“…Since then, an increasing number of studies [60], [61], [62], [63], [58], [64], [65], [66], [21], [67], [68], and [44], [69] have been dedicated to the subject, significantly increasing the class of available attacks and the application scenarios potentially targeted by backdooring attempts. The proposed attacks differ on the basis of the event triggering the backdoor at test time, malicious behavior induced by the activation of the backdoor, stealthiness of the procedure used to inject the backdoor, modality through which the attacker interferes with the training process, and knowledge that the attacker has about the attacked network.…”