Training Data Leakage via Imperceptible Backdoor Attack | IEEE Conference Publication | IEEE Xplore