology-Aware Defense in Decentralized Federated Learning
arXiv:2603.18538v1 Announce Type: new Abstract: Decentralized Federated Learning (DFL) remains highly vulnerable to adaptive backdoor attacks designed to bypass traditional passive defense metrics. To address this limitation, we shift the defensive paradigm toward a novel active, interventional auditing framework. First,...
Birthright citizenship: why the text, history, and structure of a landmark 1952 statute doom Trump’s executive order
Brothers in Law is a recurring series by brothers Akhil and Vikram Amar, with special emphasis on measuring what the Supreme Court says against what the Constitution itself says. For more content from […]The postBirthright citizenship: why the text, history,...
Justices to consider rules pardoning omissions by bankrupt debtors
Next week’s argument in Keathley v. Buddy Ayers Construction involves a technical question about bankruptcy procedure – the standards for overlooking the failure of a debtor in bankruptcy to mention […]The postJustices to consider rules pardoning omissions by bankrupt debtorsappeared...
Justices to consider the rights of asylum seekers at the U.S.-Mexico border
The Supreme Court will hear oral arguments next week in a challenge to the government’s policy of systematically turning back asylum seekers before they can reach the U.S. border with […]The postJustices to consider the rights of asylum seekers at...
Uninjured class members, hindsight harmlessness, presidential cronies, and the mistaken use of deadly force
The Relist Watch column examines cert petitions that the Supreme Court has “relisted” for its upcoming conference. A short explanation of relists is available here. There are 261 petitions and applications […]The postUninjured class members, hindsight harmlessness, presidential cronies, and...
SCOTUStoday for Thursday, March 19
Chief Justice Earl Warren was born on this day in 1891. Before Warren joined the court, he served as governor of California for a decade.The postSCOTUStoday for Thursday, March 19appeared first onSCOTUSblog.
FBI started buying Americans' location data again, Kash Patel confirms
Tom Cotton supports FBI data purchasing, compares it to searching people's trash.
DoorDash launches a new ‘Tasks’ app that pays couriers to submit videos to train AI
Delivery couriers will be able to earn money by completing activities like filming everyday tasks or recording themselves speaking in another language.
Amazon brings Alexa+ to the UK
The company is currently letting users in the U.K. try out Alexa+ for free via an early access program.
Volume 2026, No. 1 – Wisconsin Law Review – UW–Madison
Contract Law and Civil Justice in Local Courts by Cathy Hwang & Justin Weinstein-Tull; Preempting Drug Price Reform by Shweta Kumar; Lessons Learned? COVID’s Continued Impact on Remote Work Disability Accommodations by D’Andra Millsap Shu; Unbundling AI Openness by Parth...
Applying History as Law: The Role of Historical Facts in Implementing Constitutional Doctrine
Introduction The relevance of historical facts to constitutional law has never been greater or more contested in our legal system. In an increasingly wide range of cases involving everything from abortion[1] and gun rights[2] to trademark law[3] and agency funding,[4]...
The State of Charity Care in the United States: Holding Nonprofit Hospitals Accountable for Their Tax Exemptions
Introduction A health system in the Midwest withholds medical care from patients who have $4,500 or more of unpaid debt.[1] A busy university hospital in Manhattan has emergency room nurses redirecting homeless patients to a public hospital that primarily serves...
Whatever Did Happen to the Antitrust Movement?
ARTICLE Whatever Did Happen to the Antitrust Movement? Herbert Hovenkamp* Antitrust in the United States today is caught between its pursuit of technical rules designed to define and implement defensible economic goals, and increasingly political calls for a new antitrust...
Who Authorizes the Authorizers: The Problem with Professor Markovits’s Jurisprudence
Introduction I strongly believe that the Constitution is basically indefensible with regard to what have become widely accepted twenty-first century criteria for identifying a political system as ‘democratic.’ —Sanford Levinson[1] Do the cords of antiquity bind us to a constitution—and...
Catching Pokémon, Not Tax Bills
Introduction What if we told you that you could play a unique and magical game for free? What if we told you this game would let you chase fantastical creatures across your neighborhood, turning your daily stroll into an epic...
The Singular Role of Public Pension Funds in Corporate Governance
Introduction U.S. public pension funds manage more than $6 trillion in assets.[1] The law, policy, and public debates about how they should manage this money are based on a theoretical model that is descriptively inaccurate and yields policy proposals that...
A foundation model for electrodermal activity data
arXiv:2603.16878v1 Announce Type: new Abstract: Foundation models have recently extended beyond natural language and vision to timeseries domains, including physiological signals. However, progress in electrodermal activity (EDA) modeling is hindered by the absence of large-scale, curated, and openly accessible datasets....
