Sign in

Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network.

Wenlin XuTong LiJinsong WangTao FuYahui Tang
Published in: CICAI (2) (2023)
Keyphrases