Mitigating Backdoors within Deep Neural Networks in Data-limited Configuration