# aid_attention_interpolation_of_texttoimage_diffusion__db95e4b8.pdf Attention Interpolation for Text-to-Image Diffusion Qiyuan He1 Jinghao Wang2 Ziwei Liu2 Angela Yao1, 1National University of Singapore 2S-Lab, Nanyang Technological University qhe@u.nus.edu.sg ayao@comp.nus.edu.sg {jinghao003, ziwei.liu}@ntu.edu.sg Conditional diffusion models can create unseen images in various settings, aiding image interpolation. Interpolation in latent spaces is well-studied, but interpolation with specific conditions like text or image is less understood. Common approaches interpolate linearly in the conditioning space but tend to result in inconsistent images with poor fidelity. This work introduces a novel trainingfree technique named Attention Interpolation via Diffusion (AID). AID has two key contributions: 1) a fused inner/outer interpolated attention layer to boost image consistency and fidelity; and 2) selection of interpolation coefficients via a beta distribution to increase smoothness. Additionally, we present an AID variant called Prompt-guided Attention Interpolation via Diffusion (PAID), which 3) treats interpolation as a condition-dependent generative process. Experiments demonstrate that our method achieves greater consistency, smoothness, and efficiency in condition-based interpolation, aligning closely with human preferences. Furthermore, PAID offers substantial benefits for compositional generation, controlled image editing, image morphing and image-controlled generation, all while remaining training-free. Our code and demo are available at https://qyh00.github.io/attention-interpolation-diffusion/. 1 Introduction Interpolation is a common operation applied to generative image models. It generates smoothly transitioning sequences of images from one seed to another within the latent space and facilitates applications in image attribute modification [40], data augmentation [38], and videos [46]. Interpolation has been investigated extensively [18, 43, 42] in VAEs [20], GANs [8], and diffusion models [13]. Text-to-image diffusion models [35, 37] are a new class of conditional generative models that generate high-quality images conditioned on textual descriptions. How to interpolate between distinct text conditions such as a truck" and a cat" (see Fig. 1 (d)) is relatively under-explored. This issue is, however, crucial for various downstream tasks, such as conditional generation with multiple conditions [6, 25, 51] or cross-modality conditions [54, 56], as well as for image editing [11, 48], where precise control over impact of different conditions is essential to achieve desired results. This paper formulates the task of conditional interpolation and identifies three ideal properties for interpolating text-to-image diffusion models: thematic consistency, smooth visual transitions between adjacent images, and high-quality interpolated images. For instance, interpolating from a truck to a cat should avoid irrelevant transitions (e.g., via a bowl ). The sequence should change between the two conditions gradually and feature high-quality and high-fidelity images (vs. e.g. simple overlays of the truck and cat). These properties directly motivate our quantitative evaluation metrics for conditional interpolation: consistency, smoothness, and fidelity. A direct approach to traverse the conditioning space is interpolating in the text embedding itself [53, 55, 16]. Such an approach often has sub-optimal results (see the first row of Fig. 2). A closer analysis reveals that interpolating the text embedding is mathematically equivalent to interpolating the keys and values of the cross-attention module between the text and image space. Our analysis further 38th Conference on Neural Information Processing Systems (Neur IPS 2024). (a) text to text: A lady in the sea of flowers... to Mobile Suit Gundam... (b) image to image: Mona Lisa to Taylor Swift (c) Dragon to Knight (d) Truck to Cat (e) Ship to Airplane (f) Photo of a dog to Photo of a car , guided with A dog driving car (top), A car with dog furry texture (middle), and A toy named dog-car (bottom). Figure 1: Our approach enables text-to-image diffusion models to generate nuanced spatial and conceptual interpolations between different conditions including text (a, c-e) and image (b), with seamless transitions in layout, conceptual blending, and user-specified prompts to guide the interpolation paths (f). reveals that the keys and values in self-attention impose a stronger influence than cross-attention, which may explain why text embedding interpolation fails to produce consistent results. Based on our analysis, we introduce a novel framework: Attention Interpolation of Diffusion (AID) models for conditional interpolation. AID enhances interpolation quality with (1) a fused interpolated attention mechanism on both cross-attention and self-attention layers to improve consistency and fidelity and (2) a Beta-distribution-based sample selection along the interpolation path for interpolation smoothness. Additionally, we introduce (3) Prompt-guided Attention Interpolation of Diffusion (PAID) models to further guide the interpolation via a text description of the path itself. Experiments on various state-of-the-art diffusion models [30, 35, 2] highlight our approach s effectiveness (see samples in Fig. 1 and more in Appx. H) without any additional training. Human evaluators predominantly prefer our method over standard text embedding interpolation. We further show that our method can benefit various downstream tasks, such as composition generation, and boost the control ability of image editing. Our method is also compatible with image condition (see Fig. 1 (b)), which can be further used for more application such as image morphing and image-controlled generation. This underscores the practical impact of the problem of conditional interpolation and our proposed solution. Our main contributions are: Problem formulation for conditional interpolation within the text-to-image diffusion model context and proposing evaluation metrics for consistency, smoothness, and fidelity; A novel and effective training-free method AID for text-to-image interpolation. AID can be augmented with prompt-guided interpolation (PAID) to control specific paths between two conditions; Extensive experiments highlight AID s improvements for text-based image interpolation. AID substantially improves interpolation sequences, with significant enhancements in fidelity, consistency, and smoothness without any training. Human studies show a strong preference for the AID; We show that AID offers much better control ability for diffusion-based image editing, and it can be used for compositional generation with state-of-the-art performance. It is also compatible with image condition, enabling more applications such as image morphing or controlling the scale of additional image prompt. 2 Related Work Diffusion Models and Attention Manipulation. The emergence of diffusion models has significantly transformed the text-to-image synthesis domain, with higher quality and better alignment with textual descriptions [35, 37, 33]. Attention manipulation techniques have been instrumental in unlocking the potential of diffusion models, particularly in applications such as in-painting and compositional object generation. These applications benefit from refined control over the attention maps, aligning the modifier and the target object more closely to enhance image coherence [11, 1, 3, 51, 34]. Furthermore, cross-frame attention mechanisms have shown promise in augmenting visual consistency within video generation frameworks utilizing diffusion models [17, 31]. These works suggest that the visual closeness of two generated images may be reflected in the similarity of their attention maps and motivates us to study interpolation from an attention perspective. Interpolation in Image Generative Models. Interpolation within the latent spaces of models such as GANs [8] and VAEs [20] has been studied extensively [43, 18, 46]. More recently, explorations of diffusion model latent spaces allow realistic interpolations between real-world images [38, 21]. Works to date, however, are limited to a single condition, and there is a lack of research focused on interpolation under varying conditions. Wang & Golland explored linear interpolation within text embedding to interpolate real-world images; however, this approach yields image sequence with diminished fidelity and smoothness. This gap underscores the need for further exploration of conditional interpolation in generative models. 3 Analysis of Conditional Interpolation 3.1 Text-to-Image Diffusion Models Text-to-image diffusion models such as Stable Diffusion [35, 30] generate images from specified text. Consider the generation of an image for some specified text as an inference process denoted by f(z T , c). The function f is an abstraction representing the denoising diffusion process, c is a representation of the conditioning text and z T is a randomly sampled latent seed. Usually, c is represented as a CLIP text embedding [32], while the z s over the denoising time steps of the generation are sampled from a Gaussian distribution. More specifically, if the inference is carried out over T denoising time steps, the latent zt 1 can be sampled conditionally, based on zt: pθ(zt 1|zt) = N(zt 1; µθ(zt, c, t), Σθ(zt, c, t)), where zt N(0, 1), (1) where t represents the denoising time-step index, µθ(zt, c, t) is estimated by a UNet [36], and Σθ(zt, c, t)) is determined by a noise scheduler [13, 42]. After iterative sampling from z T to z0, the image is generated by decoder D, as D(z0). Attention is used in text-to-image diffusion models [35, 29, 37] in various forms. Cross-attention is commonly used as the link from the text condition to the image generation. Specifically, given a latent variable z Rdz, text condition c Rdc and the attention layer with matrices WQ Rdz dq, WK Rdc dk and WV Rdc dv, the cross-attention is computed as A(z, c) = Attn(Q, K, V ) = softmax(QK dk )V, where Q = W Qz, K = W Kc, V = W V c. (2) Self-attention is also commonly used in state-of-the-art text-to-diffusion models [30, 35, 2]. Selfattention is a special case of cross-attention and can also be computed with Eq. 2 as A(z, z). In this case, the key and values are defined as K = W Kz, V = W V z respectively. For brevity, we abuse the notation to directly represent multi-head attention [47] and denote the attention layer as Attn(Q, K, V ) in both cross-attention and self-attention scenarios. (a) an apple to a bed (b) a lady wearing oxygen mask to a lion Figure 2: Results comparison between AID (the 1st row) and text embedding interpolation (the 2nd row). AID increases smoothness, consistency, and fidelity significantly. 