I believe this would suppress the effect your work anticipates, do you agree?
As far as the impact: You must consider the attacker's success distribution and not just its expectation; the network the network is less likely to get unlucky is also less likely to get lucky, increasing the low probability success rate even if the expectation is down. Attacker utility is not a linear function; that an attacker would lose money on average but potentially win big with low chances isn't a great comfort.
You must also consider the hashrate lost to forking-- otherwise your same argument would apply generally and conclude security goes up as variance goes down as a rule; which can be easily demonstrated to be untrue (in theory, and -- thanks to some rather inadvisable constructed altcoins like "liquidcoin", in practice).
Consider an extreme hypothetical where there are few txn but they pay fees far more than the expected electrical power for the whole network to find a block. The hashate goes from 0 to 100% the moment a transaction appears; and so a block would probably be found near instantly, lets assume instantly. What would then happen is that all the honest miners would end up on separate forks-- effectively diluting their hashpower. An attacker conspiracy is now no longer in competition with the whole network, but just the strongest fork (which if all honest miners are equal in power and the block find was actually instant, he'd be in competition with just a single miner until the fork resolves!). (In this extreme example the network would eventually never converge, in fact, even absent an attacker; with less extreme examples it's not as bad but you still might need to wait many blocks to be confident there wouldn't be a long reorg; due to a long chain of blocks being found 'concurrently' (within the communications diameter of the network)).
The observation of the spare power in that situation is a good one (but again, also addressed by the backlog).