Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data