Effective Backdoor Defense by Exploiting Sensitivity of Poisoned Samples Weixin Chen 1