Second Rethinking of Network Pruning in the Adversarial Setting