Information Security Meets Adversarial Examples