Element 'methods for countering data poisoning'