Vulnerability detection under poisoning attacks through code and token features | Publicación