“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”