Backdoor Attack Detection via Prediction Trustworthiness Assessment