L Xu, B An, X Li, D Zhao,
H Peng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Current vulnerability detection methods encounter challenges, such as inadequate feature
representation, constrained feature extraction capabilities, and coarse-grained detection. To …