Professional Documents
Culture Documents
net/publication/316184748
CITATIONS READS
70 559
4 authors:
11 PUBLICATIONS 555 CITATIONS
University of Maryland, College Park
34 PUBLICATIONS 1,309 CITATIONS
SEE PROFILE
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Bharat Singh on 09 December 2017.
Abstract
1
ICCV
#2709
ICCV 2017 Submission #2709. CONFIDENTIAL REVIEW CO
108
overlap
Inputinstead
:B= of {b
setting the score to zero as in NMS. Intu- This Soft-NM
1 , .., bN }, S = {s1 , .., sN }, Nt
Input : B = {b1 , .., bN }, S = {s1 , .., sN }, Nt 109 itively, if a bounding NMS leads to
110 B is the list ofhas
box a very
initial high overlap
detection boxes with M,
B is the list of initial detection boxes it should be assigned a very low score, detection
while if itscores
has a low measured ov
S contains corresponding
S contains corresponding detection scores111 overlap, it can object detecto
112 Ntmaintain
is the NMS its threshold
original detection score. This
Nt is the NMS threshold Soft-NMS MS-COCO.
113 begin algorithm is shown in Figure 2. Soft-NMS leads
begin to noticeable
D improvements in average precision measured
{} training and
114
D {} over multiple
while B overlap
6= empty thresholds
do for state-of-the-object de- grated in the
115
while B 6= empty do tectors on standard
m datasets
argmax S like PASCAL VOC and MS-
116
m argmax S COCO. Since MSoft-NMS
bm does not require any extra-training 2. Related
117 S
M bm
S and is simple D to implement,
D M; Bit can B be Measily integrated in the
118 NMS has
D D M; B B M object detection
for bipipeline.
in B do
119 rithms in com
for bi in B do 120 employed in
121 2. Related Work
if iou(M, bi ) Nt then it has been a
if iou(M, bi ) Nt then 122 B B bi ; S S si tection [18, 1
B B bi ; S S si NMS has been endan integral part of many detection NMS algo-
123 [3, 7, 9]. In
end rithms in computer vision for almost 50 years. It was first
NMS 124 to remove sp
employed in edge si detection
si f (iou(M, techniquesbi )) [25]. Subsequently,
125
Soft-NMS detectors [11
si si f (iou(M, bi )) it has been applied to multiple tasks like feature point de-
126 olding to obt
Soft-NMS tection [19, end 12, 20], face detection [29] and object detection
127 tection [27],
[4, 8, 10]. In edge detection, NMS performs edge thinning
end 128 end boxes into di
to remove spurious responses [25, 1, 31]. In feature point
end 129 return D, S final detectio
detectors
end [12], NMS is effective in performing local thresh-
return D, S 130 of the detecti
olding to obtain unique feature point detections. In face de-
end 131 Algorithm
Figure 1: The pseudo
2. The pseudo in redcode in redwith is replaced and Triggs [3
tection [29], NMS iscode performed is replaced
by partitioning the one in green
bounding-
Algorithm 1: The pseudo code in red is replaced 132 inwith the oneWeinpropose
Soft-NMS. green in Soft-NMS.
to revise We propose
the detection scores by to scaling where a boun
Figure 2. The pseudo code in red is replaced with the one in green boxes into disjoint subsets using an overlap criterion. The is selected a
133 them
reviseas athe linear or Gaussian
detection scores function
by scaling of overlap.
them as a lin-
inwith the one
Soft-NMS. Weinpropose
green toinrevise
Soft-NMS. We propose
the detection scores by to
scaling final detections are obtained by averaging the co-ordinates ing a pre-defi
revise
them as athe detection
linear scores
or Gaussian by scaling
function them as a lin- 134
of overlap.
ear or Gaussian function of overlap.
