Claim-Guided Textual Backdoor Attack for Practical Applications