“…There are two approaches to exploit the object detection |Rn|=5 first approach is to make use of a separately constructed object detection module and its output for boosting the event recognition. In this approach, the object detection results can either be directly fed into the event recognition module [1,2,3] or be integrated with the event recognition output via a late fusion [4,5,6,7,8,9,10,11]. The second approach is to transfer the object information by sharing the network weights between the object detection and event recognition and co-learning them in a unified architecture.…”