AI RESEARCH
From SFT to RL: Demystifying the Post-Training Pipeline for LLM-based Vulnerability Detection
arXiv CS.AI
•
ArXi:2602.14012v2 Announce Type: replace-cross The integration of LLMs into vulnerability detection (VD) has shifted the field toward interpretable and context-aware analysis. While post-