Attacking the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples

Open in new window