Abstract: With the increasing complexity of modern software systems, accurately detecting software vulnerabilities has become a critical challenge in software security. Existing representation methods ...