3.2 Text Embedding Interpolation In this paper, we denote linear and spherical interpolation [49, 21] as rl(w; A, B) and rs(w; A, B) respectively, where w [0, 1] is the interpolation coefficient, and (A, B) are the interpolation anchors or end-points. Conditional interpolation differs from standard text-to-image generation in that there are two text conditions c1 and cm. Each condition has its own respective latent seeds z1 and zm1. The objective of conditional interpolation is to generate a sequence of images {I1:m} = {I1, I2, ..., Im}. In this sequence, the source images are generated by the standard text-to-image generation, i.e, I1 = f(z1, c1), Im = f(zm, cm) as described in Sec. 3.1. Existing literature has shown that similarity in input space, including the latent seed and the embedding of the condition reflects the similarity in the output pixel space [19, 49]. Directly interpolating the text embedding c is therefore a straightforward approach that can be used to generate an interpolated image sequence [49, 16]. In text embedding interpolation, the text conditions {c1, cm} and their latent seeds {z1, zm} are used as endpoints for interpolation and images are generated accordingly: Ii =f(zi, ci) where zi =rs(wi; z1, zm), ci =rl(wi; c1, cm), and wi = i 1 m 1 for i = {1 . . . m}. (3) Note that spherical interpolation is applied to estimate the latent seed zi to ensure that Gaussian noise properties are preserved [38]. In contrast, linear interpolation is applied to estimate the text condition [53, 49, 16, 24] ci. For both zi and ci, the interpolation coefficient wi sampled in uniform increments from 1 to m. Given that the text condition c directly propagates into the key and value K and V (Eq. 2), interpolating between the text conditions c1 and cm is equivalent to interpolating the associated keys and values in cross-attention. This is stated formally in the following proposition: Proposition 1. Given query Q from a latent variable z, keys and values {K1, V1} and {Km, Vm} from text conditions {c1, cm} and linearly interpolated text conditions ci, the resulting crossattention module A(z, ci) is given by linearly interpolated keys and values Ki and Vi: A(z, ci) = Attn(Q, Ki, Vi), where Ki = rl(wi; K1, Km) and Vi = rl(wi; V1, Vm), (4) where wi is defined similarly as Eq. 3. The proof for Proposition 1 is given in the Appx. A. This proposition gives insight into how text embedding interpolation can be viewed as manipulating the keys and values. Specifically, it is equivalent to interpolating the keys and values to generate the resulting interpolated image. It is worth noting that an analogous interpretation does not carry through for the query Q even though it also depends on some interpolated latent seed zt. This is because zt i is estimated as an interpolation between the latent seeds zt 1 and zt m, while the latent zt i itself is progressively altered through the denoising process (see Eq. 1). 3.3 Measuring the Quality of Conditional Interpolation Text embedding interpolations work well when the conditions are semantically related, e.g., a dog and a cat , but may lead to failures in less related cases. To better analyze the characteristics of the interpolated image sequences, we define three measures based on ideal interpolation qualities: consistency, smoothness, and image fidelity. 1We use subscripts on z to denote latent seed indices without expressing the T denoising timesteps explicitly, i.e. z T 1 = z1 and z T m = zm. Perceptual Consistency. Ideally, the interpolated image sequence should transition from one source or endpoint to the other in a perceptually direct and therefore consistent path. Similar to [15], we use the average LPIPS metric [57] across all adjacent image pairs in the sequence to evaluate consistency. If P denotes the LPIPS model, the consistency C of a sequence I1:m is defined as: C(I1:m; P) = 1 m 1 i=1 P(Ii, Ii+1). (5) For example, a consistent interpolation from an apple to a bed may pass through an apple and a bed but should not have intermediate stages like a messy sketch (see Fig. 2 (a)). Perceptual Smoothness. A well-interpolated sequence should exhibit a gradual and smooth transition. We propose to apply Gini coefficients on the perceptual distance between each neighbouring pair of interpolated images to indicate smoothness. Gini coefficients [5] are a conventional indicator of data imbalance [45, 9, 10, 50] where higher coefficients indicate more imbalance. And the imbalance of perceptual distance of each neighbouring pair indicates low smoothness. Let G(X) denote the Gini coefficient of a set X = {x1, x2, ..., xn}. The smoothness S of a sequence I1:m with P denoting the LPIPS model is defined as: S(I1:m; P) = 1 G( i=1 P(Ii, Ii+1)), G(X) = Pn i=1 Pn j=1 |xi xj| 2n Pn i=1 xi . (6) Fig. 2(b) shows how a smooth interpolation sequence exhibits a gradual transition on the visual content (from a lady wearing oxygen mask to lion in the top row) instead of one source image or end-point dominating the sequence (the lion in the bottom row). Fidelity. Finally, any interpolated images should be of the same (high) quality conventionally generated images. Following [38, 49], we evaluate the fidelity of interpolated images with the Fréchet Inception Distance (FID) [12]. Given n interpolated sequences {I(1) 1:m, I(2) 1:m, ..., I(n) 1:m}, the fidelity F of the sequences is defined as the FID based on a visual inception model 2 The FID between the source images and the interpolated images is defined as: F(I(1) 1:m, I(2) 1:m, ..., I(n) 1:m) = FIDMV j=1 {I(j) 1 , I(j) m }, j=1 {I(j) i |i = 1, i = m} For example, the interpolated sequence should have minimal artifacts (see Fig. 2(a)), where the top row clearly shows the appearance of the apple, whereas the bottom row does not. 3.4 Diagnosing Text Embedding Interpolation Experimentally (see Sec. 5.1), we observe that text embedding interpolation sequences exhibit poor consistency and smoothness. The interpolated images are also commonly low in fidelity, with indirect and non-smooth transitions. Where do the failures of text embedding interpolation come from? We analyze the outputs from the perspective of spatial layouts and the selection of interpolation coefficients. Spatial Layouts and Attention. Consistency is directly affected by the difference between the spatial layout of the source and interpolated images. One observation is that the spatial layout of interpolated images from text embedding interpolations is quite different from the source endpoints (see Fig. 2 (a) bottom row). Proposition 1 links the text embedding interpolation to the crossattention mechanism exclusively. However, the literature suggests that the spatial layout of the overall image is strongly linked to the self-attention mechanism [17, 31]. As such, we hypothesize that cross-attention does not pose enough spatial layout constraints stand-alone. Instead, there is a need for a stronger link of the interpolation to self-attention, to allow more consistent spatial transitions. As a simple test, we swap the keys and values from two text-to-image generations. Consider two images I and I generated from two text prompts p and p . We replace the keys and values from 2Typically, Inception v3 [44] MV is used. Figure 3: An overview of PAID: Prompt-guided Attention Interpolation of Diffusion. The main components include: (1) Replacing both cross-attention and self-attention when generating interpolated image by fused interpolated attention; (2) Selecting interpolation coefficients with Beta prior; (3) Inject prompt guidance in the fused interpolated cross-attention. either the cross-attention or self-attention layers in the generative process of I with that of I to generate Icross and Iself respectively. We then evaluate the mean squared error (MSE) of the lowfrequency components between I and Icross or Iself. The results show that Iself closely resembles I , while Icross does not. More details and results are shown in Appx. B. Selection of Interpolation Coefficients. Interpolation methods [52, 12, 38] commonly select uniformly spaced coefficients wi on the interpolation path. Yet an observation from Fig. 2 (b) shows that uniformly spaced points in the text-embedding space do not lead to uniformly spaced images with smooth transitions. Small visual transitions may occur over a large range of interpolation coefficients and vice versa, which we can show quantitatively by comparing the perceptual distances between adjacent pairs of uniformly spaced coefficients. This suggests that we should adopt nonuniform selection to ensure smoothness. More details and results are shown in the Appx. B. 4 AID: Attention Interpolation of Text-to-Image Diffusion The diagnosis in Sec. 3.4 directly leads us to make the following proposals for improving conditional interpolation. First, we are motivated to extend attention interpolation beyond cross-attention to selfattention as well (Sec. 4.1) and propose fused attention. Secondly, our diagnosis of the smoothness motivates us to adopt a non-uniform selection of interpolation coefficients to encourage more even transitions (Sec. 4.2). Combining these two techniques, we propose a AID: Attention Interpolation of text-to-image Diffusion. Finally, in an effort to give more precise control over the interpolation path, we introduce the use of prompt guidance for interpolation (Sec. 4.3). This further enhances AID as Prompt-guidance AID (PAID). The full pipeline is shown in Fig. 3. 4.1 Fused Interpolated Attention Mechanism The analysis in Sec. 3.4 highlights that both cross-attention and self-attention likely play a role in interpolating spatially consistent images. Proposition 1 can be generalized to self-attention where the keys and values are derived from the latent z instead of c for enhancing spatial constraint. As such, we define a general form of inner-interpolated attention on the keys and values as follows: Intp-Attn I Qi, K1:m, V1:m; wi = Attn Qi, (1 wi)K1 + wi Km, (1 wi)V1 + wi Vm , (8) where Qi is derived from zi. Note that Eq. 8 is equivalent to Eq. 4 if {K1, Km} and {V1, Vm} are derived from {c1, cm}, i.e. as cross-attention; if they are derived from {z1, zm}, then it represents self-attention. Instead of applying interpolation to the key and value, we can also interpolate the attention itself. We define this as outer-interpolated attention: Intp-Attn O Qi, K1:m, V1:m; wi = (1 wi) Attn Qi, K1, V1 + wi Attn Qi, Km, Vm . (9) Similarly, Eq. 9 can represent both crossand self-attention, depending on if {K1, Km} and {V1, Vm} are derived from {c1, cm} or {z1, zm} respectively. More details on the differences between inner and outer interpolation are given in the Appx. C. We denote the two versions as AID-I and AID-O for inner and outer interpolation respectively. While applying interpolation as defined in Eqs. 8 and 9 for self-attention does lead to high spatial consistency, it also results in poor fidelity images. This is likely because directly replacing the selfattention mechanism with some interpolated version is too aggressive. Therefore, for self-attention, we maintain the source keys and values Ki and Vi from the interpolated zi and concatenate them with the interpolated keys and values, as shown in Fig. 3. Denoting concatenation as [ , ], we define fused attention interpolation, leading to a fused inner-interpolated attention: Intp-Attn F I Qi, K1:m, V1:m; wi = Attn Qi, (1 wi)K1+wi Km, Ki , (1 wi)V1+wi Vm, Vi . (10) For self-attention, as Ki is derived from zi, Ki = (1 wi)K1 + wi Km; the same holds for Vi. For cross-attention, however, Ki = (1 wi)K1 + wi Km, so fusing the two does not provide additional benefits. We note that there are opportunities for fusion with keys and values derived from other sources. We follow such a strategy in Sec. 4.3 to inject additional text-based guidance. Analogous to Eq. 9, we define a fused outer-interpolated attention: Intp-Attn F O Qi, K1:m, V1:m; wi = (1 wi) Attn Qi, [K1, Ki], [V1, Vi]) +wi Attn(Qi, [Km, Ki], [Vm, Vi] . (11) 4.2 Non-Uniform Interpolation Coefficients The analysis in Sec. 3.4 shows that interpolation coefficients should not be selected uniformly adopted in previous methods [11, 16] on the interpolation path. For more flexibility, we apply a Beta distribution p B(t, α, β). Beta distributions are conveniently defined within the range of [0, 1]. When α = 1 and β = 1, p B degenerates to a uniform distribution, which reverts to the original setting. When α > 1 and β > 1, the distribution is concave (bell-shaped), with higher probabilities away from the end-points of 0 and 1, i.e. away from the source images. Finally, the selected points are adjustable based on alpha and beta values, to give higher preference towards one or the other source image (see Fig. 3). Given the Beta prior represented as cumulative distribution function FB(w, α, β), we define a Betainterpolation r B(w; 0, 1) as r(F 1(w, α, β)), where w U(0, 1). Therefore, the distributed point with Beta prior becomes: {r(0), r(F 1 B ( 1 m 1, α, β)), ..., r(F 1 B (m 2 m 1, α, β)), r(1)}. (12) In practice, we employ a dynamic selection process to adjust the α and β parameters of the Beta prior, and form the smoothest sequence from the explored coefficients. Further details are provided in Appendix D. 4.3 Prompt Guided Conditional Interpolation (PAID) Given two source inputs, the hypothesis space of interpolation paths is actually large and diverse. Yet most interpolation methods [52, 38] estimate one deterministic path. Can we control or specify the interpolation path? One possibility is to provide a (third) conditioning text, which we refer to as a guidance prompt. To connect the interpolated sequence with the text in the guidance prompt g, we fuse the associated key Kg = W Kg and value Vg = W V g instead of the original Ki and Vi in the fused inner-interpolated attention in Eq. 10 for cross-attention: Guide-Attn F I Qi, K1:m, V1:m; wi, Kg, Vg = Attn Qi, (1 wi)K1 + wi Km, Kg , (1 wi)V1 + wi Vm, Vg . (13) In practice, the guidance prompt is provided by users to choose the interpolation path conditioned on the text description as Fig. 1 (f) shows. We demonstrate that the prompt-guided attention interpolation dramatically boosts the ability of compositional generation in Sec. 5.2. Dataset Method Smoothness ( ) Consistency ( ) Fidelity ( ) TEI 0.7531 0.3645 118.05 CIFAR-10 DI 0.7564 0.4295 87.13 AID-O 0.7831 0.2905* 51.43* AID-I 0.7861* 0.3271 101.13 TEI 0.7424 0.3867 142.38 LAION-Aesthetics DI 0.7511 0.4365 101.31 AID-O 0.7643 0.2944* 82.01* AID-I 0.8152* 0.3787 129.41 Interpolated attention Self-fusion Beta prior Smoothness ( ) Consistency ( ) Fidelity ( ) % % % 0.7531 0.3645 118.05 % % ! 0.7995 0.3803 117.30 ! % % 0.7846 0.3201 101.89 ! % ! 0.8517* 0.3452 155.01 ! ! % 0.6236 0.2411* 52.51 ! ! ! 0.7831 0.2905 51.43* (a) (b) Table 1: Quantitative results of conditional interpolation. Quantitative results where the best performance is marked as (*) and the worst is marked as red. (a) Performance on CIFAR-10 and LAION-Aesthetics. AID-O and AID-I both show significant improvement over the Text Embedding Interpolation (TEI). Though Denoising Interpolation (DI) achieves relatively high fidelity, there is a trade-off with very bad performance on consistency (0.4295). AID-O boosts the performance in terms of consistency and fidelity while AID-I boosts the performance of smoothness; (b) Ablation studies on AID-O s components, showcase that the Beta prior enhances smoothness, attention interpolation heightens consistency, and self-attention fusion significantly elevates fidelity. 5 Experiments Configuration and Settings. We evaluate quantitatively based on the three measures for conditional interpolation defined in Sec. 3.3 and user studies. Detailed experimental and application configurations are given in Appxs. F and G. We use Stable Diffusion 1.4 [35] as the base model to implement our attention interpolation mechanism for quantitative evaluation. In all experiments, a 512 512 image is generated with the DDIM Scheduler [42] and DPM Scheduler [26] within 25 timesteps. Additional qualitative results using other state-of-the-art text-to-image diffusion models [30, 23, 2] are given in Appx. H. 5.1 Conditional Interpolation Protocol, Datasets & Comparison Methods. For experiments in each dataset, we run 5 trials each with N = 100 iterations. In each iteration, we randomly select two conditions and generate an interpolation sequence with size m = 7. We report the mean of each metric of the interpolation sequences over all trials as the final result. Our proposed framework is evaluated using corpora from CIFAR-10 [22] and the LAION-Aesthetics dataset from the larger LAION-5B collection [39]. To the best of our knowledge, the only related method is the text-embedding interpolation (TEI) [49, 53, 55] (see Sec. 3.2). We also compare with Denoising Interpolation (DI), which interpolates along the denoising schedule; more details in DI are given in the Appx. F. Results. We quantitatively evaluate our methods based on the evaluation protocol as shown in Tab. 1. AID-O significantly increases the performance of all the evaluation metrics. AID-I achieves higher smoothness, AID-O has significant improvements in consistency (-20.3% on CIFAR-10 and -23.9% on LAION-Aesthetics) and fidelity (-66.62 on CIFAR-10 and -60.37 on LAION-Aesthetics). The fidelity of AID-I is poorer than AID-O and worse than Denoising Interpolation. However, AID-I achieves competitive qualitative results as shown by the user study. Ablation Study. Tab. 1 shows ablations of the AID-O framework with CIFAR-10, focusing on three primary design elements: attention interpolation, self-attention fusion, and Beta-interpolation. Results show that attention interpolation improves consistency while Beta-interpolation contributes to improvements in smoothness and self-attention fusion to enhance image fidelity. While attention interpolation (without fusion with self-attention) with Beta-interpolation achieves the highest smoothness, it does so at the cost of fidelity. Similarly, AID without Beta interpolation achieves the strongest consistency but trades off smoothness (see Fig. 4). Fig. 4 (a) provides a qualitative comparison between different ablation settings. User Study. Using Mechanical Turk, we check for human preferences on four types of text sources: 1) near objects, such as dogs and cats; 2) far objects, such as dragons and bananas; 3) scenes, such as waterfalls and sunsets; and 4) scene and object, such as a sea of flowers with a robot. This variety provides a comprehensive assessment for both concept and spatial interpolation. We conducted 320 trials in total; in each trial, an independent evaluator was asked to select their preferred interpolation result. Tab. 2 shows that our method is almost always preferred, though the preference is split across AID-I and AID-O depending on the type of text sources. (a) (b) Figure 4: Qualitative comparison of different ablation setting of AID. (a) Qualitative comparison between AID without fusion (1st row), AID with fusion (2nd row), and AID with fusion and beta prior (3rd row). Fusing interpolation with self-attention alleviates the artifacts of the interpolated image significantly, while beta prior increases smoothness based on AID with fusion. (b) CLIP score of different methods on composition generation. Interpolation method Near Object Far Object Scene Object+Scene TEI 8.75% 1.16% 0% 1.26% AID-I 53.75% 50% 45.2% 45.57% AID-O 36.25% 46.5% 50% 51.90% Hard to determine 1.25% 2.32% 4.76% 1.26% Editing Method Smoothness P2P 0.3741 P2P + AID 0.8921 (0.5180 ) EDICT 0.5978 EDICT + AID 0.8486 (0.2508 ) (a) (b) Table 2: Human evaluation results. (a): Human preference ratio of each method in different categories of interpolation, AID-I, and AID-O are dominantly preferred by TEI; (b): Smoothness of different editing methods, combined with AID boosts the control ability on the editing level. 5.2 Application In this section, we firstly introduce how to adapt our methods into applications including image editing control and compositional generation. We further extend to cross-modality conditions including image prompt as well with IP-Adapter [54], which enables applications including image morphing and image-controlled generation. We provide more details in Appendix. G. Image Editing Control. Text-based image editing tries to modify an image based on a textual description (see Fig. 5). Existing methods [16, 11, 48] rely on text embedding interpolation to control the editing level. Training-free methods [48, 11] struggle to control the editing level based on the text, while ours does not. We validate the control ability of our methods using Prompt-to Prompt [11] (P2P) for synthesized image editing and EDICT [48] for real image editing. We evaluate the ability to control the editing level using the smoothness metric defined in Sec. 3.3 using the image editing dataset presented in [48]. Given an image with an editing level of 1 and the original image with an editing level of 0, we use either TEI or AID-O to interpolate edited images with levels ranging from { 1 6} and assess the smoothness of the edited image sequence. Quantitative results are reported in Tab. 2 (b). Our method greatly improves the smoothness of the edited image sequence, aligning with different editing levels and thereby enhancing the control ability for editing. As shown in Fig. 5, P2P alone cannot effectively control the editing level but combining it with AID allows for precise level adjustments. Compositional Text-to-Image Generation. Compositional generation is highly challenging for text-to-image diffusion models [25, 6, 7]. In our experiments, we focus on concept conjunction [6] - generating images that satisfy two given text conditions. For example, given the conditions "a robot" and "a sea of flowers," the goal is to generate an image that aligns with both "a robot" and "a sea of flowers." For compositional generation, we use PAID to interpolate between conditions c1 and c2 with the prompt guidance "c1 AND c2". For quantitative evaluation, we use the same dataset for human evaluation as in Sec. 5.1 and CLIP scores [32] to evaluate if the generated images align with both conditions. We compare our methods with vanilla Stable Diffusion [35, 30] and two other state-ofthe-art training-free methods: Compositional Energy-based Model (CEBM) [25] and RRR [7]. Fig. 4 (b) shows that the CLIP score of our method is higher than previous methods for both Stable Diffusion 1.4 [35] and SDXL [30]. Moreover, our method produces fewer artifacts such as merging the two objects together, as illustrated in Fig. 6. (a) "A cat dog sitting on the grass." (b) "A boy is angry happy." Figure 5: Results of image editing control. Our method boosts the controlling ability over editing. The first row of (a) and (b) is generated by P2P + AID while the second row is P2P + TEI. (a) Vanilla SD (b) CEBM (c) RRR (d) PAID Figure 6: Results of compositional generation. Images on the left are generated with "a deer" and "a plane" based on SD 1.4 [35] and images on the right are generated with "a robot" and "a sea of flowers" based on SDXL [30]. Compared to other methods, PAID-O properly captures both conditions with higher fidelity. (a) Image morphing between real images (b) "A statue is running." + global reference (c) "A boy is smiling." + composition reference Figure 7: Results of AID with image conditions. Our method is compatible with IP-Adapter for imageconditioned generation (a). In both global image prompt (b) and composition image prompt (c), from left to right the scale of additional image prompt slowly increases. The first row illustrates results controlled by AID, while the second row shows results achieved using the scale setting provided by IP-Adapter. Image Morphing and Image-Controlled Generation. Image morphing finds transitions between two images, while image-controlled generation creates images based on a text prompt with an additional image prompt. To enable generation with image condition, we adapt AID on IP-Adapter [54]. IP-Adapter integrates image embeddings into cross-attention layers, allowing diffusion models to incorporate image prompts. For morphing, we use an empty text prompt and apply AID for smooth interpolation between image conditions. In image-controlled generation, AID adjusts the image prompt scale across endpoints, enhancing control. Our method enables effective image interpolation (Fig. 7 (a)) and offers finer control than IPAdapter. As shown in Fig. 7 (b), AID maintains both text and image alignment, while in Fig. 7 (c), it better preserves identity while following compositional references. Further comparisons are provided in Appendix G. 6 Conclusion In this work, we introduce a novel task: conditional interpolation within a diffusion model, along with its evaluation metrics, which include consistency, smoothness, and fidelity. We present a novel approach, referred to as AID and PAID, designed to produce interpolations between images under varying conditions. This method significantly surpasses the baseline in performance without training, as demonstrated through both qualitative and quantitative analysis. Our method is training-free and broadens the scope of generative model interpolation, paving the way for new opportunities in various applications, such as compositional generation and image editing control. [1] Tim Brooks, Aleksander Holynski, and Alexei A Efros. Instructpix2pix: Learning to follow image editing instructions. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 18392 18402, 2023. [2] Junsong Chen, Jincheng Yu, Chongjian Ge, Lewei Yao, Enze Xie, Zhongdao Wang, James T. Kwok, Ping Luo, Huchuan Lu, and Zhenguo Li. Pixart-α: Fast training of diffusion transformer for photorealistic text-to-image synthesis. In ICLR, 2024. [3] Wenhu Chen, Hexiang Hu, Yandong Li, Nataniel Ruiz, Xuhui Jia, Ming-Wei Chang, and William W Cohen. Subject-driven text-to-image generation via apprenticeship learning. Advances in Neural Information Processing Systems, 36, 2024. [4] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In Conference on Computer Vision and Pattern Recognition, pp. 248 255. Ieee, 2009. [5] Robert Dorfman. A formula for the gini coefficient. The review of economics and statistics, pp. 146 149, 1979. [6] Yilun Du, Shuang Li, and Igor Mordatch. Compositional visual generation with energy-based models. Advances in Neural Information Processing Systems, 33:6637 6647, 2020. [7] Yilun Du, Conor Durkan, Robin Strudel, Joshua B. Tenenbaum, Sander Dieleman, Rob Fergus, Jascha Sohl-Dickstein, Arnaud Doucet, and Will Sussman Grathwohl. Reduce, reuse, recycle: Compositional generation with energy-based diffusion models and MCMC. In ICML, volume 202 of Proceedings of Machine Learning Research, pp. 8489 8510. PMLR, 2023. [8] Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial networks. ar Xiv preprint ar Xiv:1710.09412, 2014. [9] Jinjin Gu and Chao Dong. Interpreting super-resolution networks with local attribution maps. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9199 9208, 2021. [10] Qiyuan He, Linlin Yang, Kerui Gu, Qiuxia Lin, and Angela Yao. Analyzing and diagnosing pose estimation with attributions. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4821 4830, 2023. [11] Amir Hertz, Ron Mokady, Jay Tenenbaum, Kfir Aberman, Yael Pritch, and Daniel Cohen-Or. Prompt-to-prompt image editing with cross-attention control. In ICLR. Open Review.net, 2023. [12] Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, and Sepp Hochreiter. Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in Neural Information Processing Systems, 30, 2017. [13] Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems, 33:6840 6851, 2020. [14] Edward J. Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Lu Wang, and Weizhu Chen. Lora: Low-rank adaptation of large language models. In ICLR, 2022. [15] Tero Karras, Samuli Laine, and Timo Aila. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401 4410, 2019. [16] Bahjat Kawar, Shiran Zada, Oran Lang, Omer Tov, Huiwen Chang, Tali Dekel, Inbar Mosseri, and Michal Irani. Imagic: Text-based real image editing with diffusion models. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 6007 6017, 2023. [17] Levon Khachatryan, Andranik Movsisyan, Vahram Tadevosyan, Roberto Henschel, Zhangyang Wang, Shant Navasardyan, and Humphrey Shi. Text2video-zero: Text-to-image diffusion models are zero-shot video generators. ar Xiv preprint ar Xiv:2303.13439, 2023. [18] Siavash Khodadadeh, Sharare Zehtabian, Saeed Vahidian, Weijia Wang, Bill Lin, and Ladislau Bölöni. Unsupervised meta-learning through latent-space interpolation in generative models. ar Xiv preprint ar Xiv:2006.10236, 2020. [19] Valentin Khrulkov, Gleb Ryzhakov, Andrei Chertkov, and Ivan Oseledets. Understanding ddpm latent codes through optimal transport. ar Xiv preprint ar Xiv:2202.07477, 2022. [20] Diederik P Kingma and Max Welling. Auto-encoding variational bayes. ar Xiv preprint ar Xiv:1312.6114, 2013. [21] Tetta Kondo, Shumpei Takezaki, Daichi Haraguchi, and Seiichi Uchida. Font style interpolation with diffusion models. ar Xiv preprint ar Xiv:2402.14311, 2024. [22] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009. [23] Cagliostro Research Lab. Animagine xl 3.1. https://huggingface.co/cagliostrolab/ animagine-xl-3.1, 2024. [24] Victor Weixin Liang, Yuhui Zhang, Yongchan Kwon, Serena Yeung, and James Y Zou. Mind the gap: Understanding the modality gap in multi-modal contrastive representation learning. Advances in Neural Information Processing Systems, 35:17612 17625, 2022. [25] Nan Liu, Shuang Li, Yilun Du, Antonio Torralba, and Joshua B. Tenenbaum. Compositional visual generation with composable diffusion models. In ECCV, 2022. [26] Cheng Lu, Yuhao Zhou, Fan Bao, Jianfei Chen, Chongxuan Li, and Jun Zhu. Dpm-solver: A fast ode solver for diffusion probabilistic model sampling in around 10 steps. Advances in Neural Information Processing Systems, 35:5775 5787, 2022. [27] Weijian Luo, Tianyang Hu, Shifeng Zhang, Jiacheng Sun, Zhenguo Li, and Zhihua Zhang. Diff-instruct: A universal approach for transferring knowledge from pre-trained diffusion models. Advances in Neural Information Processing Systems, 36, 2024. [28] Open AI. GPT-4. https://openai.com/gpt-4, 2023. [29] William Peebles and Saining Xie. Scalable diffusion models with transformers. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 4195 4205, 2023. [30] Dustin Podell, Zion English, Kyle Lacey, Andreas Blattmann, Tim Dockhorn, Jonas Müller, Joe Penna, and Robin Rombach. SDXL: improving latent diffusion models for high-resolution image synthesis. In ICLR, 2024. [31] Chenyang Qi, Xiaodong Cun, Yong Zhang, Chenyang Lei, Xintao Wang, Ying Shan, and Qifeng Chen. Fatezero: Fusing attentions for zero-shot text-based video editing. ar Xiv preprint ar Xiv:2303.09535, 2023. [32] Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, Gretchen Krueger, and Ilya Sutskever. Learning transferable visual models from natural language supervision. In ICML, Proceedings of Machine Learning Research, 2021. [33] Aditya Ramesh, Prafulla Dhariwal, Alex Nichol, Casey Chu, and Mark Chen. Hierarchical text-conditional image generation with clip latents. ar Xiv preprint ar Xiv:2204.06125, 1(2):3, 2022. [34] Royi Rassin, Eran Hirsch, Daniel Glickman, Shauli Ravfogel, Yoav Goldberg, and Gal Chechik. Linguistic binding in diffusion models: Enhancing attribute correspondence through attention map alignment. Advances in Neural Information Processing Systems, 36, 2024. [35] Robin Rombach, Andreas Blattmann, Dominik Lorenz, Patrick Esser, and Björn Ommer. High-resolution image synthesis with latent diffusion models. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684 10695, 2022. [36] Olaf Ronneberger, Philipp Fischer, and Thomas Brox. U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18, pp. 234 241. Springer, 2015. [37] Chitwan Saharia, William Chan, Saurabh Saxena, Lala Li, Jay Whang, Emily L Denton, Kamyar Ghasemipour, Raphael Gontijo Lopes, Burcu Karagol Ayan, Tim Salimans, et al. Photorealistic text-to-image diffusion models with deep language understanding. Advances in Neural Information Processing Systems, 35:36479 36494, 2022. [38] Dvir Samuel, Rami Ben-Ari, Nir Darshan, Haggai Maron, and Gal Chechik. Norm-guided latent space exploration for text-to-image generation. Advances in Neural Information Processing Systems, 36, 2024. [39] Christoph Schuhmann, Romain Beaumont, Richard Vencu, Cade Gordon, Ross Wightman, Mehdi Cherti, Theo Coombes, Aarush Katta, Clayton Mullis, Mitchell Wortsman, et al. Laion5b: An open large-scale dataset for training next generation image-text models. Advances in Neural Information Processing Systems, 35:25278 25294, 2022. [40] Yujun Shen, Ceyuan Yang, Xiaoou Tang, and Bolei Zhou. Interfacegan: Interpreting the disentangled face representation learned by gans. IEEE transactions on pattern analysis and machine intelligence, 44(4):2004 2018, 2020. [41] Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. ar Xiv preprint ar Xiv:1409.1556, 2014. [42] Jiaming Song, Chenlin Meng, and Stefano Ermon. Denoising diffusion implicit models. ar Xiv preprint ar Xiv:2010.02502, 2020. [43] Łukasz Struski, Jacek Tabor, Igor Podolak, Aleksandra Nowak, and Krzysztof Maziarz. Realism index: Interpolation in generative models with arbitrary prior. ar Xiv preprint ar Xiv:1904.03445, 2019. [44] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2818 2826, 2016. [45] Suryakanthi Tangirala. Evaluating the impact of gini index and information gain on classification using decision tree classifier algorithm. International Journal of Advanced Computer Science and Applications, 11(2):612 619, 2020. [46] Quang Nhat Tran and Shih-Hsuan Yang. Efficient video frame interpolation using generative adversarial networks. Applied Sciences, 10(18):6245, 2020. [47] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. Attention is all you need. Advances in Neural Information Processing Systems, 30, 2017. [48] Bram Wallace, Akash Gokul, and Nikhil Naik. EDICT: exact diffusion inversion via coupled transformations. In CVPR, pp. 22532 22541. IEEE, 2023. [49] Clinton J Wang and Polina Golland. Interpolating between images with diffusion models. ar Xiv e-prints, pp. ar Xiv 2307, 2023. [50] Jinghao Wang, Zhengyu Wen, Xiangtai Li, Zujin Guo, Jingkang Yang, and Ziwei Liu. Pair then relation: Pair-net for panoptic scene graph generation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2024. [51] Ruichen Wang, Zekang Chen, Chen Chen, Jian Ma, Haonan Lu, and Xiaodong Lin. Compositional text-to-image synthesis with attention map control of diffusion models. ar Xiv preprint ar Xiv:2305.13921, 2023. [52] Cheng Yang, Lijing Liang, and Zhixun Su. Real-world denoising via diffusion model. ar Xiv preprint ar Xiv:2305.04457, 2023. [53] Zhaoyuan Yang, Zhengyang Yu, Zhiwei Xu, Jaskirat Singh, Jing Zhang, Dylan Campbell, Peter H. Tu, and Richard Hartley. IMPUS: image morphing with perceptually-uniform sampling using diffusion models. In ICLR. Open Review.net, 2024. [54] Hu Ye, Jun Zhang, Sibo Liu, Xiao Han, and Wei Yang. Ip-adapter: Text compatible image prompt adapter for text-to-image diffusion models. ar Xiv preprint ar Xiv:2308.06721, 2023. [55] Kaiwen Zhang, Yifan Zhou, Xudong Xu, Bo Dai, and Xingang Pan. Diffmorpher: Unleashing the capability of diffusion models for image morphing. In CVPR, pp. 7912 7921. IEEE, 2024. [56] Lvmin Zhang, Anyi Rao, and Maneesh Agrawala. Adding conditional control to text-to-image diffusion models. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 3836 3847, 2023. [57] Richard Zhang, Phillip Isola, Alexei A Efros, Eli Shechtman, and Oliver Wang. The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 586 595, 2018. [58] Wenliang Zhao, Lujia Bai, Yongming Rao, Jie Zhou, and Jiwen Lu. Unipc: A unified predictorcorrector framework for fast sampling of diffusion models. Advances in Neural Information Processing Systems, 36, 2024. A Preliminaries and formulation Linear / Spherical Interpolation. Given tensor A and tensor B, the linear interpolation path rl(w) where w [0, 1] is defined as: rl(w; A, B) = (1 w)A + w B (14) The spherical interpolation is defined as: rs(w; A, B) = sin(1 w)θ sin θ A + sin wθ sin θ B, θ = arcos A B ||A||||B|| (15) Figure 8: Difference between smoothness and consistency in measurement of discrete sequence. Distinction on the Discrete Sequence and Continuous Path. Our formulation diverges from previous studies by concentrating on the assessment of discrete samples, referred to as the interpolation sequence, instead of the continuous interpolation path. This is crucial because the quality of the interpolation sequence is determined not only by the interpolation path s quality but also by how to select the exact sample along the interpolation path, which previous methods overlook. Additionally, the size of an interpolation sequence is often low in practical usage [38, 52]. As a result, our evaluation framework is specifically designed to cater to interpolation sequences. This distinction is significant when evaluating smoothness and consistency as Fig. 8 shows. While Perceptual Path Length (PPL) [15] indicates both smoothness and consistency on the continuous path, where the PPL of the blue path is shorter than the green path, this does not hold in discrete sequences. The sequence can have bad smoothness even if it lies on a smooth interpolation path (see the blue triangle). Proof of Proposition 1. Proposition 1 indicates that interpolating text embedding linearly is equivalent to interpolating key and value in the cross-attention mechanism. The proof is straightforward by decomposing the formula of the attention layer as follows: A(zi, ci) = Attn(Qi, Ki, Vi) = Attn(Qi, W T Kci, W T V ci) = Attn(Qi, W T Krl( i 1 m 1; c1, cm), W T V rl( i 1 m 1; c1, cm)) = Attn(Qi, rl( i 1 m 1; W T Kc1, W T Kcm), rl( i 1 m 1; W T V c1, W T V cm)) = Attn(Qi, rl( i 1 m 1; K1, Km), rl( i 1 m 1; V1, Vm)) B Diagnosis of Text Embedding Interpolation Controlled Experiments on the Key and Value of Attention. To conduct the analysis on the key and value of self-attention and cross-attention, we analyze the effect by replacement experiments. Specifically, given two conditions c and c , we first generate I and I accordingly. They replace all the key and value of either cross-attention or self-attention during the generation of I to the key and value computed from I, which incurs two new generated images including I cross and I self. If self-attention is more important to constraint the spatial layout, The images obtained by replacing self-attention I self should be more similar to I compared to Icross. To quantitatively verify this, we consider two images sharing more similar spatial layouts should have lower differences in the low-frequency information. Therefore, we evaluate the difference in the spatial layout of the two images by directly evaluating the L2 loss on the low-pass images. Specifically, it can be written as: Dsl(I, I ; σ) = 1 2||G(I; σ) G(I ; σ)||2 (17) (a) I (b) I (c) I cross (d) I self (e) (f) Figure 9: Diagnosis of text embedding interpolation on spatial layout (a - e) and adjacent distance (f). (a) Image generated by a cat wearing sunglasses ; (b) Image generated by a dog wearing sunglasses ; (c) Replacing the cross-attention during generation of (b) by (a); (d) Replacing the self-attention during generation of (b) by (a); (e) Box plot of Dsl(I, I cross) and Dsl(I, I self). When fixing a query, the key and value in self-attention mostly determine the output of pixel space compared to cross-attention. (f) The maximum adjacent distance and the average of other adjacent pairs. where G( ; σ) represents Gaussian blurring kernel with parameter σ. We conduct our experiments based on the corpus in the form of class names of CIFAR-10 [22], which we introduce in Sec. 5.1. We run 100 trials and generate two images at each trial then compare the difference between Dsl(I, I self) and Dsl(I, I cross). Based on our empirical verification shown in Fig. 9 (e), Dsl(I, I self) 0, which indicates that the spatial layout of I self is almost the same as I, while Dsl(I, I self) >> Dsl(I, I cross) indicating key and value of self-attention impulses much stronger spatial constraints on the generation than cross-attention. Non-smooth Distance Among Adjacent Pairs. Selecting uniformly distributed interpolation coefficients in text embedding interpolation, commonly does not result in uniform visual transition in the pixel space. Instead, we found that small visual transitions may occur over a large range of interpolation coefficients, and vice versa. To quantitatively verify this, we randomly draw two text conditions from the same corpus of CIFAR-10 [22] and apply text embedding interpolation with uniformly distributed coefficients {0, 0.25, 0.5, 0.75, 1} to generate interpolated images. Then we evaluate our observation by comparing the maximum distance of four adjacent pairs and the average of other distances. As Fig. 9 (f) shows, the maximum distance is often much larger than the average distance of other adjacent pairs, indicating that abrupt visual transition occurs in a short range of interpolation coefficients transition. C Outer vs. Inner Attention Interpolation Mathematical Induction. We start by comparing the formula of outer interpolated attention and inner interpolated attention. We expand the inner interpolated attention defined in Eq. 9 as follows: Intp-Attn I(Qi, K1:m, V1:m; ti) = Attn(Qi, (1 ti)K1 + ti Km, (1 ti)V1 + ti Vm) = softmax(Qi[(1 ti)K1 + ti Km]T dk )[(1 ti)V1 + ti Vm)] = (1 ti) softmax(Qi[(1 ti)K1 + ti Km]T + ti softmax(Qi[(1 ti)K1 + ti Km]T Similarly, we expand the outer interpolated attention defined in Eq. 10 Intp-Attn O(Qi, K1:m, V1:m; ti) = (1 ti) Attn(Qi, K1, V1) + ti Attn(Qi, Km, Vm) = (1 ti) softmax(Qi KT 1 dk )V1 + ti softmax(Qi KT m dk )Vm Comparing Eq. 18 and Eq. 19 above, the essential difference is: while inner attention interpolation uses the same attention map softmax( Qi[(1 ti)K1+ti Km]T dk ) fusing source keys K1 and Km for (a) Fox - Watercolor Art Print to Merry-Christmas-from-Annette Funicello1960.jpeg (b) Louis Henry Sullivan (September 3, 1856 April 14, 1924) was an American architect... to Modern Landscape Painting - Zion by Johnathan Harris Figure 10: Qualitative results from LAION-Aesthetics. For each pair of prompts, the first row is the Input Interpolation, the second row is AID-O and the third row is AID-I. Our methods provide direct and smooth interpolation in spatial layout and style, with high fidelity. (a) Dog - Oil Painting to Bird - Chinese Painting (b) banana to pen Figure 11: Qualitative comparison between AID-O (the 1st row) and AID-I (the 2nd row). While AID-O prefers keeping the spatial layout, AID-I prefers interpolating the concept and style. Comparing the 4th column in (b), AID-I properly captures pen in the shape of banana while AID-O provides a banana but the spatial layout is the same as the pen. different source value V1 and Vm, outer attention interpolation, on the other hand, using different attention maps for different source key and value. This may answer why the AID-I tends to conceptual interpolation fusing the characteristics of two concepts into one target but AID-O tends to spatial layout interpolation allowing the simultaneous existence of two concepts in the interpolated image. Qualitative Results. We observe that AID-I prefers interpolation on the concept or style. On the other hand, AID-O strongly enhances perceptual consistency and encourages interpolations in the spatial layout of images, as Fig. 11 shows. Even when interpolating between two very long prompts, both methods can achieve direct and smooth interpolations with high fidelity as Fig. 10 shows. D Selection with Beta Prior D.1 Intuition behind Beta Prior Based on our analysis in Sec. 3.4 and Sec. B, the transition often occurs abruptly in a small range of interpolation coefficients. This indicates that we need to select more points in that small range rather than uniformly select coefficients between [0, 1]. We hypothesize that this is because: different from interpolation in the latent space, which is only introduced in the initial denoising steps, the diffusion model incorporates the text embedding for multiple denoising steps. This may amplify the influence of the source latent variable with higher coefficients. Therefore, when t is close to 0 or 1, r (t) is closer to 0, leading to the intuition that we want to sample more mid-range t. Based on our heuristics above