Keeping up with dynamic attackers: Certifying robustness to adaptive online data poisoning

Open in new window