The LogBarrier adversarial attack: making effective use of decision boundary information