From: Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities
Model
2CWE
5CWE
8CWE
SVM
35
72
98
Naïve Bayes
23
57
74
CNN
28
76
LSTM
21
45
63
GCN
12
25
64
Our Method
16
54