Reverse Engineering Of Adversarial Samples By Leveraging Patterns Left By The Attacker