Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login / Sign Up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Network Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Paper Title

    Secure Federated Learning for Automotive Supply Chains: A Hybrid Encryption Framework for Privacy-Preserving Demand Forecasting

    Description / Abstract

    Privacy-preserving federated learning offers a promising solution to optimize automotive supply chain forecasting while protecting sensitive business data. The framework presented combines partially homomorphic encryption with secure multi-party computation to protect gradient updates while enabling effective model aggregation. An adaptive differential privacy mechanism dynamically calibrates noise injection based on data sensitivity and trust relationships, maintaining forecasting accuracy while ensuring privacy guarantees. A blockchain-based incentive system encourages sustained participation through transparent reward distribution, while gradient quantization techniques reduce communication requirements. Experimental evaluation using real-world automotive aftermarket data demonstrates that this hybrid approach outperforms both isolated local forecasting and centralized models, significantly reducing inventory costs while decreasing stockout rates. The system achieves faster convergence than conventional federated learning approaches with minimal computational overhead, robust privacy guarantees against various attack vectors, and efficient communication protocols suitable for global deployment. Despite computational trade-offs, privacy-utility balancing challenges, implementation barriers, regulatory complexities, and incentive system limitations, the framework establishes a viable pathway for collaborative intelligence across automotive supply chains without compromising competitive confidentiality.

    User Profile
    Sumit Shekhar
    Reviewer 4.8
    User Profile
    Vishesh Narendra Pamadi
    Reviewer 4.8
    User Profile
    Das Pakanti Yadav
    Reviewer 4.8
    User Profile
    Raja Kumar Kolli
    Reviewer 4.8
    User Profile
    Antara .
    Reviewer 4.6

    Sumit Shekhar Reviewer

    badge Review Request Accepted

    Sumit Shekhar Reviewer

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The manuscript addresses a highly pertinent problem in contemporary supply chain analytics by combining federated learning with strong privacy protection for collaborative demand forecasting. The focus on automotive supply chains is appropriate and well justified, given the competitive sensitivity and regulatory constraints associated with this sector. The integration of hybrid encryption, adaptive differential privacy, and incentive mechanisms provides a coherent conceptual contribution that goes beyond a purely technical treatment. While individual components of the framework have been studied previously, their coordinated application to privacy preserving collaboration in automotive forecasting represents a meaningful and timely extension of existing research.

    Methodology

    The methodological framework is clearly articulated and covers system architecture, encryption design, privacy mechanisms, incentive structures, and communication efficiency. The layered description of hybrid encryption and secure aggregation demonstrates careful attention to both security and scalability. The experimental setup is reasonably described, including baseline comparisons and evaluation metrics related to forecasting accuracy and operational impact. However, the study would benefit from more explicit detail on data preprocessing steps, parameter selection for privacy budgets, and the criteria used to configure the adaptive noise mechanism. Additional clarification on how participant heterogeneity was handled during training would also improve reproducibility.

    Validity and Reliability

    The manuscript provides a thoughtful discussion of potential threats to validity, particularly with respect to privacy leakage, collusion resistance, and cross jurisdictional compliance. The reported use of attack simulations and ablation analysis supports the credibility of the findings. Nevertheless, much of the evidence is drawn from a single industrial dataset, which may limit generalizability to other supply chain contexts. The reliability of conclusions regarding regulatory compliance would be strengthened by clearer linkage between technical guarantees and specific regulatory requirements. A more explicit acknowledgment of possible bias introduced by data imbalance across participants would further enhance this section.

    Clarity and Structure

    The paper is logically organized, progressing from conceptual motivation to technical design, results, and future directions. Sectioning is clear and the narrative maintains coherence across technical and applied discussions. Figures and tables help summarize complex relationships among privacy, performance, and communication efficiency. Some sections, particularly within the methods and discussion, are dense and could benefit from tighter phrasing and shorter paragraphs. Minor language refinement would improve readability without altering the technical content.

    Results and Analysis

    The results indicate improved forecasting accuracy and reduced inventory related inefficiencies compared with both isolated and conventional collaborative approaches. The analysis appropriately links technical mechanisms such as adaptive privacy calibration and gradient quantization to observed performance gains. The inclusion of computational and communication efficiency metrics strengthens the practical relevance of the study. However, several performance claims are presented in strongly positive terms and would benefit from more cautious interpretation, especially where projections about large scale adoption are made. A more explicit comparison with non encrypted federated learning under identical conditions would further clarify the tradeoffs between privacy and utility.

    IJ Publication Publisher

    Thank you for the time and expertise you devoted to this review. Your careful reading and well considered observations have been very helpful to the editorial process.

    We sincerely appreciate the clarity and professionalism of your comments, which contribute directly to maintaining the scholarly standards of the journal.

    Publisher

    User Profile

    IJ Publication

    All Reviewers

    User Profile

    Sumit Shekhar

    Reviewer
    User Profile

    Vishesh Narendra Pamadi

    Reviewer
    User Profile

    Das Pakanti Yadav

    Reviewer
    User Profile

    Raja Kumar Kolli

    Reviewer
    User Profile

    Antara .

    Reviewer

    More Detail

    User Profile

    Paper Category

    Computer Sciences

    User Profile

    Journal Name

    TIJER - Technix International Journal for Engineering Research

    User Profile

    p-ISSN

    User Profile

    e-ISSN

    2349-9249

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp