Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection