1 code implementation • 5 Jan 2024 • Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang
Vulnerability detectors based on deep learning (DL) models have proven their effectiveness in recent years.