Federated Multi Agent Deep Learning and Neural Networks for Advanced Distributed Sensing in Wireless Networks
arXiv:2603.16881v1 Announce Type: new Abstract: Multi-agent deep learning (MADL), including multi-agent deep reinforcement learning (MADRL), distributed/federated training, and graph-structured neural networks, is becoming a unifying framework for decision-making and inference in wireless systems where sensing, communication, and computing are tightly...
Multi-Agent Reinforcement Learning for Dynamic Pricing: Balancing Profitability,Stability and Fairness
arXiv:2603.16888v1 Announce Type: new Abstract: Dynamic pricing in competitive retail markets requires strategies that adapt to fluctuating demand and competitor behavior. In this work, we present a systematic empirical evaluation of multi-agent reinforcement learning (MARL) approaches-specifically MAPPO and MADDPG-for dynamic...
MHPO: Modulated Hazard-aware Policy Optimization for Stable Reinforcement Learning
arXiv:2603.16929v1 Announce Type: new Abstract: Regulating the importance ratio is critical for the training stability of Group Relative Policy Optimization (GRPO) based frameworks. However, prevailing ratio control methods, such as hard clipping, suffer from non-differentiable boundaries and vanishing gradient regions,...
Integrating Explainable Machine Learning and Mixed-Integer Optimization for Personalized Sleep Quality Intervention
arXiv:2603.16937v1 Announce Type: new Abstract: Sleep quality is influenced by a complex interplay of behavioral, environmental, and psychosocial factors, yet most computational studies focus mainly on predictive risk identification rather than actionable intervention design. Although machine learning models can accurately...
Minimum-Action Learning: Energy-Constrained Symbolic Model Selection for Physical Law Identification from Noisy Data
arXiv:2603.16951v1 Announce Type: new Abstract: Identifying physical laws from noisy observational data is a central challenge in scientific machine learning. We present Minimum-Action Learning (MAL), a framework that selects symbolic force laws from a pre-specified basis library by minimizing a...
Formal verification of tree-based machine learning models for lateral spreading
arXiv:2603.16983v1 Announce Type: new Abstract: Machine learning models for geotechnical hazard prediction can achieve high accuracy while learning physically inconsistent relationships from sparse or biased training data. Current remedies (post-hoc explainability, such as SHAP and LIME, and training-time constraints) either...
Transformers Can Learn Rules They've Never Seen: Proof of Computation Beyond Interpolation
arXiv:2603.17019v1 Announce Type: new Abstract: A central question in the LLM debate is whether transformers can infer rules absent from training, or whether apparent generalisation reduces to similarity-based interpolation over observed examples. We test a strong interpolation-only hypothesis in two...
Do Understanding and Generation Fight? A Diagnostic Study of DPO for Unified Multimodal Models
arXiv:2603.17044v1 Announce Type: new Abstract: Unified multimodal models share a language model backbone for both understanding and generating images. Can DPO align both capabilities simultaneously? We present the first systematic study of this question, applying DPO to Janus-Pro at 1B...
Early Quantization Shrinks Codebook: A Simple Fix for Diversity-Preserving Tokenization
arXiv:2603.17052v1 Announce Type: new Abstract: Vector quantization is a technique in machine learning that discretizes continuous representations into a set of discrete vectors. It is widely employed in tokenizing data representations for large language models, diffusion models, and other generative...
PRISM: Demystifying Retention and Interaction in Mid-Training
arXiv:2603.17074v1 Announce Type: new Abstract: We present PRISM, a comprehensive empirical study of mid-training design choices for large language models. Through controlled experiments across seven base models spanning four families (Granite, LLaMA, Mistral, Nemotron-H), two architecture types (dense Transformer and...
CircuitBuilder: From Polynomials to Circuits via Reinforcement Learning
arXiv:2603.17075v1 Announce Type: new Abstract: Motivated by auto-proof generation and Valiant's VP vs. VNP conjecture, we study the problem of discovering efficient arithmetic circuits to compute polynomials, using addition and multiplication gates. We formulate this problem as a single-player game,...
Topology-Preserving Deep Joint Source-Channel Coding for Semantic Communication
arXiv:2603.17126v1 Announce Type: new Abstract: Many wireless vision applications, such as autonomous driving, require preservation of global structural information rather than only per-pixel fidelity. However, existing Deep joint source-channel coding (DeepJSCC) schemes mainly optimize pixel-wise losses and provide no explicit...