The vulnerability of deep networks to adversarial examples