Stealth Data Poisoning: Impact and Mitigation