of the detection boxes in the set. For human detection, Dalal
135 over the appr
ear or Gaussian function of overlap. and
overlap Triggs [4] demonstrated
instead of setting thethat score a greedy
to zeroNMS as in NMS.algorithm,Intu-
136 greedy NMS
137
where
itively,aifbounding
a bounding boxbox with hasthea very
maximum detection
high overlap score
with M, detection [7,
[16, 24]. Another parallel regression sub-network refines detectors,
is selectednon-maximum
it should beandassigned a verysuppression
its neighboring low boxes
score, is used
are
while toifobtain
it has the
suppressed a us-
low
138 It is surp
the position of these proposals. This refinement process im- final
ing asetpre-defined
overlap, ofitdetections as it significantly
overlap
can maintain threshold
its originalimproves reduces performance
detection the number
score. This
the position of these proposals. This refinement process 139 im- pipeline has
proves localization for objects, but also leads to cluttered of false
over positives.
Soft-NMS algorithm is shown in Figure 2. Soft-NMSthen,
the approach used for face detection [29]. Since leads
proves localization for objects, but also leads to cluttered 140 Greedy NMS
detections as multiple proposals often get regressed to the greedy NMS has
to Non-maximum
significant been the de-facto
suppression
improvements instarts algorithm
average a listused
with precision in object
of detection
measured
detections as multiple proposals often get regressed to 141 the erage precisi
same region of interest (RoI). Hence, even in state-of-the-art detection
boxes [8,
B with scores
over multiple 10, 24,
overlap 16]. After selecting
S.thresholds the detection withde-
for state-of-the-object
same region of interest (RoI). Hence, even in state-of-the-art 142 therefore em
detectors, non-maximum suppression is used to obtain the the It
tectors is on
maximum surprising
score that
popular M,
datasetsitthis component
removes
like it fromofthe
PASCAL thesetdetection
VOC B and
and MS- few learning
detectors, non-maximum suppression is used to obtain 143 the
final set of detections as it significantly reduces the number pipeline
appends has
it to remained
the set of untouched
final detections
COCO. Since Soft-NMS does not require any extra-training for more
D. It than
also a decade.
removes ternative to g
final set of detections as it significantly reduces the number 144
of false positives. any
of false positives. 145 andbox
Greedy which
NMS to
is simple has
still an overlap
obtains
implement, theit greater than aintegrated
bestbeperformance
can easily threshold
whenin Nav-
tthe for object cla
Non-maximum suppression starts with a list of detection 146 with
erage M in
precisionthe
object detection pipeline.set(AP)
B. This
is used process
as an is repeated
evaluation for
metric remain-
and is computes ov
Non-maximum
boxes B with scores suppression
S. After starts withthe
selecting a list of detection
detection with ing boxes employed
therefore B. A major issue with non-maximum
in state-of-the-art detectors [24, suppres-
16]. A
147 then perform
boxes B with scores
the maximum score S. M,After selecting
it removes the detection
it from the set B with and sion
few is that it sets
learning-based the score have
methods for neighboring
been proposed detections to
as an alter-
the maximum score it removes it from
148 2. Related Work emplars for e
appends it to the set M,
of final detections D. Itthe
alsosetremoves
B and
149 zero.
nativeThus, if an object
to greedy NMS was which actually
obtainpresent in that overlap
good performance for boxes. Howe
appends
any boxitwhichto thehas set an
of overlap
final detections D. Ita also
greater than removes
threshold Nt NMS
threshold,
object classhas been be
it would
detection anmissed
integral
[5, 26,and part
21].thisof
For many
would detection
lead
example, to[26] algo-
a drop
first
150 lem, where o
any
withboxMwhich
in the has an overlap
set B. This process greater than a threshold
is repeated for remain-N in average
rithms
computes precision.
in computer
overlap However,
vision
between ifpair
for almost
each weoflower the detection
50detection
years. Itboxes.
