ABOUT DATA POISONING TECHNIQUES USED BY ATTACKERS IN NEURAL NETWORK TRAINING | Publicación