Provable, Structured, and Efficient Methods for Robustness of Deep Networks to Adversarial Examples