Case Study 05: Adversarial Attacks and Model Exploitation