Transferable Adversarial Attacks on SAM and Its Downstream Models | Read Paper on Bytez