Log In Sign Up

Cascaded Pyramid Mining Network for Weakly Supervised Temporal Action Localization

Weakly supervised temporal action localization, which aims at temporally locating action instances in untrimmed videos using only video-level class labels during training, is an important yet challenging problem in video analysis. Many current methods adopt the "localization by classification" framework: first do video classification, then locate temporal area contributing to the results most. However, this framework fails to locate the entire action instances and gives little consideration to the local context. In this paper, we present a novel architecture called Cascaded Pyramid Mining Network (CPMN) to address these issues using two effective modules. First, to discover the entire temporal interval of specific action, we design a two-stage cascaded module with proposed Online Adversarial Erasing (OAE) mechanism, where new and complementary regions are mined through feeding the erased feature maps of discovered regions back to the system. Second, to exploit hierarchical contextual information in videos and reduce missing detections, we design a pyramid module which produces a scale-invariant attention map through combining the feature maps from different levels. Final, we aggregate the results of two modules to perform action localization via locating high score areas in temporal Class Activation Sequence (CAS). Extensive experiments conducted on THUMOS14 and ActivityNet-1.3 datasets demonstrate the effectiveness of our method.


page 8

page 14


Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization

Temporal action localization is an important yet challenging research to...

CoLA: Weakly-Supervised Temporal Action Localization with Snippet Contrastive Learning

Weakly-supervised temporal action localization (WS-TAL) aims to localize...

Marginalized Average Attentional Network for Weakly-Supervised Learning

In weakly-supervised temporal action localization, previous works have f...

Decoupling Localization and Classification in Single Shot Temporal Action Detection

Video temporal action detection aims to temporally localize and recogniz...

Pyramid Region-based Slot Attention Network for Temporal Action Proposal Generation

It has been found that temporal action proposal generation, which aims t...

Video Self-Stitching Graph Network for Temporal Action Localization

Temporal action localization (TAL) in videos is a challenging task, espe...

1 Introduction

Due to the rapid development of computer vision along with the increasing amount of videos, many breakthroughs have been observed on video content analysis in recent years. Videos from realistic scenarios are often complex, which may contain multiple action instances of different categories with varied lengths. This problem leads to a challenging task: temporal action localization, which requires to not only handle the category classification of untrimmed videos but also determine the temporal boundaries of action instances. Nevertheless, it implies the huge amounts of temporal annotations for training an action localization model, which are more labor-intensive to obtain than video-level class labels.

Contrary to the fully supervised counterparts, Weakly Supervised Temporal Action Localization (WSTAL) task learns TAL using only video-level class labels, which can be regarded as a temporal version of Weakly Supervised Object Detection (WSOD) in image. A popular series of models in WSOD generate Class Activation Maps (CAMs) [42] to highlight the discriminative object regions contributing to the classification results most. Inspired by [42], recently many WSTAL works generate the Class Activation Sequence (CAS) to locate the action instances in temporal domain. However, many drawbacks have been observed in this “localization by classification

” mechanism: (1) the CAS fails to generate dense detections of target actions, causing many missing detections; (2) the classification network usually leverages features of discriminative rather than entire regions for recognition, failing to handle the action instances with varied lengths; (3) some true negative regions are falsely activated, which is mainly due to the action classifier realizes the recognition task based on a global knowledge of the video, resulting in inevitably neglecting the local details.

Figure 1: Overview of our approach. Two-stream network is used to encode visual features for our algorithm to perform action classification and temporal action localization concurrently. The (a) Cascaded Classification Module (CCM) with Online Adversarial Erasing (OAE) method and the (b) Pyramid Attention Module (PAM) are proposed to compute attention-based cascaded Temporal Class Activation Sequence (T-CAS) from the two streams separately, which can be employed to locate the entire regions of specific actions in temporal domain with high accuracy.

To address these issues and generate high quality detections, we propose the Cascaded Pyramid Mining Network (CPMN), which adopts two effective modules to mine entire regions of target actions and remove the false positive regions respectively. Specifically, CPMN generates detections in three steps. First, CPMN adapts two classifiers with different input feature maps to discover discriminative regions separately, and the input feature maps of the second classifier are erased with the guidance of the CAS from the first one. Second, CPMN combines the discriminative regions discovered by the two classifiers to form the entire detections. Final, taking full advantage of hierarchical contextual representations, CPMN generates a scale-invariant attention map to correct the false positive regions and reduce the missing detections. These pyramidal feature representations offer “local to global” context information for better evaluation. The overview of our algorithm is illustrated in Fig. 1.

To sum up, the main contributions of our work are three-fold:

(1) We propose a new architecture (CPMN) for weakly supervised temporal action localization in untrimmed videos, where entire temporal regions of action instances are located with less missing detections.

(2) We introduce an Online Adversarial Erasing (OAE) method to discover entire regions of target actions using two cascaded classifiers with different input feature representations, and explicitly handle the action instances with varied lengths by exploiting hierarchical contextual information.

(3) Extensive experiments demonstrate that our method achieves the state-of-the-art performance on both THUMOS14 and ActivityNet-1.3 datasets.

2 Related Work

Action recognition. Action recognition has been widely studied in recent years, which aims to identify one or multiple action categories of a video. Earlier works mainly focus on hand-crafted feature engineering, such as improved Dense Trajectory (iDT) [31, 32]

. With the development of convolutional neural networks, many deep learning based methods

[25, 6, 34, 29] have been applied to action recognition task and achieve convincing performance. Two-stream network [25, 6, 34] typically consists of two branches which learn the appearance and motion information using RGB image and optical flow respectively. C3D network [29] simultaneously captures appearance and motion features using a series of 3D convolutional layers. These action recognition models are usually adopted to extract frame or unit level visual representation in long and untrimmed videos.

Weakly supervised object detection. Weakly supervised object detection aims to locate the objects using only image-level labels. Current works mainly include bottom-up [3, 2] and top-down [42, 40, 27, 36] mechanisms. Proposals are first generated in [3, 2] using selective search [30] or edge boxes [43], which are further classified and the classification results are merged to match the image labels. Zhou et al. [42] and Zhang et al. [40] aim to find out the relationship between the neural responses of image regions and classification results, and then locate top activations area as detections. Singh et al. [27] propose to improve the localization map by randomly hiding some regions during training, so as to force the network to look for other discriminative parts. However, without effective guidance, this attempt is blind and inefficient. Recently, Wei et al. [36] employ Adversarial Erasing (AE) approach to discover more object regions in images by training classification network repeatedly, with discriminative regions erasing of different degrees, which is somewhat impractical and time-consuming. Our work differs from these methods in designing an Online Adversarial Erasing (OAE) approach which only needs to train a network for entire regions mining.

Weakly supervised temporal action Localization. Action localization in temporal domain [15, 17, 38, 5] is similar to object detection in spatial domain [8, 18, 9, 20, 21], as well as the case under weak supervision. WSTAL aims to locate action instances in untrimmed videos including both temporal boundaries and action categories while relying on video-level class label only. Based on the idea proposed in [3], Wang et al. [33] formulate this task as a proposal-based classification problem, where temporal proposals are extracted with the priors of action shot. However, the use of softmax function across proposals blocks it from distinguishing multiple action instances. Singh et al. [27] hide temporal regions to force attention learning. However, it’s not applicable owing to the complexity and varied lengths of videos. In our work, the Pyramid Attention Module (PAM) is proposed to hierarchically classify the videos from local to global, thus the pyramidal attention map is generated by combining feature maps from different levels, which can be scale-invariant to the action instances.

3 Our Approach

3.1 Problem Definition

We denote an untrimmed video as where is the number of frames and is the -th frame in Each video is annotated with a set of temporal action instances where is the number of temporal action instances in , and are starting time, ending time and category of instance respectively, where and is the number of action categories. During training phase, only the video-level action label set is given, and during test phase, need to be predicted.

3.2 Video Features Encoding

To apply CPMN, first feature representations need to be extracted to describe visual content of the input video in our work. UntrimmedNet [33] is employed as visual encoder, since this kind of architecture using multiple two-stream networks has shown great performance and becomes a prevalent practice adopted in action recognition and temporal action localization tasks.

Given a video containing frames, we use video unit as the basic processing unit in our framework for computational efficiency. Hence the video is divided into consecutive video units without overlap, where is the frame number of a unit. Then we compose a unit sequence from the video , where is the number of units. A video unit can be represented as , where is the starting frame and is the ending frame. Each unit is fed to the pre-trained visual encoder to extract representation. Concretely, the center RGB frame inside a unit is processed by spatial network and stacked optical flow derived around the center frame is processed by temporal network, then we concatenate output scores of UntrimmedNet [33]

in fc-action layer to form the feature vector

, where and are output score vector of spatial and temporal network respectively with length . Final, the unit-level feature sequence is used as input of CPMN.

3.3 Cascaded Pyramid Mining Network

To generate high quality detections with accurate temporal regions under weak supervision, we propose a multi-stage framework to achieve this goal. In CPMN, we first design a module to discover the entire action regions in a cascaded way. Then we introduce another module to combine the temporal feature maps from pyramidal feature hierarchy for prediction, making it possible to handle action instances with varied lengths. Final, we fuse the results from these two modules for action localization in temporal domain.

Network architecture. The architecture consists of three sub-modules: cascaded classification module, pyramid attention module and temporal action localization module. Cascaded classification module is a two-stage model which includes two classifiers as shown in Fig. 2, aiming to mine different but complementary regions of target action in the video through a cascaded manner. Pyramid attention module

is proposed to generate the class probability of each input unit feature, through classifying the input feature sequence with hierarchical resolutions separately. The architecture of this module is illustrated in Fig. 3. Final,

temporal action localization module fuses the cascaded localization sequence and the pyramidal attention map to make it more accurate.

Cascaded classification module.

The goal of this module is to locate the entire regions of target actions in the video, where two cascaded classifiers are needed. As shown in Fig. 2, the Cascaded Classification Module (CCM) contains two separate classifiers with the same structure. In each stage (i.e. the localization stage and the mining stage), the classifier handles the input unit-level features and adopts two 1-D temporal convolutional layers followed by a global average pooling layer to get the video-level representation, which is then passed through a fully connected (FC) layer and a Sigmoid layer for video classification. The two convolutional layers have the same configurations: kernel size 3, stride 1 and 512 filters with ReLU activation. Denote the last convolutional features and the averaged feature representation as

and respectively, where is the length of input feature sequence, is the channel number and is the -th feature map at time . Then based on the idea in [42], we derive the 1-D Temporal Class Activation Sequence (T-CAS). We denote as the -th element of the weight matrix in the classification layer corresponding to class . The input to the Sigmoid layer for class is


where is denoted as T-CAS of class , which indicates the activations of each unit feature contributing to a specific class of the video.

Figure 2: Architecture of the cascaded classification module. The extracted unit-level feature representations are fed to two cascaded video classifiers for localization sequence inference individually. The two classifiers of the same structure share the input feature maps, and we erase the input features of discriminative regions highlighted by the first classifier, to drive the second classifier to discover more relevant regions of target actions in the video. Final, the two T-CASs are integrated for a better localization.
Figure 3: Architecture of the pyramid attention module used for generating the multi-scale attention map. The pyramid attention module consists of several branches based on feature representations of hierarchical resolutions, for the purpose of classifying the video from local to global. And a global average pooling layer is employed to encode the video-level prediction of each branch and then we aggregate the multiple prediction results from different levels. Final, the pyramidal attention map is constructed through combining the multi-scale feature maps in the prediction layers during test phase.

Then we conduct a threshold on the T-CAS obtained in the first stage to generate a mask which represents the discriminative regions discovered by the first classifier, and the mask is used to erase the input features of the second stage for classification. Such an online adversarial erasing operation allows the second classifier to leverage features from other regions for supporting the video-level labels. Final, we integrate the two T-CASs, and , which are generated in the two stages separately, to form the cascaded localization sequence . Concretely, , where is the -th element in the cascaded action localization sequence of class .

Pyramid attention module. This module is designed to handle action instances with varied lengths. We achieve this goal in two steps. First, we semantically classify the feature representations with hierarchical temporal resolutions individually, aiming at processing the input unit-level feature sequence from local to global. Then we combine temporal feature maps in prediction layers from different levels to form the pyramidal attention map.

As shown in Fig. 3, we stack three 1-D max pooling layers on the input feature sequence, thus obtain the pyramidal feature hierarchy. After subsampling with a scaling step of 2 layer by layer, the feature sequence length of the

-th layer is . Then for each level, we first conduct a temporal convolutional layer with kernel size 1, stride 1 and 512 filters to handle the feature sequence. Among these levels, we use lateral connections to exploit hierarchical context. Then we employ another convolutional layer to predict the classification scores of units associated with each feature map respectively. Each prediction layer consists of filters with kernel size 1 and stride 1. And we continue to append a global average pooling layer on the label maps of each level separately to aggregate the video-level predictions. Final, we average among these prediction results to match the video-level class labels.

