Generating Adversarial Attacks in the Latent Space