This tutorial can be used as a stepping stone to implement much sophisticated use cases of security functions such as network intrusion detection and reconciliation. Here we build a neural network and apply SHAP and LIME packages to observe the important features that are contributing to the outputs.
You can quickly run the tutorial on Binder by clicking on launch binder
badge above. It can take some time though.
We will keep improving this repository for new additions:
- Expanded discussions on explanations
- Testing for various attacks