Evaluating Black-Box Vulnerabilities with Wasserstein-Constrained Data Perturbations | ScienceToStartup | ScienceToStartup