“…Highlights of differences to previous work on poisoning attacks. After presenting the details of the threat model above, we emphasize again the differences between this work and a long line of existing work studying poisoning attacks and defenses [10], [38], [12], [11], [68], [44], [9], [35], [70], [39], [61]. For example, the latest results from Liu et al [39] demonstrate effective defense strategies against training data poisoning when a large portion of poisoning samples are injected.…”