Today,
a
large
number
of
people
dabble
in
the
realm
social
media.
Due
to
pandemic
situation,
are
even
more
engaged
since
they
frequently
use
media
vent
their
emotions.
One
many
detrimental
effects
this
pervasive
usage
is
cyberbullying,
which
troubling
form
online
harassment.
Though
it
can
take
several
forms,
most
common
one
text.
Cyberbullying
on
media,
and
instead
confronting
perpetrator,
victims
often
have
mental
breakdowns
as
result
it.
This
study's
computerized
cyberbullying
detection
method
accesses
Twitter
users'
psychological
traits,
including
personalities,
moods,
Our
study
provides
an
innovative
solution
for
detecting
tweets
by
attention-based
transformer
algorithm
combined
with
embeddings.
model
acts
detector
classifying
that
related
cyberbullied
actions.
These
converted
into
numerical
vectors
Embeddings
divided
fixed
segments
through
padding
technique.
The
learns
from
encoder
part
comprising
self-attention
feed-forward
neural
network
normalization
tweet's
dataset.
Incredibly
accurate
made
possible
integrated
technology.
approach
promises
identify
quickly
precisely
give
control
women
over
situation.
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 5
Published: March 14, 2024
Unauthorized
information
transfer
from
an
enterprise
to
a
third
party
is
known
as
data
leakage.
In
the
modern
era,
everything
done
online,
including
transfers,
stocks,
groceries,
clothing,
appliances,
and
money
transactions.
To
avoid
misuse,
all
shared
needs
be
protected
unwanted
access.
It
helps
protect
prevent
leakage
of
unstructured
in
addition
assisting
with
preservation
formatted
data.
Utilization
Ciphertext-Policy
Attribute-Based
Encryption
Algorithm
has
surfaced
viable
approach
safeguard
both
during
transmission
storage.
The
system
starts
preventive
actions,
such
encryption
updates
or
access
limits,
case
suspected
breach
lessen
effect.
By
combining
anomaly
detection
methods
CP-ABE,
strong
framework
for
improving
security
privacy
across
range
domains
presented,
providing
proactive
line
defense
against
possible
breaches.this
method
improves
System
efficiency
prevens
daa
leakages
less
time.
Today,
a
large
number
of
people
dabble
in
the
realm
social
media.
Due
to
pandemic
situation,
are
even
more
engaged
since
they
frequently
use
media
vent
their
emotions.
One
many
detrimental
effects
this
pervasive
usage
is
cyberbullying,
which
troubling
form
online
harassment.
Though
it
can
take
several
forms,
most
common
one
text.
Cyberbullying
on
media,
and
instead
confronting
perpetrator,
victims
often
have
mental
breakdowns
as
result
it.
This
study's
computerized
cyberbullying
detection
method
accesses
Twitter
users'
psychological
traits,
including
personalities,
moods,
Our
study
provides
an
innovative
solution
for
detecting
tweets
by
attention-based
transformer
algorithm
combined
with
embeddings.
model
acts
detector
classifying
that
related
cyberbullied
actions.
These
converted
into
numerical
vectors
Embeddings
divided
fixed
segments
through
padding
technique.
The
learns
from
encoder
part
comprising
self-attention
feed-forward
neural
network
normalization
tweet's
dataset.
Incredibly
accurate
made
possible
integrated
technology.
approach
promises
identify
quickly
precisely
give
control
women
over
situation.