On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systemsстатья