Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations