Distributed Optimization Methods Robust To Byzantine Attackers