Eliminating Backdoors in Neural Code Models via Trigger Inversion