AI RESEARCH

From SFT to RL: Demystifying the Post-Training Pipeline for LLM-based Vulnerability Detection

arXiv CS.AI

ArXi:2602.14012v2 Announce Type: replace-cross The integration of LLMs into vulnerability detection (VD) has shifted the field toward interpretable and context-aware analysis. While post-