Adversarial Examples In Constrained Domains