Research Article

A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code

Figure 7

The training accuracy curves (a) and training loss curves (b) of compared systems.
(a)
(b)