Quantifying Information Leakage via Adversarial Loss Functions: Theory and Practice