During test phase, we form the class heatmaps by combining the output label maps in prediction layers from different levels. For example, with the coarser-resolution label map generated in -th layer, we upsample the temporal resolution by a factor of through repeating the score vector in temporal dimension. Then every class heatmap is normalized to [0, 1] as follows,


where is the heatmap for class , which indicates the class probability of each unit feature semantically.

Figure 4: Illustration of the comparison of ground-truth temporal intervals, original T-CAS, mining T-CAS, cascaded localization sequence (CLS) and pyramidal attention map (PAM) for the LongJump action class on THUMOS14.

Temporal action localization module. The goal of this module is to fuse the cascaded action localization sequence and the pyramidal attention map obtained above for temporal action localization. As shown in Fig. 4, the CLS can identify more regions of target actions but some false positive regions are also activated by mistake. Since the class heatmap is generated using element-wise addition of label maps at multiple scales, the results are too smooth to indicate the accurate action boundaries. But they can provide important temporal priors to constrain the CLS. We let the class heatmap play the role of an attention map, which is used to correct the false positive regions and reduce missing detections. Then we fuse CLS and PAM to generate the attention-based cascaded T-CASs respectively as follows,


Then for each action class, we conduct a threshold on the and separately, and different from the method [42] which only retains the bounding box that covers the largest connected components, we keep all connected units that pass the predefined threshold from each class and modality.

3.4 Training of CPMN

The training details of the cascaded classification module and the pyramid attention module in CPMN are introduced in this section.

Cascaded classification module. Given an input video , we form unit sequence and extract corresponding feature sequence with length . Since an untrimmed video usually comes up with extremely irrelevant frames with action instances only occupying small parts, we totally test three sampling methods to simplify the feature sequence for computational cost reduction: (1) uniform sampling: units are extracted with a regular interval from , thus the final unit sequence and feature sequence are and separately, where ; (2) sparse sampling: we first divide the video into segments

with equal length, then during each training epoch, we randomly sample one unit from each segment to form the unit sequence of length

; (3) shot-based sampling: considering the action structure, we sample the unit sequence based on action shots, which are generated by shot boundary detector [28]. Evaluation results of these sampling methods are shown in Section 4.3.

After sampling, we construct the training data of each video as and taking it as input, the first classifier leverages the most discriminative regions for classification while the second classifier handles the erased feature sequence for entire regions mining. We test different erasing thresholds from 0.3 to 0.7 and the evaluation results are shown in Section 4.3. And we employ cross-entropy loss and

regularization loss as final loss function to train the two multi-label classifiers separately:


where is the predicted class scores of the video and is the number of training videos. balances the cross-entropy loss and loss, and is the cascaded classification model. Algorithm 1 illustrates the training procedure.

1:Training data, ; threshold, ;
2:Cascaded T-CAS, ;
3:function Main( )
4:     while training is not convergent do
5:          CasTrain(, )
6:     end while
7:      max()
8:     return
9:end function
10:function CasTrain(, )
11:     Extract the feature sequence
12:     Generate the original T-CAS infer()
13:     Generate the mask
14:     Obtain the erased feature sequence erase()
15:     Generate the mining T-CAS infer()
16:     return
17:end function
Algorithm 1 Training procedure of cascaded classification module.

Pyramid attention module. The pyramid attention module is trained to handle the action instances with arbitrary intervals. Considering the maximum length of ground-truth action instances in dataset, we slide windows with length which can cover the . The training data of video is constructed as , where is number of windows. Taking a sliding window with corresponding feature sequence as input, the pyramid attention module generates label maps with different lengths, then combine these maps in a bottom-up way and concatenate all windows results to form the video pyramidal attention maps. The multi-label cross-entropy loss function is also adopted to train the pyramid attention module.

