A Brief Background of Adversarial Attacks