Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability