Robust Backdoor Removal by Reconstructing Trigger-Activated Changes in Latent Representation