was firstIt
151t multaneously
with M in the set B. This process is
ing boxes B. A major issue with non-maximum suppres- repeated for remain-
152 scores
employed
then as a in
performs function
edge of propagation
its overlap
detection
affinity techniques with [22].it Subsequently,
clustering
M, would
to selectstill
ex- erage precisi
ing
sionboxes
is thatB.it Asetsmajor issue with
the score non-maximum
for neighboring suppres-
detections to
153 be
it in
hasthe
emplars beenranked
for list,
applied
each although
to multiple
cluster which with a lower
tasks
represent confidence.
likethefeature point
final detection Wede- ject instances
sion
zero.isThus,
that itif sets the score
an object for neighboring
was actually present indetections
that overlap to
154 show
tection
boxes. anA illustration
[18, 11, 19],offace
multi-class the detection
version problem
of thisinalgorithm
Figand
[27] 1. object detection
is proposed in performs fav
zero. Thus,itifwould
threshold, an object was actually
be missed and thispresent
wouldinleadthattooverlap
a drop
155 [3,Using
[21]. 7,However,
9].this In intuition,
edge
object detection,
class
we propose NMSaperforms
detection is a different
single line edge thinning
problem,
modifica- detection me
threshold,
in averageit precision.
would be missedHowever, andifthis
wewould
lower lead to a drop
the detection 156 to remove
where
tion object
to the spurious
instances
traditional responses
of all NMS
greedy [22,algorithm
classes 1,are29]. Ininfeature
evaluated which point
simulta-
we In another
inscores
average as aprecision.
function of However,
its overlapif we
withlower
M, the detection
it would still
157 neously
detectorsper
decrease image.
[11],
the NMS
detection Hence,
isscores weasneed
effective an to select a threshold
in increasing
performing local thresh-
function for
of proposal sub
scores
be in theas ranked
a function list, of its overlap
although with awith
lower it would still
M,confidence. We
158 all
overlap
oldingclassesinstead
to and of
obtain generate athe
settingfeature
unique fixedscore settoofzero
point boxes.as inSince
detections. NMS. differ-
In face In-de- as an alternat
be in the
show an ranked list, of
illustration although
the problemwith ainlower
Fig 1.confidence. 159 We tuitively,
ent thresholds
tection if a bounding
[27], may be
NMS box hasfor
suitable
is performed a byvery
differenthighapplications,
partitioning overlap within
bounding- subset optimi
show an illustration
Using this intuition,of the weproblem
proposeina Fig 1. line modifica-
single 160 it should
generic
boxes
M, object
into bedetection,
disjoint assigned
subsets a very
usinglow
average an score,
precision
overlap iswhile
computedif it has
criterion. us-
The tions of detec
tion to the
Using thistraditional
intuition,greedy
we proposeNMS aalgorithm
single linein which
modifica-we
161 aing
low a overlap,
ranked it
list can
of allmaintain
object its original
instances
final detections are obtained by averaging the co-ordinates in detection
a particular score.
class. algorithm is e
decrease the detection scores as an increasing
tion to the traditional greedy NMS algorithm in which we function of Therefore,
of the detection greedy NMS
boxes inperforms
the set. For favourably to these algo-
human detection, Dalal
decrease the detection scores as an increasing function of and Triggs [3] demonstrated that a greedy NMS algorithm,2
into two branches at a layer L — one branch generates re-
gion proposals while the other performs classification and
regression by pooling convolutional features inside RoIs
generated by the proposal network. The proposal network
generates classification scores and regression offsets for an-
chor boxes of multiple scales and aspect ratios placed at
each pixel in the convolutional feature map [24]. It then
ranks these anchor boxes and selects the top K (≈ 6000)
NMS anchors to which the bounding box regression offsets are
added to obtain image level co-ordinates for each anchor.
Greedy non-maximum suppression is applied to top K an-
chors which eventually generates region proposals 1 .
The classification network generates classification and
regression scores for each proposal generated by the pro-
posal network. Since there is no constraint in the network
Figure 3. In object detection, first category independent region which forces it to generate a unique RoI for an object, mul-
proposals are generated. These region proposals are then assigned tiple proposals may correspond to the same object. Hence,
a score for each class label using a classification network and their other than the first correct bounding-box, all other boxes on
positions are updated slightly using a regression network. Finally, the same object would generate false positives. To alleviate
non-maximum-suppression is applied to obtain detections. this problem, non-maximum-suppression is performed on
detection boxes of each class independently, with a spec-
ified overlap threshold. Since the number of detections is
rithms on generic object detection metrics.
typically small and can be further reduced by pruning de-
In another line of work, for detecting salient objects, a tections which fall below a very small threshold, applying
proposal subset optimization algorithm was proposed [30] non-maximum suppression at this stage is not computation-
as an alternative to greedy NMS. It performs a MAP-based ally expensive. We present an alternative approach to this
subset optimization to jointly optimize the number and loca- non-maximum suppression algorithm in the object detec-
tions of detection windows. In salient object detection, the tion pipeline. An overview of the object detection pipeline
algorithm is expected to only find salient objects and not all is shown in Fig 3.
objects. So, this problem is also different from generic ob-
ject detection and again greedy NMS performs favourably
when performance on object detection metrics is measured.
4. Soft-NMS
For special cases like pedestrian detection, a quadratic un- Current detection evaluation criteria emphasise precise
constrained binary optimization (QUBO) solution was pro- localization and measure average precision of detection
posed which uses detection scores as a unary potential and boxes at multiple overlap thresholds (ranging from 0.5 to
overlap between detections as a pairwise potential to ob- 0.95). Therefore, applying NMS with a low threshold like
tain the optimal subset of detection boxes [27]. Like greedy 0.3 could lead to a drop in average precision when the over-
NMS, QUBO also applies a hard threshold to suppress de- lap criterion during evaluation for a true positive is 0.7 (we
tection boxes, which is different from Soft-NMS. In an- refer to the detection evaluation threshold as Ot from here
other learning-based framework for pedestrian detection, a on). This is because, there could be a detection box bi
determinantal point process was combined with individu- which is very close to an object (within 0.7 overlap), but
alness prediction scores to optimally select final detections had a slightly lower score than M (M did not cover the
[15]. To the best of our knowledge, for generic object de- object), thus bi gets suppressed by a low Nt . The likeli-
tection, greedy NMS is still the strongest baseline on chal- hood of such a case would increase as the overlap threshold
lenging object detection datasets like PASCAL VOC and criterion is increased. Therefore, suppressing all nearby de-
MS-COCO. tection boxes with a low Nt would increase the miss-rate.
Also, using a high Nt like 0.7 would increase false posi-
3. Background tives when Ot is lower and would hence drop precision av-
eraged over multiple thresholds. The increase in false pos-
We briefly describe the object-detection pipeline used in itives would be much higher than the increase in true posi-
state-of-the-art object detectors in this section. During in- tives for this case because the number of objects is typically
ference, an object detection network performs a sequence
of convolution operations on an image using a deep con- 1 We do not replace this non-maximum suppression in the object detec-
Method AP AP@0.5 areo bike bird boat bottle bus car cat chair cow table dog horse mbike person plant sheep sofa train tv
[24]+NMS 37.7 70.0 37.8 44.6 34.7 24.4 23.4 50.6 50.1 45.1 25.1 42.6 36.5 40.7 46.8 39.8 38.2 17.0 37.8 36.4 43.7 38.9
[24]+S-NMS G 39.4 71.2 40.2 46.6 36.7 25.9 24.9 51.9 51.6 48.0 25.3 44.5 37.3 42.6 49.0 42.2 41.6 17.7 39.2 39.3 45.9 37.5
[24]+S-NMS L 39.4 71.2 40.3 46.6 36.3 27.0 24.2 51.2 52.0 47.2 25.3 44.6 37.2 45.1 48.3 42.3 42.3 18.0 39.4 37.1 45.0 38.7
[16]+NMS 49.8 79.4 52.8 54.4 47.1 37.6 38.1 63.4 59.4 62.0 35.3 56.0 38.9 59.0 54.5 50.5 47.6 24.8 53.3 52.2 57.4 52.7
[16]+S-NMS G 51.4 80.0 53.8 56.0 48.3 39.9 39.4 64.7 61.3 64.7 36.3 57.0 40.2 60.6 55.5 52.1 50.7 26.5 53.8 53.5 59.3 53.8
[16]+S-NMS L 51.5 80.0 53.2 55.8 48.9 40.0 39.6 64.6 61.5 65.0 36.3 56.5 40.2 61.3 55.6 52.9 50.3 26.2 54.3 53.6 59.5 53.9
Table 2. Results on Pascal VOC 2007 test set for off-the-shelf standard object detectors which use NMS as baseline and our proposed
Soft-NMS method. Note that COCO-style evaluation is used.
0.30
6.3. When does Soft-NMS work better?
0.28
Localization Performance Average precision alone
does not explain us clearly when Soft-NMS obtains sig-
0.26
nificant gains in performance. Hence, we present average
0.24 precision of NMS and Soft-NMS when measured at differ-
0.22 ent overlap thresholds. We also vary the NMS and Soft-
NMS hyper-parameters to understand the characteristics of
0.20
0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 both these algorithms. From Table 3, we can infer that av-
Nt or σ erage precision decreases as NMS threshold is increased.
Figure 4. R-FCN Sensitivity to hyper parameters σ (Soft-NMS) Although it is the case that for a large Ot , a high Nt obtains
and Nt (NMS) slightly better performance compared to a lower Nt — AP
does not drop significantly when a lower Nt is used. On
the other hand, using a high Nt leads to significant drop in
based detectors have higher recall and hence Soft-NMS has
AP at lower Ot and hence when AP is averaged at multiple
more potential to improve recall at higher Ot .
thresholds, we observe a performance drop. Therefore, a
From here on, in all experiments, when we refer to Soft-
better performance using a higher Nt does not generalize to
NMS, it uses the Gaussian weighting function. In Fig 6,
lower values of Ot for traditional NMS.
we also show per-class improvement on MS-COCO. It is
However, when we vary σ for Soft-NMS, we observe
interesting to observe that Soft-NMS when applied on R-
a different characteristic. Table 3 shows that even when
FCN improves maximum performance for animals which
we obtain better performance at higher Ot , performance at
are found in a herd like zebra, giraffe, sheep, elephant, horse
lower Ot does not drop. Further, we observe that Soft-NMS
by 3-6%, while there is little gain for objects like toaster,
performs significantly better (∼2%) than traditional NMS
sports ball, hair drier which are less likely to co-occur in
irrespective of the value of the selected Nt at higher Ot .
the same image.
Also, the best AP for any hyper-parameter (Nt or σ) for a
selected Ot is always better for Soft-NMS. This compari-
6.2. Sensitivity Analysis
son makes it very clear that across all parameter settings,
Soft-NMS has a σ parameter and traditional NMS has the best σ parameter for Soft-NMS performs better than
an overlap threshold parameter Nt . We vary these param- a hard threshold Nt selected in traditional NMS. Further,
eters and measure average precision on the minival set of when performance across all thresholds is averaged, since a
MS-COCO set for each detector, see Fig 4. Note that AP is single parameter setting in Soft-NMS works well at multi-
stable between 0.3 to 0.6 and drops significantly outside this ple values of Ot , overall performance gain is amplified. As
range for both detectors. The variation in AP in this range is expected, low values of σ perform better at lower Ot and
around 0.25% for traditional NMS. Soft-NMS obtains bet- higher values of sigma perform better at higher Ot . Unlike
ter performance than NMS from a range between 0.1 to 0.7. NMS, where higher values of Nt lead to very little improve-
Its performance is stable from 0.4 to 0.7 and better by ∼1% ment in AP, higher values of σ lead to significant improve-
for each detector even on the best NMS threshold selected ment in AP at a higher Ot . Therefore, a larger σ can be used
100
Precision vs Recall at O = 0.6
t
Precision vs Recall at O = 0.7
90
t
Precision vs Recall at O = 0.8
70
t
80
NMS 80 NMS 60 NMS
Soft-NMS 70
60 Soft-NMS 50 Soft-NMS
Precision
Precision
Precision
60 50 40
40 40 30
30 20
20 20
10 10
010 20 30 40 50 60 70 80 90 010 20 30 40 50 60 70 80 90 010 20 30 40 50 60 70 80 90
Recall Recall Recall
Figure 5. R-FCN : Precision vs Recall at multiple overlap thresholds Ot
1 2 3
5
4
6
9
8
10
11 12
13
15 16 17
18
14
21
19 20
20
24
23
25 26
22
Figure 7. Qualitative results: Image pairs are shown in which the left image with blue bounding boxes is for traditional NMS, while the
right image with red bounding boxes is for Soft-NMS. Examples above the blue line are successful cases and below are failure cases. Even
in failure cases, Soft-NMS assigns a significantly lower score than the bounding box with a higher score. Note that for image No. 14, the
classes in consideration are for “person” and not “dog”, similarly in 15 it is “bench” and in 21 it is “potted plant”.
et al. A system for video surveillance and monitoring. 2000. mon objects in context. In European Conference on Com-
1 puter Vision, pages 740–755. Springer, 2014. 4
[3] J. Dai, H. Qi, Y. Xiong, Y. Li, G. Zhang, H. Hu, and [18] W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-
Y. Wei. Deformable convolutional networks. arXiv preprint Y. Fu, and A. C. Berg. Ssd: Single shot multibox detector.
arXiv:1703.06211, 2017. 5 In European Conference on Computer Vision, pages 21–37.
[4] N. Dalal and B. Triggs. Histograms of oriented gradients for Springer, 2016. 5
human detection. In Computer Vision and Pattern Recogni- [19] D. G. Lowe. Distinctive image features from scale-
tion, 2005. CVPR 2005. IEEE Computer Society Conference invariant keypoints. International journal of computer vi-
on, volume 1, pages 886–893. IEEE, 2005. 1, 2 sion, 60(2):91–110, 2004. 2
[5] C. Desai, D. Ramanan, and C. C. Fowlkes. Discriminative [20] K. Mikolajczyk and C. Schmid. Scale & affine invariant in-
models for multi-class object layout. International journal terest point detectors. International journal of computer vi-
of computer vision, 95(1):1–12, 2011. 2 sion, 60(1):63–86, 2004. 2
[6] P. Dollár, C. Wojek, B. Schiele, and P. Perona. Pedestrian [21] D. Mrowca, M. Rohrbach, J. Hoffman, R. Hu, K. Saenko,
detection: A benchmark. In Computer Vision and Pattern and T. Darrell. Spatial semantic regularisation for large scale
Recognition, 2009. CVPR 2009. IEEE Conference on, pages object detection. In Proceedings of the IEEE international
304–311. IEEE, 2009. 1 conference on computer vision, pages 2003–2011, 2015. 2
[7] M. Everingham, L. Van Gool, C. K. Williams, J. Winn, and [22] J. Philbin, O. Chum, M. Isard, J. Sivic, and A. Zisser-
A. Zisserman. The pascal visual object classes (voc) chal- man. Object retrieval with large vocabularies and fast spa-
lenge. International journal of computer vision, 88(2):303– tial matching. In Computer Vision and Pattern Recogni-
338, 2010. 4 tion, 2007. CVPR’07. IEEE Conference on, pages 1–8. IEEE,
[8] P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ra- 2007. 1
manan. Object detection with discriminatively trained part- [23] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi. You
based models. IEEE transactions on pattern analysis and only look once: Unified, real-time object detection. In Pro-
machine intelligence, 32(9):1627–1645, 2010. 1, 2 ceedings of the IEEE Conference on Computer Vision and
[9] A. Geiger, P. Lenz, C. Stiller, and R. Urtasun. Vision meets Pattern Recognition, pages 779–788, 2016. 5
robotics: The kitti dataset. The International Journal of [24] S. Ren, K. He, R. Girshick, and J. Sun. Faster r-cnn: Towards
Robotics Research, 32(11):1231–1237, 2013. 1 real-time object detection with region proposal networks. In
[10] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich fea- Advances in neural information processing systems, pages
ture hierarchies for accurate object detection and semantic 91–99, 2015. 2, 3, 5
segmentation. In Proceedings of the IEEE conference on [25] A. Rosenfeld and M. Thurston. Edge and curve detection
computer vision and pattern recognition, pages 580–587, for visual scene analysis. IEEE Transactions on computers,
2014. 2 100(5):562–569, 1971. 2
[11] I. Haritaoglu, D. Harwood, and L. S. Davis. W/sup 4: [26] R. Rothe, M. Guillaumin, and L. Van Gool. Non-maximum
real-time surveillance of people and their activities. IEEE suppression for object detection by passing messages be-
Transactions on pattern analysis and machine intelligence, tween windows. In Asian Conference on Computer Vision,
22(8):809–830, 2000. 1 pages 290–306. Springer, 2014. 2
[12] C. Harris and M. Stephens. A combined corner and edge [27] S. Rujikietgumjorn and R. T. Collins. Optimized pedestrian
detector. In Alvey vision conference, volume 15, pages 10– detection for multiple and occluded people. In Proceedings
5244. Citeseer, 1988. 2 of the IEEE Conference on Computer Vision and Pattern
[13] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learn- Recognition, pages 3690–3697, 2013. 3
ing for image recognition. In Proceedings of the IEEE Con- [28] J. Sivic, A. Zisserman, et al. Video google: A text retrieval
ference on Computer Vision and Pattern Recognition, pages approach to object matching in videos. In iccv, volume 2,
770–778, 2016. 5 pages 1470–1477, 2003. 1
[14] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Gir- [29] P. Viola and M. Jones. Rapid object detection using a boosted
shick, S. Guadarrama, and T. Darrell. Caffe: Convolu- cascade of simple features. In Computer Vision and Pattern
tional architecture for fast feature embedding. In Proceed- Recognition, 2001. CVPR 2001. Proceedings of the 2001
ings of the 22nd ACM international conference on Multime- IEEE Computer Society Conference on, volume 1, pages I–I.
dia, pages 675–678. ACM, 2014. 5 IEEE, 2001. 2
[15] D. Lee, G. Cha, M.-H. Yang, and S. Oh. Individualness and [30] J. Zhang, S. Sclaroff, Z. Lin, X. Shen, B. Price, and R. Mech.
determinantal point processes for pedestrian detection. In Unconstrained salient object detection via proposal sub-
European Conference on Computer Vision, pages 330–346. set optimization. In Proceedings of the IEEE Conference
Springer, 2016. 3 on Computer Vision and Pattern Recognition, pages 5733–
[16] Y. Li, K. He, J. Sun, et al. R-fcn: Object detection via region- 5742, 2016. 3
based fully convolutional networks. In Advances in Neural [31] C. L. Zitnick and P. Dollár. Edge boxes: Locating object
Information Processing Systems, pages 379–387, 2016. 2, 5 proposals from edges. In European Conference on Computer
[17] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ra- Vision, pages 391–405. Springer, 2014. 2
manan, P. Dollár, and C. L. Zitnick. Microsoft coco: Com-