Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations

Open in new window