3.5 Prediction and Post-processing

During prediction, we follow the same data preparation procedures of training phase to prepare the testing data, except for the following two changes: (1) in the cascaded classification module, we use uniform sampling method to sample the input feature sequence in order to increase the prediction speed and guarantee the stable results; (2) in the pyramid attention module, if the length of input video is shorter than

, we will pad the input feature sequence to

so that there is at least one window for the multi-tower network to predict. Then given a video , we use CPMN to generate proposal set based on the thresholding attention-based cascaded T-CAS of top-2 predicted classes [33], where is the number of candidate proposals and we set the threshold as 20% of the max value of the derived T-CAS. For each proposal denoted by , we first calculate the mean attention-based cascaded T-CAS among the temporal range of the proposal as :


then we fuse and the class scores with multiplication to get the confidence score :


Since we keep all connected units that pass the predefined threshold from each class and each modality as proposals, we may generate multiple predictions with different overlap. Then we conduct non-maximum suppression with predefined threshold in these prediction results to remove the redundant predictions of confidence score . Finally we get the prediction instances set , where is the number of final prediction instances.

4 Experiments

4.1 Dataset and Setup

Dataset. ActivityNet-1.3 [4] is a large-scale video dataset for action recognition and temporal action localization tasks used in the ActivityNet Challenge 2017 and 2018, which consists of 10,024 videos for training, 4,926 for validation and 5,044 for testing, with 200 action classes annotated. Each video is annotated with average 1.5 temporal action instances. THUMOS14 [14] dataset contains 1010 videos for validation and 1574 videos for testing with video-level labels of 101 action classes, while only a subset of 200 and 213 videos separately are temporally annotated among 20 classes. We train our model with the validation subset without using the temporal annotations. In this section, we compare our method with state-of-the-art methods on both ActivityNet-1.3 and THUMOS14.

Evaluation metrics.

Following the conventions, we use mean Average Precision (mAP) as evaluation metric, where Average Precision (AP) is calculated on each class separately. We report mAP values at different Intersection over Union (IoU) thresholds. On ActivityNet-1.3, mAP with IoU thresholds

and average mAP with IoU thresholds set are used. On THUMOS14, mAP with IoU thresholds are used.

Implementation details. We use the UntrimmedNet [33] and TSN [34] for visual feature encoding of THUMOS14 and ActivityNet-1.3 separately, where ResNet network [10] is used as spatial network and BN-Inception network [12]

is adopted as temporal network. The two visual encoders are both implemented using Caffe


and the TSN is pre-trained on ActivityNet-1.3. During feature extraction, the frame number of a unit

is set to 5 on THUMO14 and is set to 16 on ActivityNet-1.3. In CPMN, the cascaded classification module and the pyramid attention module are both implemented using TensorFlow

[1]. On both datasets, the two modules are both trained with batch size 16 and learning rate 0.001 for 30 epochs, then 0.0001 for another 120 epochs. The erasing threshold used in CCM is 0.4 and the window size used in the PAM is 64. Besides, the regularization term is 0.0025. For NMS, we set the threshold to 0.3 on THUMO14 and 0.5 on ActivityNet-1.3 by empirical validation.

4.2 Comparison with State-of-the-art Methods

We first evaluate the overall results of our proposed framework for action localization and compare our method with several state-of-the-art approaches including both fully and weakly supervised methods. Table 1 illustrates the localization performance on the THUMOS14 dataset. We can observe that our proposed algorithm achieves better performance than the two existing weakly supervised methods, and is even competitive to some fully supervised approaches. For example, when the IoU threshold is 0.5, the mAP of our method is more than twice higher as the one of [27], which significantly convinces that our proposed online adversarial erasing strategy is more reasonable than randomly hiding. And the substantial performance gaining over the previous works under different IoU thresholds confirms the effectiveness of our CPMN.

We also present our results on the validation set of the ActivityNet-1.3 dataset to further validate our localization performance. In ActivityNet-1.3, since the length of videos is not too long like THUMOS14, we directly resize the extracted feature sequence to length

= 64 by linear interpolation. And we choose attention-based cascaded T-CAS of top-1 class

[35] as our detections. The evaluation results on ActivityNet-1.3 are shown in Table 2, from which we can see that our algorithm is generalized enough to this dataset, and significantly outperforms most fully supervised approaches with convincing performance. Meanwhile, we are the first to evaluate weakly supervised method on this dataset.

Supervision Method mAP@tIoU ()
0.1 0.2 0.3 0.4 0.5 0.6 0.7
Fully supervised Oneata et al. [19] 36.6 33.6 27.0 20.8 14.4 - -
Richard et al. [22] 39.7 35.7 30.0 23.2 15.2 - -
Shou et al. [24] 47.7 43.5 36.3 28.7 19.0 10.3 5.3
Yuan et al. [39] 51.0 45.2 36.5 27.8 17.8 - -
Lin et al. [15] 50.1 47.8 43.0 35.0 24.6 15.3 7.7
Zhao et al. [41] 60.3 56.2 50.6 40.8 29.1 - -
Gao et al. [7] 60.1 56.7 50.1 41.3 31.0 19.1 9.9
Weakly supervised Singh et al [27] 36.4 27.8 19.5 12.7 6.8 - -
Wang et al [33] 44.4 37.7 28.2 21.1 13.7 - -
CPMN 47.1 41.6 32.8 24.7 16.1 10.1 5.5
Table 1: Comparison of our method with other state-of-the-arts on THUMOS14 dataset for action localization, including both full supervision and weak supervision.
Supervision Method 0.5 0.75 0.95 Average
Fully supervised Singh et al. [26] 34.5 - - -
Heilbron et al. [11] 40.00 17.90 4.70 21.70
Wang et al. [35] 42.28 3.76 0.05 14.85
Shou et al. [23] 43.83 25.88 0.21 22.77
Xiong et al. [37] 39.12 23.48 5.49 23.98
Lin et al. [16] 48.99 32.91 7.87 32.26
Weakly supervised CPMN 39.29 24.09 6.71 24.42
Table 2: Results on validation set of ActivityNet-1.3 in terms of mAP@tIoU and average mAP. Note that all compared methods are fully supervised.

Fig. 6 visualizes the localization performance of our proposed method on THUMOS14 dataset. As shown in Fig. 6 (a), the video includes two different action classes, and our Attention-based Cascaded (AC) T-CAS of corresponding class can localize the entire regions of target actions individually. It confirms that the two cascaded classifiers are successful in mining different but complementary target regions. And in Fig. 6 (b), there are many action instances densely distributed in the video, however, our method can effectively highlight the regions which may contain actions, which demonstrates that our modified T-CAS is able to generate dense detections. Besides, the Fig. 6 (c) presents a video with similar appearance and little dynamic motions along the temporal dimension, which is a difficult scene even for humans to distinguish between adjacent frames, resulting in inevitably missing detections. Nevertheless, our algorithm is still robust enough to discover some discriminative regions even with some false positives. To conclude, the proposed cascaded action localization sequence together with the pyramidal attention map is intuitive to promote the overall localization performance.

Figure 5: Evaluation of the CPMN with different sampling methods (left) and erasing thresholds (right) used in the CCM on THUMOS14.

4.3 Ablation Study

In this section, we evaluate CPMN with different implementation variations to study their effects and investigate the contribution of several components proposed in our network. All the experiments for our ablation study are conducted on THUMOS14 dataset.

Sampling strategy. The input untrimmed video usually exists substantial redundant frames which are useless for the cascaded model to leverage discriminative regions for recognition. In order to reduce computational cost, we sample the input feature sequence instead of using all units for video categorization. We first evaluate the Cascaded Classification Module (CCM) with different sampling methods, including uniform sampling, sparse sampling and shot-based sampling. The evaluation results are illustrated in Fig. 5 (left). We can observe that the shot-based sampling method which takes action structure into consideration shows better performance than uniform sampling and sparse sampling which serves as a data augmentation step leads to the best performance. Therefore we finally adopt sparse sampling to sample the input feature sequence of the CCM during training phase.

Erasing threshold. We continue to study the influence of different erasing thresholds which we use to identify the discriminative regions highlighted by the first classifier of the CCM and create a mask for online adversarial erasing step. As shown in Fig. 5 (right), we test the thresholds from 0.3 to 0.7 and report the performance over different IoU. We observe that when the threshold , the localization performance of the two-stage model is boosted and the value larger or smaller than 0.4 would fail to encourage the second classifier to mine entire regions of target actions and may bring background noise.

Architecture of CPMN. As shown in Table 3, we investigate the contribution of each module proposed in our method. We choose the architecture sharing the same idea with CAM [42] for discriminative localization as our baseline model without online erasing step to mine entire regions and the pyramidal attention map. The comparison results reveal that the original T-CAS together with the mining T-CAS can promote the performance and with the help of pyramidal attention map, the localization performance can be further boosted. These observations suggest that these modules are all effective and indispensable in CPMN. Note that we also test the CCM with more classifiers. Specifically, we add the third classifier to handle the erased feature maps guided by the first two classifiers. However, we don’t find any significant improvement.

Original T-CAS
Mining T-CAS
Pyramidal Attention Map (PAM)
mAP ( = 0.5) 11.4 14.5 16.1
Table 3: Performance with respect to architecture choices. In first column, only original T-CAS without adversarial mining and attention map is used for action localization.
Figure 6: Visualization of the action instances located by CPMN on THUMOS14. Figure (a) shows that entire regions of two actions are separately located in corresponding T-CAS. Figure (b) shows that dense predictions can be generated by our approach with less missing detections. Figure (c) shows that even the instances with small length and similar appearance, our model still can locate it with less false positives.

5 Conclusion

In this paper, we propose the Cascaded Pyramid Mining Network (CPMN) for weakly supervised temporal action localization. Our method includes two main steps: cascaded adversarial mining and pyramidal attention map inference. Cascaded adversarial mining is realized by designing two cascaded classifiers to collaborate on locating entire regions of target actions with a novel online adversarial erasing step. And the pyramidal attention map tries explicitly handling the falsely activated regions and missing detections in the localization sequence, which is inferred upon the prediction results of the multi-tower network. Extensive experiments reveal that CPMN significantly outperforms other state-of-the-art approaches on both THUMOS14 and ActivityNet-1.3 datasets.


  • [1] Abadi, M., Agarwal, A., Barham, P., et al.: Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467 (2016)
  • [2] Bai, P., Tang, X., Wang, X., Liu, W.: Multiple instance detection network with online instance classifier refinement. In: CVPR. pp. 4322–4328 (2017)
  • [3] Bilen, H., Vedaldi, A.: Weakly supervised deep detection networks. In: CVPR. pp. 2846–2854 (2016)
  • [4] Caba Heilbron, F., Escorcia, V., Ghanem, B., Carlos Niebles, J.: Activitynet: A large-scale video benchmark for human activity understanding. In: CVPR. pp. 961–970 (2015)
  • [5] Chao, Y.W., Vijayanarasimhan, S., Seybold, B., Ross, D.A., Deng, J., Sukthankar, R.: Rethinking the faster r-cnn architecture for temporal action localization. In: CVPR. pp. 1130–1139 (2018)
  • [6] Feichtenhofer, C., Pinz, A., Zisserman, A.: Convolutional two-stream network fusion for video action recognition. In: CVPR. pp. 1933–1941 (2016)
  • [7] Gao, J., Yang, Z., Nevatia, R.: Cascaded boundary regression for temporal action detection. arXiv preprint arXiv:1705.01180 (2017)
  • [8] Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: CVPR. pp. 580–587 (2014)
  • [9] He, K., Gkioxari, G., Dollar, P., Girshick, R.: Mask-rcnn. arXiv:1703.06870v2 (2017)
  • [10] He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR. pp. 770–778 (2016)
  • [11] Heilbron, F.C., Barrios, W., Escorcia, V., Ghanem, B.: Scc: Semantic context cascade for efficient action detection. In: CVPR. pp. 3175–3184 (2017)
  • [12] Ioffe, S., Szegedy, C.: Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015)
  • [13] Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: Convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM international conference on Multimedia. pp. 675–678. ACM (2014)
  • [14] Jiang, Y., Liu, J., Zamir, A.R., Toderici, G., Laptev, I., Shah, M., Sukthankar, R.: Thumos challenge: Action recognition with a large number of classes. In: Computer Vision-ECCV workshop 2014 (2014)
  • [15] Lin, T., Zhao, X., Shou, Z.: Single shot temporal action detection. In: Proceedings of the 2017 ACM on Multimedia Conference. pp. 988–996. ACM (2017)
  • [16] Lin, T., Zhao, X., Shou, Z.: Temporal convolution based action proposal: Submission to activitynet 2017. arXiv preprint arXiv:1707.06750 (2017)
  • [17] Lin, T., Zhao, X., Su, H., Wang, C., Yang, M.: Bsn: Boundary sensitive network for temporal action proposal generation. arXiv preprint arXiv:1806.02964 (2018)
  • [18] Lin, T.Y., Dollár, P., Girshick, R.B., He, K., Hariharan, B., Belongie, S.J.: Feature pyramid networks for object detection. In: CVPR. vol. 1, p. 4 (2017)
  • [19] Oneata, D., Verbeek, J., Schmid, C.: The lear submission at thumos2014. THUMOS Action Recognition challenge (2014)
  • [20] Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: Unified, real-time object detection. In: CVPR. pp. 779–788 (2016)
  • [21] Redmon, J., Farhadi, A.: Yolo9000: Better, faster, stronger. arXiv preprint arXiv:1612.08242 (2016)
  • [22] Richard, A., Gall, J.: Temporal action detection using a statistical language model. In: CVPR. pp. 3131–3140 (2016)
  • [23] Shou, Z., Chan, J., Zareian, A., Miyazawa, K., Chang, S.F.: Cdc: Convolutional-de-convolutional networks for precise temporal action localization in untrimmed videos. In: CVPR. pp. 1417–1426. IEEE (2017)
  • [24] Shou, Z., Wang, D., Chang, S.F.: Temporal action localization in untrimmed videos via multi-stage cnns. In: CVPR. pp. 1049–1058 (2016)
  • [25] Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. In: Advances in neural information processing systems. pp. 568–576 (2014)
  • [26] Singh, G., Cuzzolin, F.: Untrimmed video classification for activity detection: submission to activitynet challenge. arXiv preprint arXiv:1607.01979 (2016)
  • [27] Singh, K.K., Lee, Y.J.: Hide-and-seek: Forcing a network to be meticulous for weakly-supervised object and action localization. In: ICCV (2017)
  • [28] Su, H., Zhao, X., Lin, T., Fei, H.: Weakly supervised temporal action detection with shot-based temporal pooling network. In: ICONIP (2018)
  • [29] Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3d convolutional networks. In: ICCV. pp. 4489–4497 (2015)
  • [30] Uijlings, J.R., Van De Sande, K.E., Gevers, T., Smeulders, A.W.: Selective search for object recognition. In: IJCV. vol. 104, pp. 154–171. Springer (2013)
  • [31] Wang, H., Kläser, A., Schmid, C., Liu, C.L.: Action recognition by dense trajectories. In: CVPR. pp. 3169–3176. IEEE (2011)
  • [32] Wang, H., Schmid, C.: Action recognition with improved trajectories. In: ICCV. pp. 3551–3558 (2013)
  • [33] Wang, L., Xiong, Y., Lin, D., Van Gool, L.: Untrimmednets for weakly supervised action recognition and detection. In: CVPR. vol. 2 (2017)
  • [34] Wang, L., Xiong, Y., Wang, Z., Qiao, Y., Lin, D., Tang, X., Van Gool, L.: Temporal segment networks: Towards good practices for deep action recognition. In: ECCV. pp. 20–36. Springer (2016)
  • [35] Wang, R., Tao, D.: Uts at activitynet 2016. ActivityNet Large Scale Activity Recognition Challenge 2016 p. 8 (2016)
  • [36] Wei, Y., Feng, J., Liang, X., Cheng, M.M., Zhao, Y., Yan, S.: Object region mining with adversarial erasing: A simple classification to semantic segmentation approach. In: CVPR. vol. 1, p. 3 (2017)
  • [37] Xiong, Y., Zhao, Y., Wang, L., Lin, D., Tang, X.: A pursuit of temporal accuracy in general activity detection. arXiv preprint arXiv:1703.02716 (2017)
  • [38] Xu, H., Das, A., Saenko, K.: R-c3d: region convolutional 3d network for temporal activity detection. In: ICCV. pp. 5794–5803 (2017)
  • [39] Yuan, Z.H., Stroud, J.C., Lu, T., Deng, J.: Temporal action localization by structured maximal sums. In: CVPR. vol. 2, p. 7 (2017)
  • [40] Zhang, J., Bargal, S.A., Lin, Z., Brandt, J., Shen, X., Sclaroff, S.: Top-down neural attention by excitation backprop. In: IJCV. vol. 126, pp. 1084–1102. Springer (2018)
  • [41] Zhao, Y., Xiong, Y., Wang, L., Wu, Z., Tang, X., Lin, D.: Temporal action detection with structured segment networks. In: ICCV. vol. 2 (2017)
  • [42]

    Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: CVPR. pp. 2921–2929 (2016)

  • [43] Zitnick, C.L., Dollár, P.: Edge boxes: Locating object proposals from edges. In: ECCV. pp. 391–405. Springer (2014)