Demonstration of Adversarial Examples for Hardware Trojan Detection