Architectural Backdoors for Within-Batch Data Stealing and Model Inference Manipulation