Picture for Maher Muhtadi

Maher Muhtadi

An Empirical Evaluation of LLM-Based Approaches for Code Vulnerability Detection: RAG, SFT, and Dual-Agent Systems

Add code
Jan 01, 2026
Viaarxiv icon