and the empirical observation in Sec. B, we apply Beta prior, which is a bell-shaped distribution when α and β are both larger than 1, to encourage more coefficients in a smaller range of interpolation coefficients. Furthermore, we can de-bias the visual transition towards one endpoint to make it smoother by adjusting α > β, or vice versa. D.2 Dynamic Selection The main challenge of the entire selection procedure for interpolation coefficients lies in the time cost. Firstly, the ideal interpolation coefficients can vary depending on different combinations of conditions and even different latent seeds. Secondly, exploring each new interpolation coefficient Algorithm 1 Exploration with Beta prior Input: Exploration size n, the initial Gaussian Noise z1, zn, two conditions c1, cn, a generative process represented as f(z1, zn, c1, cn; wi), perceptual distance function P( , ), CDF of Beta distribution F (α,β) B Output: An image sequence I Initialize the list of explored coefficients: w [0, 1] Initialize image sequence I = [f(z1, zn, c1, cn; 0), f(z1, zn, c1, cn; 1)] Initialize the list of distance of each neighbouring pair: d [P(f(z1, zn, c1, cn; 0), f(z1, zn, c1, cn; 1))] Initialize the hyperparameter: α 1 and β 1, iteration number i 0 for i < n do k = argmax(d) Search for the current largest distance and get its index Select coefficient uniformly separate the distance under Beta prior w F (α,β) B 1(F (α,β) B (wk) + F (α,β) B (wk+1)/2) Update exploration state Remove dk from d d.insert(k, P(f(z1, zn, c1, cn; wk), f(z1, zn, c1, cn; wprime))) d.insert(k + 1, P(f(z1, zn, c1, cn; w f(z1, zn, c1, cn; wk+1))) w.insert(k, w ) I.insert((k, f(z1, zn, c1, cn; w )) Update Beta prior Get target points: ˆw d/d.sum(), ˆw accumulate( ˆw) Curve fit: α, β argmaxα,βMLE(F (α,β) B , w, ˆw) i+ = 1 end for return I requires re-running the image generation process. To address these issues, we introduce a Beta-based dynamic selection method to efficiently select satisfactory interpolation coefficients. This selection procedure is divided into two stages as shown in Alg. 1 and Alg. 2. In the first stage, we explore different coefficients based on a Beta prior and observations of perceptual distances. In the second stage, we search for a smooth image interpolation sequence from the images generated with the explored coefficients. Below, we refer to the exploration size as n, and the size of the interpolation sequence as m. Exploration. During the exploration procedure, we maintain the following: 1) the currently explored coefficients w; 2) the hyperparameters of the Beta distribution α and β; 3) the list of perceptual distances d of each neighboring image pair generated by the explored coefficients; and 4) the generated images I. In each iteration, we first select the neighboring image pair with the highest perceptual distance and explore a new coefficient located between the selected two coefficients according to the Beta distribution. We then generate a new image with the chosen coefficient and compute its perceptual distance with both images in the selected pair. After that, we update α and β based on the new observations. Specifically, we aim to adjust the coefficients so that their differences are proportional to the perceptual distances between neighboring images, which is our target. Using the currently explored coefficients and their corresponding target coefficients, we update α and β by fitting the cumulative distribution function. By repeating this process, we obtain a set of generated images to be used in the second stage. Search. In the second stage, we first compute the perceptual distance between each pair (not only neighboring pairs), represented as a weight matrix W. We reformulate the task as a directed graph, where each image represents a node Ii with i {1, 2, . . . , n}, and an edge Eij exists for any 1 i < j n. Our goal is to find a path starting from I1 to In with a fixed path length m, maximizing smoothness. To solve this problem efficiently, we use a heuristic indicator the difference between the maximum and minimum weights, i.e, the range of weight along the path which reflects smoothness. This Algorithm 2 Search smoothest sequence Input: Image sequence I, interpolation size m, perceptual distance P( , ), threshold ϵ Output: Smooth interpolation sequence I Initialize graph G = (V, E), where V I and Eij P(Ii, Ij), i < j Set binary search bounds: l 0, h max(E) min(E) while h l > ϵ do D (h + l)/2 Initialize DP with size (n, m), where DP1,1 ( , , [1]) Each item includes (max, min, path) for s = 1 to m 1 do Start dynamic programming for i = 1 to n 1 do Let (wmax, wmin, ˆI) DPi,s for j = i + 1 to n do if wmin < Eij < wmax then Update wmax max(wmax, Eij), wmin min(wmin, Eij) if wmax wmin < D and better path found then DPj,s+1 (wmax, wmin, ˆI + [j]) end if end if end for end for end for if DPn,m exists then h D, I DPn,m[3] else l D end if end while return I indicator is bounded by the difference between the maximum and minimum weights of the entire graph, allowing us to perform a binary search to find the lowest possible difference. Specifically, given a value of such a difference, we search for a path fulfilling the requirement with length m using dynamic programming. The algorithm is guaranteed to find the path with the minimal difference between the maximum and minimum weights. This is equivalent to finding an image interpolation sequence with the minimal difference between the maximum and minimum perceptual distances among all neighboring pairs. The computation complexity of the search algorithm is O(n2m log(c)), where c is the range of the perceptual distance. In practice, we choose the exploration size n = 1.5m, which can already achieve very smooth results and the overhead is neglible compared to the cost of inference with diffusion model. E Trade-off between Consistency and Fidelity via Warm-up Steps We observe that early steps in denoising are essential to determine the spatial layout of the generated image. Thus, we can trade off between the effect of interpolation and prompt guidance by setting the number of warm-up steps. After several warm-up steps, we transform the attention interpolation into a simple generation process. This design is based on the observation that early denoising steps of the generative model can determine the image content to a large extent as Fig. 12 shows. With only 5 initial steps (over a total of 25 denoising steps) using dog as guidance (the 6th image in Fig. 12, the image content is already fixed as dog , which means the influence of later denoising steps using car has very low influence to the image content generation. Therefore, we can utilize this characteristic of the diffusion model to constrain spatial layout with AID in the early stage of denoising and then transit to self-generation with the guided prompt to refine the details. Figure 12: Effect of early denoising steps. The images are generated using 25 denoising steps. For the ith image shown in the row from left to right, it is generated by using A photo of dog, best quality, extremely detailed in the first i 1 denoising steps, then generated by using A photo of car, best quality, extremely detailed for the rest denoising steps. Figure 13: Screenshot of the survey layout. The user is prompted to choose the best interpolation sequence with high smoothness, consistency, and fidelity. F Auxiliary Experiments Details Hardware Environments. All quantitative and qualitative experiments presented in this work are conducted on a single H100 GPU and Float16 precision. Perceptual Model Used in Evaluation Metrics. For consistency and smoothness, we follow conventional settings and choose VGG16 [41] to compute LPIPS [57]. For fidelity, we adapt the Google v3 Inception Model [44] following previous literature to compute FID between source images and interpolated images. Datasets. We introduce the details of CIFAR-10 and LAION-Aesthetics used for evaluating conditional interpolation here. CIFAR-10: The CIFAR-10 dataset [22] comprises 60,000 32x32 color images distributed across 10 classes. This dataset is commonly used to benchmark classification algorithms. In our context, we utilize the class names as prompts to generate images corresponding to specific categories. The CIFAR-10 corpus aids in assessing the effectiveness of our framework, PAID, in handling brief prompts that describe clear-cut concepts. LAION-Aesthetics: We sample the LAION-Aesthetics dataset from the larger LAION5B collection [39] with aesthetics score over 6, curated for its high visual quality. Unlike CIFAR-10, this dataset provides extensive ground truth captions for images, encompassing lengthy and less direct descriptions. These characteristics present more complex challenges for text-based analysis. We employ the dataset to test our framework s interpolation capabilities in more demanding scenarios. Selection Configuration. In terms of Bayesian optimization on α and β in the beta prior to applying our selection approach, we set the smoothness of the interpolation sequence as the objective target, [1, 15] as the range of both hyperparameters, 9 fixed exploration where α and β are chosen from {10, 12, 14}, and 15 iterations to optimize. Denoising Interpolation. Denoising interpolation interpolates the images along the schedule. Specifically, given prompt A and prompt B and the number of denoising steps N, for an interpolation coefficient t we guide the generation with prompt A for the first t N steps and guide with prompt B for the rest of steps. Human Evaluation Details. To minimize bias towards a particular style, we included an equal number of photorealistic and artistic prompts for each category. We conducted 320 trials in total. In each trial, an independent rater from Amazon Mechanical Turk evaluated the results and chose the best one among AID-I, AID-O, and text embedding interpolation (TEI). We show the layout of the human study survey in Fig. 13. For near object, the prompt is sampled from: {[ a dog , a cat ], [ a jeep , a sports car ], [ a lion , a tiger ], [ a boy with blone hair , a boy with black hair ]}; Figure 14: Our method combined with the inversion method [48] or IP-Adapter [54] can be further applied to several downstream tasks including image editing, image-control generation and image morphing. For far object, the prompt is sampled from: {[ an astronaut , a horse ], [ a girl , a ballon ], [ a dragon , a banana ], [ a computer , a ship ], [ a deer , an airplane ]}; For scene, the prompt is sampled from: {[ sunset , moonlit night ], [ moonlit night , forest ], [ forest , lake ], [ lake , sunset ]}; For scene and object, the prompt is sampled from: {[ a robot , sea of flowers ], [ a deer , urban street ], [ sea of flowers , a deer ], [ urban street , a robot ]}. G Details of Applications In this section, we introduce to adapt our methods for four applications including composition generation (interpolation between text conditions), image editing (interpolation from image condition to multi-modal condition), image morphing (interpolation between image conditions) and imageconditioned generation (interpolation from text condition to multi-modal condition), as Fig. 14 shows, where the content in orange box represents the input, and the content in blue box represents the output. We combine our method with IP-Adapter [54] for the application of image-control generation and image morphing. G.1 Composition Generation: Text to Text CEBM [25] interprets diffusion models as energy-based models in which the data distributions defined by the energy functions can be combined, and generate compositional images by considering the generation from each condition separately and combining them at each denoising step. RRR [7] concludes that the sampler (not the model) is responsible for the failure in compositional generation and proposes new samplers, inspired by MCMC, which enables successful compositional generation, with an energy-based parameterization of diffusion models which enables Metropoliscorrected samplers. Datasets. We use the same dataset for human evaluation introduced in Sec. F. G.2 Image Editing Control: Image to {Text + Image} P2P [11]. controls the prompt-to-prompt editing, i.e., editing on synthesized images while keeping spatial layout by borrowing the cross-attention map, i.e., query and key, from the generation of the edited image. P2P enables editing the focus content while keeping the spatial layout the same for synthesized images. (a) (b) Figure 15: Results of image morphing. We compare our method (first row) with IMPUS [53] (second row) and the method by Wang et al. [49] (third row). Our approach achieves comparable or superior performance to IMPUS, but with only 1/100th of the time cost. P2P + AID. For a given source prompt generating source images, we view another generation trajectory of edited images as a whole and apply AID on the two-generation trajectory. Specifically, with P2P, the interpolation of AID between cross-attention only happens at the value vector while other components remain the same as the original method. EDICT [48]. re-conceptualizes the denoising process through a series of coupled transformation layers, with each inversion process mirrored as such transformations. We denote the comprehensive process in EDICT of generating image I from latent z under prompt C as Ef(z, C), and its inverse as z = Ei(I, C). AID is applied within these coupled layers during the denoising phase. We explore two applications: editing control and video frame interpolation. EDICT + AID. For a given image I1 with source prompt C1 and target prompt Ct, we first derive its latent representation z1 = Ei(I1, C1) by EDICT. To interpolate m images between C1 and Ct, we replicate z1 across z1:m and employ AID for sequence generation. Dataset. We follow the same dataset presented in [48] for quantitative evaluation. For synthesized images, each data is presented as a source prompt and an editing prompt. For real images, each data is presented in a source image and editing prompt. Specifically, images of five classes African Elephant, Ram, Egyptian Cat, Brown Bear, and Norfolk Terrier from Image Net [4] are taken and then we conduct four types of experiments: one involves editing a photo of {animal 1} to a photo of {animal 2} (resulting in 20 species editing pairs in total); two involve contextual changes ( a photo of {animal} in the snow and a photo of {animal} in a parking lot ); and one involves a stylistic change ( an impressionistic painting of the {animal} ). When this is applied to synthesized images, we use a photo of the {animal} as the source prompt. G.3 Image Morphing: Image to Image Image morphing involves smoothly transitioning from one image to another by blending and aligning key features. Traditional approaches often require fine-tuning pretrained text-to-image diffusion models on individual samples [53, 55], which can be computationally intensive and time-consuming. In contrast, our method provides a training-free solution, allowing seamless image transitions without the need for fine-tuning. We compare our approach with [51, 53]. AID for Image Morphing. We build on IP-Adapter [54], which adapts text-to-image diffusion models to accommodate multi-modal conditions, including image and text inputs. IP-Adapter manages image prompts through cross-attention layers, enabling our method to naturally extend to image morphing without additional training. For each morphing task, the provided image serves as the prompt in IP-Adapter, with a null text input. Unlike approaches that rely on model fine-tuning [55, 53], our method operates entirely training-free, making it a more efficient alternative while delivering high-quality results. Preliminary Results. As shown in the first row of Fig. 15, our method produces smooth, consistent transitions for real-world images. In comparison to the previous training-free approach by [49] (third row in Fig. 15), our method achieves improved fidelity in the interpolated images. Furthermore, compared to IMPUS [53] (second row in Fig. 15), which requires fine-tuning Stable Diffusion with Lo RA [14] taking approximately one hour per sample on a single A100 GPU our approach (a) "A statue is reading a book" (b) "A dog is playing with a ball" Figure 16: Results of image-conditioned generation. IP-Adapter (second row) has difficulty properly scaling the influence of the additional image condition (see the last column in (a) and (b)). Our method (first row) achieves smoother control and greater subject consistency, particularly evident in the statue s hair in (a). is training-free, generating the entire interpolation sequence in about six minutes, achieving competitive performance with significantly lower computational cost. G.4 Image-Conditioned Generation: Text to {Text + Image} Image-conditioned generation has emerged as an approach for guiding text-to-image models using supplementary control signals that are challenging to express through text alone, such as layout, subject, and style. Existing methods, including Control Net [56] and IP-Adapter [54], often struggle to balance these additional conditions effectively, particularly when scaling their influence. Our method addresses these limitations, specifically improving upon IP-Adapter, which frequently fails to maintain a balance between the image and text inputs when both are used as conditions. AID for Image-Conditioned Generation. Our approach utilizes the IP-Adapter integrated with the AID framework, similarly to its use in image morphing. For image-conditioned generation, however, we begin with a null image prompt alongside a text prompt, and at the interpolation endpoint, we incorporate both the image and text prompts. Preliminary Results. Fig. 16 compares our method (first row) with IP-Adapter (second row). The leftmost images are generated without the additional image condition, while the rightmost images show the maximum influence of the image condition. IP-Adapter fails to maintain subject consistency, as shown by the statue s inconsistent hair in (a), and struggles to scale the image condition effectively, especially in (b). In contrast, our method offers more consistent and smoother control over the subject, ensuring a better balance between image and text conditions. H Auxiliary Qualitative Results We show more qualitative results here using prompt guidance with inner attention interpolation. In this section, the results are obtained with Stable Diffusion 1.5 [35] and Uni PCMultistep Scheduler [58]. To enhance the visual ability, we use the negative prompt monochrome, lowres, bad anatomy, worst quality, low quality . To trade-off between perceptual consistency and effectiveness of prompt guidance, we use the first 10 denoising steps over 50 total denoising steps of Uni for warming up. As Fig. 17 and Fig. 18 show, our methods can generate image interpolation on different concepts and paintings. We provide more examples in Fig. 19. And we provide more results obtained by SDXL [30] and Animagine 3.0 [23] in Fig. 20. I Distinction with Concurrent Works on Image Morphing There are two concurrent works [55, 53] that also focus on deep interpolation but the objective is different where their objective is on real-world image morphing where the main challenge is to make the interpolation between real images is as good as the interpolation between generated images. On the contrary, we focus on improving the quality of generative interpolation, which can be further used in their framework. IMPUS [53] specializes in generating image morphing through uniform perceptual sampling. The process begins with applying textual inversion to derive text embeddings, followed by fine-tuning the model with Lo RA [14] based on specific image content. The generation of image sequences is executed sequentially, ensuring the images are uniformly distributed. Diff Morpher [27] initiates its process by training with Lo RA, utilizing both prompts and source images. The method extends beyond simple interpolation of text embedding and latent space by also interpolating within Lo RA parameters. They also explore attention interpolation, specifically within the realm of inner attention. They observe that attention interpolation across all denoising steps can introduce artifacts, which makes them adopt it with interpolating with other multiple components. On the contrary, we find that combining outer attention interpolation with self-attention fusing can significantly address this problem, and the performance is boosted without any fine-tuning, which emphasizes the difference. IMPUS and Diff Morpher lack control over the specific interpolation path due to their reliance on interpolated text embeddings. Conversely, our method can plug in to allow precise control over the interpolation path. Furthermore, IMPUS and Diff Morpher necessitate fine-tuning during the testing phase to achieve optimal performance to tackle the challenges from real images, requiring thousands of iterations to optimize Lo RA or text embeddings for each interpolation sequence. Our method is more efficient for downstream tasks such as editing and video frame interpolation in a training-free manner. J Limitation and Social Impact Limitation. Our method is post-hoc performed on a text-to-image diffusion model and the results are dependent on the ability of the base model. Social Impact. Our method offers control over training-free image editing methods which initially have nearly no such ability. This is impactful to the practical usage of the text-to-image diffusion model. However, our method also increases the compositional generation ability of the text-to-image model, which may make deepfake harder to detect. Figure 17: Qualitative results of interpolation between animal concepts. For an animal, we use A photo of {animal_name}, high quality, extremely detailed to generate the corresponding source images. The guidance prompt is formulated as A photo of an animal called {animal_name_A}-{animal_name_B}, high quality, extremely detailed . PAID enables a strong ability to create compositional objects. Figure 18: Qualitative results of interpolation between different paintings. For a painting, we use A painting of painting_name, high quality, extremely detailed to generate the source images. The guided prompt is generated by GPT-4 [28] given description of source images, e.g., the guided prompt for the second row is A painting of Mona Lisa under Starry Night, high quality, extremely detailed . Figure 19: More qualitative results generated by SD 1.5. Figure 20: More qualitative results generated by Animagine 3.0 [23] (the 1st row) and SDXL (from 2nd to 9th rows). Neur IPS Paper Checklist The checklist is designed to encourage best practices for responsible machine learning research, addressing issues of reproducibility, transparency, research ethics, and societal impact. Do not remove the checklist: The papers not including the checklist will be desk rejected. The checklist should follow the references and follow the (optional) supplemental material. The checklist does NOT count towards the page limit. Please read the checklist guidelines carefully for information on how to answer these questions. For each question in the checklist: You should answer [Yes] , [No] , or [NA] . [NA] means either that the question is Not Applicable for that particular paper or the relevant information is Not Available. Please provide a short (1 2 sentence) justification right after your answer (even for NA). The checklist answers are an integral part of your paper submission. They are visible to the reviewers, area chairs, senior area chairs, and ethics reviewers. You will be asked to also include it (after eventual revisions) with the final version of your paper, and its final version will be published with the paper. The reviewers of your paper will be asked to use the checklist as one of the factors in their evaluation. While "[Yes] " is generally preferable to "[No] ", it is perfectly acceptable to answer "[No] " provided a proper justification is given (e.g., "error bars are not reported because it would be too computationally expensive" or "we were unable to find the license for the dataset we used"). In general, answering "[No] " or "[NA] " is not grounds for rejection. While the questions are phrased in a binary way, we acknowledge that the true answer is often more nuanced, so please just use your best judgment and write a justification to elaborate. All supporting evidence can appear either in the main paper or the supplemental material, provided in appendix. If you answer [Yes] to a question, in the justification please point to the section(s) where related material for the question can be found. IMPORTANT, please: Delete this instruction block, but keep the section heading Neur IPS paper checklist", Keep the checklist subsection headings, questions/answers and guidelines below. Do not modify the questions and only use the provided macros for your answers. Question: Do the main claims made in the abstract and introduction accurately reflect the paper s contributions and scope? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the abstract and introduction do not include the claims made in the paper. The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers. The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings. It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper. 2. Limitations Question: Does the paper discuss the limitations of the work performed by the authors? Answer: [Yes] Justification: We discuss the limitation in the Appendix. Guidelines: The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper. The authors are encouraged to create a separate "Limitations" section in their paper. The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be. The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated. The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon. The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size. If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness. While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations. 3. Theory Assumptions and Proofs Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof? Answer: [NA] Justification: [NA] Guidelines: The answer NA means that the paper does not include theoretical results. All the theorems, formulas, and proofs in the paper should be numbered and crossreferenced. All assumptions should be clearly stated or referenced in the statement of any theorems. The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition. Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material. Theorems and Lemmas that the proof relies upon should be properly referenced. 4. Experimental Result Reproducibility Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)? Answer: [Yes] Justification: We provide the full experiments setting only relying on open-source data and models in the Appendix. Guidelines: The answer NA means that the paper does not include experiments. If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not. If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable. Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed. While Neur IPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example (a) If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm. (b) If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully. (c) If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset). (d) We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results. 5. Open access to data and code Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material? Answer: [Yes] Justification: We provide detailed experiment details in Sec. 5.1 and Appendix. Guidelines: The answer NA means that paper does not include experiments requiring code. Please see the Neur IPS code and data submission guidelines (https://nips.cc/ public/guides/Code Submission Policy) for more details. While we encourage the release of code and data, we understand that this might not be possible, so No is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark). The instructions should contain the exact command and environment needed to run to reproduce the results. See the Neur IPS code and data submission guidelines (https: //nips.cc/public/guides/Code Submission Policy) for more details. The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc. The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why. At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable). Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted. 6. Experimental Setting/Details Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results? Answer: [Yes] Justification: We provide the full settings in Sec. 5.3 and the Appendix for hyper-parameter selection and inference details. Guidelines: The answer NA means that the paper does not include experiments. The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them. The full details can be provided either with the code, in appendix, or as supplemental material. 7. Experiment Statistical Significance Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments? Answer: [No] Justification: [NA] Guidelines: The answer NA means that the paper does not include experiments. The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper. The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions). The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.) The assumptions made should be given (e.g., Normally distributed errors). It should be clear whether the error bar is the standard deviation or the standard error of the mean. It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified. For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates). If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text. 8. Experiments Compute Resources Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments? Answer: [Yes] Justification: We provide the compute resource in the Appendix. Guidelines: The answer NA means that the paper does not include experiments. The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage. The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute. The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn t make it into the paper). 9. Code Of Ethics Question: Does the research conducted in the paper conform, in every respect, with the Neur IPS Code of Ethics https://neurips.cc/public/Ethics Guidelines? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the authors have not reviewed the Neur IPS Code of Ethics. If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics. The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction). 10. Broader Impacts Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed? Answer: [Yes] Justification: We discuss the impacts in the Appendix. Guidelines: The answer NA means that there is no societal impact of the work performed. If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact. Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations. The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster. The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology. If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML). 11. Safeguards Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)? Answer: [NA] Justification: [NA] Guidelines: The answer NA means that the paper poses no such risks. Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters. Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images. We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort. 12. Licenses for existing assets Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the paper does not use existing assets. The authors should cite the original paper that produced the code package or dataset. The authors should state which version of the asset is used and, if possible, include a URL. The name of the license (e.g., CC-BY 4.0) should be included for each asset. For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided. If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset. For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided. If this information is not available online, the authors are encouraged to reach out to the asset s creators. 13. New Assets Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets? Answer: [NA] Justification: [NA] Guidelines: The answer NA means that the paper does not release new assets. Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc. The paper should discuss whether and how consent was obtained from people whose asset is used. At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file. 14. Crowdsourcing and Research with Human Subjects Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper. According to the Neur IPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector. 15. Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained? Answer: [Yes] Justification: [NA] Guidelines: The answer NA means that the paper does not involve crowdsourcing nor research with human subjects. Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper. We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the Neur IPS Code of Ethics and the guidelines for their institution. For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.